Angelo De Caro

According to our database1, Angelo De Caro authored at least 24 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
IACR Cryptology ePrint Archive, 2019

Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.
IACR Cryptology ePrint Archive, 2019

Privacy-preserving auditable token payments in a permissioned blockchain system.
IACR Cryptology ePrint Archive, 2019

2018
Receiver- and sender-deniable functional encryption.
IET Information Security, 2018

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains.
CoRR, 2018

Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.
Proceedings of the Computer Security, 2018

2017
The Transaction Graph for Modeling Blockchain Semantics.
IACR Cryptology ePrint Archive, 2017

Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

On the power of rewinding simulators in functional encryption.
Des. Codes Cryptogr., 2017

2016
Better Security for Functional Encryption for Inner Product Evaluations.
IACR Cryptology ePrint Archive, 2016

2015
Deniable Functional Encryption.
IACR Cryptology ePrint Archive, 2015

Simple Functional Encryption Schemes for Inner Products.
IACR Cryptology ePrint Archive, 2015

2013
Certified Information Access.
Journal of Systems and Software, 2013

On the Achievability of Simulation-Based Security for Functional Encryption.
IACR Cryptology ePrint Archive, 2013

2012
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption.
IEEE Trans. Information Forensics and Security, 2012

Fully Secure Hidden Vector Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Lattice-Based Hierarchical Inner Product Encryption.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

2011
Hidden Vector Encryption Fully Secure Against Unrestricted Queries.
IACR Cryptology ePrint Archive, 2011

Innovative approaches for security of small artefacts.
Computer Science Review, 2011

jPBC: Java pairing based cryptography.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
IACR Cryptology ePrint Archive, 2010

Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts.
IACR Cryptology ePrint Archive, 2010

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Untraceable Tags based on Mild Assumptions.
IACR Cryptology ePrint Archive, 2009


  Loading...