Daniele Venturi

Orcid: 0000-0003-2379-8564

Affiliations:
  • Sapienza University of Rome, Italy
  • University of Trento, Italy (former)


According to our database1, Daniele Venturi authored at least 96 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Evolving secret sharing revisited: computational security and succinctness.
Des. Codes Cryptogr., September, 2025

The Coding Limits of Robust Watermarking for Generative Models.
IACR Cryptol. ePrint Arch., 2025

Robust Non-Interactive Zero-Knowledge Combiners.
IACR Cryptol. ePrint Arch., 2025

Malleable SNARKs and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain.
Proceedings of the Intelligent Information Systems, 2025

Registered Matchmaking Encryption.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors.
J. Cryptol., September, 2024

Compact Proofs of Partial Knowledge for Overlapping CNF Formulae.
IACR Cryptol. ePrint Arch., 2024

MARTSIA: Safeguarding Data Confidentiality in Blockchain-Driven Process Execution.
CoRR, 2024

Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Evolving Secret Sharing Made Short.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Non-malleable Fuzzy Extractors.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models.
IACR Cryptol. ePrint Arch., 2023

Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE.
IACR Cryptol. ePrint Arch., 2023

Enabling Data Confidentiality with Public Blockchains.
CoRR, 2023

Multi-key and Multi-input Predicate Encryption from Learning with Errors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

MARTSIA: Enabling Data Confidentiality for Blockchain-Based Process Execution.
Proceedings of the Enterprise Design, Operations, and Computing, 2023

Registered (Inner-Product) Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

On the Complete Non-malleability of the Fujisaki-Okamoto Transform.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Cryptographic and Financial Fairness.
IEEE Trans. Inf. Forensics Secur., 2022

Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited.
IACR Cryptol. ePrint Arch., 2022

Universally Composable Subversion-Resilient Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

Continuously Non-malleable Codes Against Bounded-Depth Tampering.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
A compiler for multi-key homomorphic signatures for Turing machines.
Theor. Comput. Sci., 2021

Immunization against complete subversion without random oracles.
Theor. Comput. Sci., 2021

Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Identity-Based Matchmaking Encryption Without Random Oracles.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Shielded Computations in Smart Contracts Overcoming Forks.
Proceedings of the Financial Cryptography and Data Security, 2021

The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Subversion-resilient signatures: Definitions, constructions and applications.
Theor. Comput. Sci., 2020

Continuously Non-malleable Codes in the Split-State Model.
J. Cryptol., 2020

Non-malleable Encryption: Simpler, Shorter, Stronger.
J. Cryptol., 2020

On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Cryptographic Reverse Firewalls for Interactive Proof Systems.
Proceedings of the 47th International Colloquium on Automata, Languages, and Programming, 2020

Vision: What If They All Die? Crypto Requirements For Key People.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains.
IACR Cryptol. ePrint Arch., 2019

A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Continuously Non-malleable Secret Sharing for General Access Structures.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?
Proceedings of the Security Protocols XXVII, 2019

Multi-Covert Channel Attack in the Cloud.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Match Me if You Can: Matchmaking Encryption and Its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Rate-Optimizing Compilers for Continuously Non-malleable Codes.
Proceedings of the Applied Cryptography and Network Security, 2019

Public Immunization Against Complete Subversion Without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Secure Multi-Party Computation from Strongly Uniform Key Agreement.
IACR Cryptol. ePrint Arch., 2018

Non-monotonic Security Protocols and Failures in Financial Intermediation.
Proceedings of the Security Protocols XXVI, 2018

FuturesMEX: Secure, Distributed Futures Market Exchange.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Secure Outsourcing of Cryptographic Circuits Manufacturing.
Proceedings of the Provable Security, 2018

Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Continuously Non-malleable Codes with Split-State Refresh.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model.
Theor. Comput. Sci., 2017

Securing Underwater Communications: Key Agreement based on Fully Hashed MQV.
Proceedings of the International Conference on Underwater Networks & Systems, 2017

The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations.
Proceedings of the Security Protocols XXV, 2017

Predictable Arguments of Knowledge.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Non-Malleable Codes for Space-Bounded Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Tampering in wonderland.
PhD thesis, 2016

Rate-limited secure function evaluation.
Theor. Comput. Sci., 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptol. ePrint Arch., 2016

Entangled cloud storage.
Future Gener. Comput. Syst., 2016

Non-Malleable Encryption: Simpler, Shorter, Stronger.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Fiat-Shamir for Highly Sound Protocols Is Instantiable.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Naor-Yung Paradigm with Shared Randomness and Applications.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Chosen-Ciphertext Security from Subset Sum.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

A Tamper and Leakage Resilient von Neumann Architecture.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

(De-)Constructing TLS 1.3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

The Chaining Lemma and Its Application.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Secure Data Sharing and Processing in Heterogeneous Clouds.
Proceedings of the 1st International Conference on Cloud Forward: From Distributed to Complete Computing, 2015

Subversion-Resilient Signature Schemes.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Entangled Encodings and Data Entanglement.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

2014
(De-)Constructing TLS.
IACR Cryptol. ePrint Arch., 2014

A Tamper and Leakage Resilient Random Access Machine.
IACR Cryptol. ePrint Arch., 2014

Continuous Non-malleable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

A Second Look at Fischlin's Transformation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
On the Connection between Leakage Tolerance and Adaptive Security.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Rate-Limited Secure Function Evaluation: Definitions and Constructions.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Anonymity-Preserving Public-Key Encryption: A Constructive Approach.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Outsourced Pattern Matching.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
On the Non-malleability of the Fiat-Shamir Transform.
Proceedings of the Progress in Cryptology, 2012

2011
Security & Indistinguishability in the Presence of Traffic Analysis.
IACR Cryptol. ePrint Arch., 2011

Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Efficient Authentication from Hard Learning Problems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Leakage-Resilient Storage.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Lecture Notes on Algorithmic Number Theory.
Electron. Colloquium Comput. Complex., 2009

Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...