Dimitrios Papadopoulos

Orcid: 0000-0003-2621-3015

Affiliations:
  • Hong Kong University of Science and Technology, SAR, China


According to our database1, Dimitrios Papadopoulos authored at least 57 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
$\mathsf {AVeCQ}$AVeCQ: Anonymous Verifiable Crowdsourcing With Worker Qualities.
IEEE Trans. Dependable Secur. Comput., 2025

Hobbit: Space-Efficient zkSNARK with Optimal Prover Time.
Proceedings of the 34th USENIX Security Symposium, 2025

OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments.
Proceedings of the 34th USENIX Security Symposium, 2025

"Check-Before-you-Solve": Verifiable Time-Lock Puzzles.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

HydraProofs: Optimally Computing All Proofs in a Vector Commitment (With Applications to Efficient zkSNARKs Over Data from Multiple Users).
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Dynamic zk-SNARKs.
IACR Cryptol. ePrint Arch., 2024

AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities.
IACR Cryptol. ePrint Arch., 2024

Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators.
Proceedings of the 33rd USENIX Security Symposium, 2024

I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy.
Proceedings of the 33rd USENIX Security Symposium, 2024

Distributed & Scalable Oblivious Sorting and Shuffling.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Zero-Knowledge Proofs of Training for Deep Neural Networks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Cross Ledger Transaction Consistency for Financial Auditing.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Verifiable Random Functions (VRFs).
RFC, August, 2023

Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-User Collusion-Resistant Searchable Encryption for Cloud Storage.
IEEE Trans. Cloud Comput., 2023

GraphOS: Towards Oblivious Graph Processing.
Proc. VLDB Endow., 2023

Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Publicly Auditable Functional Encryption.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards Efficient Decentralized Federated Learning.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 Records.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
This Website Uses Nudging: MTurk Workers' Behaviour on Cookie Consent Notices.
Proc. ACM Hum. Comput. Interact., 2021

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.
IACR Cryptol. ePrint Arch., 2021

SecureBoost: A Lossless Federated Learning Framework.
IEEE Intell. Syst., 2021

Private Hierarchical Clustering and Efficient Approximation.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Mitigating Leakage in Federated Learning with Trusted Hardware.
CoRR, 2020

MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
Proceedings of the 29th USENIX Security Symposium, 2020

SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
Proceedings of the 29th USENIX Security Symposium, 2020

Dynamic Searchable Encryption with Small Client Storage.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Agora: A Privacy-aware Data Marketplace.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
BitExTract: Interactive Visualization for Extracting Bitcoin Exchange Intelligence.
IEEE Trans. Vis. Comput. Graph., 2019

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing.
ISC Int. J. Inf. Secur., 2019

Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019

Transparency Logs via Append-Only Authenticated Dictionaries.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Stateful Multi-client Verifiable Computation.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
A Zero-Knowledge Version of vSQL.
IACR Cryptol. ePrint Arch., 2017

Can NSEC5 be practical for DNSSEC deployments?
IACR Cryptol. ePrint Arch., 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Server-Aided Secure Computation with Off-line Parties.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Function-specific schemes for verifiable computation
PhD thesis, 2016

NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses.
IACR Cryptol. ePrint Arch., 2016

Secure Computation in Online Social Networks.
IACR Cryptol. ePrint Arch., 2016

Zero-Knowledge Accumulators and Set Algebra.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Practical Authenticated Pattern Matching with Optimal Proof Size.
Proc. VLDB Endow., 2015

Zero-Knowledge Accumulators and Set Operations.
IACR Cryptol. ePrint Arch., 2015

NSEC5: Provably Preventing DNSSEC Zone Enumeration.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptol. ePrint Arch., 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Verifiable Set Operations over Outsourced Databases.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Taking Authenticated Range Queries to Arbitrary Dimensions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2011
Combining Traditional Map Labeling with Boundary Labeling.
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011


  Loading...