Dimitrios Papadopoulos

Orcid: 0000-0003-2621-3015

Affiliations:
  • Hong Kong University of Science and Technology, SAR, China


According to our database1, Dimitrios Papadopoulos authored at least 47 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators.
IACR Cryptol. ePrint Arch., 2024

Zero-Knowledge Proofs of Training for Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2024

2023
Verifiable Random Functions (VRFs).
RFC, August, 2023

Multi-User Collusion-Resistant Searchable Encryption for Cloud Storage.
IEEE Trans. Cloud Comput., 2023

GraphOS: Towards Oblivious Graph Processing.
Proc. VLDB Endow., 2023

Publicly Auditable Functional Encryption.
IACR Cryptol. ePrint Arch., 2023

AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities.
CoRR, 2023

Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Towards Efficient Decentralized Federated Learning.
IACR Cryptol. ePrint Arch., 2022

Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants.
IACR Cryptol. ePrint Arch., 2022

Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.
IACR Cryptol. ePrint Arch., 2022

Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 Records.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
This Website Uses Nudging: MTurk Workers' Behaviour on Cookie Consent Notices.
Proc. ACM Hum. Comput. Interact., 2021

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.
IACR Cryptol. ePrint Arch., 2021

SecureBoost: A Lossless Federated Learning Framework.
IEEE Intell. Syst., 2021

Private Hierarchical Clustering and Efficient Approximation.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Agora: A Privacy-Aware Data Marketplace.
IACR Cryptol. ePrint Arch., 2020

MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

Mitigating Leakage in Federated Learning with Trusted Hardware.
CoRR, 2020

2019
BitExTract: Interactive Visualization for Extracting Bitcoin Exchange Intelligence.
IEEE Trans. Vis. Comput. Graph., 2019

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing.
ISC Int. J. Inf. Secur., 2019

SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
IACR Cryptol. ePrint Arch., 2019

Dynamic Searchable Encryption with Small Client Storage.
IACR Cryptol. ePrint Arch., 2019

Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019

2018
Transparency Logs via Append-only Authenticated Dictionaries.
IACR Cryptol. ePrint Arch., 2018

Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Zero-Knowledge Version of vSQL.
IACR Cryptol. ePrint Arch., 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
IACR Cryptol. ePrint Arch., 2017

Can NSEC5 be practical for DNSSEC deployments?
IACR Cryptol. ePrint Arch., 2017

Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency.
IACR Cryptol. ePrint Arch., 2017

Stateful Multi-Client Verifiable Computation.
IACR Cryptol. ePrint Arch., 2017

Server-Aided Secure Computation with Off-line Parties.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Function-specific schemes for verifiable computation
PhD thesis, 2016

NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses.
IACR Cryptol. ePrint Arch., 2016

Secure Computation in Online Social Networks.
IACR Cryptol. ePrint Arch., 2016

Zero-Knowledge Accumulators and Set Algebra.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Practical Authenticated Pattern Matching with Optimal Proof Size.
Proc. VLDB Endow., 2015

Zero-Knowledge Accumulators and Set Operations.
IACR Cryptol. ePrint Arch., 2015

2014
TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptol. ePrint Arch., 2014

NSEC5: Provably Preventing DNSSEC Zone Enumeration.
IACR Cryptol. ePrint Arch., 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Taking Authenticated Range Queries to Arbitrary Dimensions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Verifiable Set Operations over Outsourced Databases.
IACR Cryptol. ePrint Arch., 2013

2011
Combining Traditional Map Labeling with Boundary Labeling.
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011


  Loading...