Elena Pagnin

Orcid: 0000-0002-7804-6696

According to our database1, Elena Pagnin authored at least 40 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Proofs of sequential communication delays from physical assumptions and their applications.
Cryptogr. Commun., September, 2025

Universally Composable Interactive and Ordered Multi-signatures.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

That's AmorE: Amortized Efficiency for Pairing Delegation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Progressive and efficient verification for digital signatures: extensions and experimental results.
J. Cryptogr. Eng., September, 2024

Consistency-or-Die: Consistency for Key Transparency.
IACR Cryptol. ePrint Arch., 2024

Multi Designated Verifier Ring Signatures.
IACR Commun. Cryptol., 2024

CaSCaDE: (Time-Based) Cryptography from Space Communications DElay.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Metadata Privacy Beyond Tunneling for Instant Messaging.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Updatable Privacy-Preserving Blueprints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2022
To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging.
CoRR, 2022

Bonsai: A Generalized Look at Dual Deduplication.
CoRR, 2022

Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication.
CoRR, 2022

CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Count Me In! Extendability for Threshold Ring Signatures.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Outsourcing MPC Precomputation for Location Privacy.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Bifrost: A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

Progressive and Efficient Verification for Digital Signatures.
Proceedings of the Applied Cryptography and Network Security, 2022

Secure Cloud Storage with Joint Deduplication and Erasure Protection.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
IACR Cryptol. ePrint Arch., 2021

On the Efficiency and Flexibility of Signature Verification.
IACR Cryptol. ePrint Arch., 2021

LOVE a Pairing.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings.
Proceedings of the ICC 2021, 2021

2020
Secure Generalized Deduplication via Multi-Key Revealing Encryption.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping Party.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proc. Priv. Enhancing Technol., 2019

The Simplest Multi-key Linearly Homomorphic Signature Scheme.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close.
IEEE Trans. Mob. Comput., 2018

HB+DB: Distance bounding meets human based authentication.
Future Gener. Comput. Syst., 2018

Matrioska: A Compiler for Multi-key Homomorphic Signatures.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

\mathsf HIKE : Walking the Privacy Trail.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Privacy-preserving biometric authentication: challenges and directions.
IACR Cryptol. ePrint Arch., 2017

Multi-Hop Distance Estimation: How Far are You?
IACR Cryptol. ePrint Arch., 2017

Anonymous Single-Round Server-Aided Verification.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Multi-key Homomorphic Authenticators.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.
IEEE Commun. Lett., 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
On the Leakage of Information in Biometric Authentication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014


  Loading...