Elizabeth A. Quaglia

Orcid: 0000-0002-4010-773X

According to our database1, Elizabeth A. Quaglia authored at least 36 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: Delay-based Cryptography.
IACR Cryptol. ePrint Arch., 2023

Applications of Timed-release Encryption with Implicit Authentication.
IACR Cryptol. ePrint Arch., 2023

On the Incoercibility of Digital Signatures.
IACR Cryptol. ePrint Arch., 2023

SoK: Anonymous Credentials.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

CLUE: Certificateless Updatable Encryption.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Dynamic Multi-server Updatable Encryption.
Proceedings of the Information Security - 26th International Conference, 2023

2022
Improving the Efficiency of Report and Trace Ring Signatures.
IACR Cryptol. ePrint Arch., 2022

Subverting Deniability.
IACR Cryptol. ePrint Arch., 2022

Epoch Confidentiality in Updatable Encryption.
Proceedings of the Provable and Practical Security, 2022

TIDE: A Novel Approach to Constructing Timed-Release Encryption.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Practical Verifiable Delay Function and Delay Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Report and Trace Ring Signatures.
IACR Cryptol. ePrint Arch., 2021

Collaborative Verifiable Delay Functions.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2020

Anonymity and Rewards in Peer Rating Systems.
IACR Cryptol. ePrint Arch., 2020

Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting.
IACR Cryptol. ePrint Arch., 2020

2019
A New Approach to Modelling Centralised Reputation Systems.
IACR Cryptol. ePrint Arch., 2019

A critique of game-based definitions of receipt-freeness for voting.
IACR Cryptol. ePrint Arch., 2019

An Overview of GSMA's M2M Remote Provisioning Specification.
CoRR, 2019

You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Secret, verifiable auctions from elections.
Theor. Comput. Sci., 2018

Authentication with weaker trust assumptions for voting systems.
IACR Cryptol. ePrint Arch., 2018

InfoSec Cinema: Using Films for Information Security Teaching.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Conquering Generals: an NP-Hard Proof of Useful Work.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

Attacks Against GSMA's M2M Remote Provisioning (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

2017
A short introduction to secrecy and verifiability for elections.
CoRR, 2017

Increasing the Security of Wireless Communication through Relaying and Interference Generation.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

CryptoCache: Network caching with confidentiality.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Geo-specific encryption through implicitly authenticated location for 5G wireless systems.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

2015
Constructing secret, verifiable auction schemes from election schemes.
IACR Cryptol. ePrint Arch., 2015

2014
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Signal-flow-based analysis of wireless security protocols.
Inf. Comput., 2013

2012
Robust Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2012

Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Anonymous Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2011

2010
Time-Specific Encryption.
IACR Cryptol. ePrint Arch., 2010


  Loading...