Foteini Baldimtsi

Orcid: 0000-0003-3296-5336

Affiliations:
  • George Mason University, Fairfax, VA, USA


According to our database1, Foteini Baldimtsi authored at least 63 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Secure Showing of Partial Attributes.
IACR Cryptol. ePrint Arch., 2025

Non-interactive Anonymous Tokens with Private Metadata Bit.
IACR Cryptol. ePrint Arch., 2025

Batched & Non-interactive Blind Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2025

Post-Quantum Readiness in EdDSA Chains.
IACR Cryptol. ePrint Arch., 2025

A study on Gas Optimization and Performance Evaluation of Sui and Aptos blockchains.
Proceedings of the 7th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, 2025

An Analytical Performance Evaluation on Sui Move Object-Centric Models.
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025

2024
SoK: Privacy-Preserving Transactions in Blockchains.
IACR Cryptol. ePrint Arch., 2024

Non-interactive Blind Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2024

Universal Vector Commitments.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Oblivious Accumulators.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Subset-Optimized BLS Multi-signature with Key Aggregation.
Proceedings of the Financial Cryptography and Data Security, 2024

Truncator: Time-Space Tradeoff of Cryptographic Primitives.
Proceedings of the Financial Cryptography and Data Security, 2024

Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based Blockchains.
Proceedings of the Computer Security - ESORICS 2024, 2024

Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Blind Multisignatures for Anonymous Tokens with Decentralized Issuance.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Non-Interactive Blind Signatures: Post-Quantum and Stronger Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

SoK: Zero-Knowledge Range Proofs.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Subset-optimized BLS Multi-signature with Key Aggregation.
IACR Cryptol. ePrint Arch., 2023

2022
(∈, δ)-Indistinguishable Mixing for Cryptocurrencies.
Proc. Priv. Enhancing Technol., 2022

gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2022

Diversification across mining pools: optimal mining strategies under PoW.
J. Cybersecur., 2022

Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

SoK: Blockchain Light Clients.
Proceedings of the Financial Cryptography and Data Security, 2022

Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures.
IET Inf. Secur., 2021

(ε, δ)-indistinguishable Mixing for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2021

Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

Measuring Illicit Activity in DeFi: The Case of Ethereum.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments.
Proceedings of the Computer Security - ESORICS 2021, 2021

Anonymous Sidechains.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Efficient Constructions of Pairing Based Accumulators.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

SoK: Auditability and Accountability in Distributed Payment Systems.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Universally Composable Accumulators.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Anonymous Lottery In The Proof-of-Stake Setting.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Leakage-Resilient Lattice-Based Partially Blind Signatures.
IACR Cryptol. ePrint Arch., 2019

Efficient Noninteractive Certification of RSA Moduli and Beyond.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Certifying RSA Public Keys with an Efficient NIZK.
IACR Cryptol. ePrint Arch., 2018

Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152).
Dagstuhl Reports, 2018

2017
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Watermarking Public-Key Cryptographic Functionalities and Implementations.
Proceedings of the Information Security - 20th International Conference, 2017

Advancing Open Science with Version Control and Blockchains.
Proceedings of the 12th IEEE/ACM International Workshop on Software Engineering for Science, 2017

Accumulators with Applications to Anonymity-Preserving Revocation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Server-Aided Secure Computation with Off-line Parties.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments.
IACR Cryptol. ePrint Arch., 2016

Secure Computation in Online Social Networks.
IACR Cryptol. ePrint Arch., 2016

Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions.
Proceedings of the Financial Cryptography and Data Security, 2016

Indistinguishable Proofs of Work or Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport.
ACM Trans. Inf. Syst. Secur., 2015

Anonymous Transferable E-Cash.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Sorting and Searching Behind the Curtain.
Proceedings of the Financial Cryptography and Data Security, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Efficient Cryptography for Information Privacy.
PhD thesis, 2014

Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

2013
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.
Proceedings of the Financial Cryptography and Data Security, 2013

Anonymous credentials light.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

On the Security of One-Witness Blind Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2010
Attacks on the AKACP Protocol.
IACR Cryptol. ePrint Arch., 2010

2008
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007


  Loading...