Giulio Malavolta

Orcid: 0009-0009-9737-0094

Affiliations:
  • Bocconi University, Italy


According to our database1, Giulio Malavolta authored at least 130 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Knowledge Complexity of Quantum Problems.
CoRR, October, 2025

Computational Monogamy of Entanglement and Non-Interactive Quantum Key Distribution.
CoRR, October, 2025

MPC in the Quantum Head (or: Superposition-Secure (Quantum) Zero-Knowledge).
CoRR, June, 2025

How to Verify that a Small Device is Quantum, Unconditionally.
IACR Cryptol. ePrint Arch., 2025

Fully-Homomorphic Encryption from Lattice Isomorphism.
IACR Cryptol. ePrint Arch., 2025

Threshold Signatures from One-Way Functions.
IACR Cryptol. ePrint Arch., 2025

Trapdoor Hash Functions and PIR from Low-Noise LPN.
IACR Cryptol. ePrint Arch., 2025

Unconditional Quantum Cryptography with a Bounded Number of Keys.
IACR Commun. Cryptol., 2025

Permutation Superposition Oracles for Quantum Query Lower Bounds.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

A Bound on the Quantum Value of All Compiled Nonlocal Games.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Papercraft: Lattice-Based Verifiable Delay Function Implemented.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Registration-Based Encryption in the Plain Model.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Black-Box Non-interactive Zero Knowledge from Vector Trapdoor Hash.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Simple and General Counterexamples for Private-Coin Evasive LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Pseudorandom Obfuscation and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Compiled Nonlocal Games from any Trapdoor Claw-Free Function.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors.
J. Cryptol., September, 2024

A Computational Tsirelson's Theorem for the Value of Compiled XOR Games.
IACR Cryptol. ePrint Arch., 2024

On Quantum Simulation-Soundness.
IACR Commun. Cryptol., 2024

SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange.
Proceedings of the 33rd USENIX Security Symposium, 2024

Key-Homomorphic and Aggregate Verifiable Random Functions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Unclonable Commitments and Proofs.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Exponential Quantum One-Wayness and EFI Pairs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Time-Lock Puzzles with Efficient Batch Solving.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Software with Certified Deletion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Polynomial Commitments from Lattices: Post-quantum Security, Fast Verification and Transparent Setup.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Time-Lock Puzzles from Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Traitor Tracing Without Trusted Authority from Registered Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Non-Interactive Quantum Key Distribution.
IACR Cryptol. ePrint Arch., 2023

Swoosh: Practical Lattice-Based Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2023

Doubly Efficient Batched Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2023

Lattice-based Succinct Arguments from Vanishing Polynomials.
IACR Cryptol. ePrint Arch., 2023

Obfuscation and Outsourced Computation with Certified Deletion.
IACR Cryptol. ePrint Arch., 2023

A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions.
IACR Cryptol. ePrint Arch., 2023

Weakening Assumptions for Publicly-Verifiable Deletion.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Public-Key Encryption with Quantum Keys.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Laconic Function Evaluation for Turing Machines.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Cryptographic Oracle-based Conditional Payments.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Multi-key and Multi-input Predicate Encryption from Learning with Errors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Efficient Laconic Cryptography from Learning with Errors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

stoRNA: Stateless Transparent Proofs of Storage-time.
Proceedings of the Computer Security - ESORICS 2023, 2023

Lattice-Based Timed Cryptography.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

On Concurrent Multi-party Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Lattice-Based Succinct Arguments from Vanishing Polynomials - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Efficient Registration-Based Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Distributed Broadcast Encryption from Bilinear Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Weak Zero-Knowledge via the Goldreich-Levin Theorem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Registered (Inner-Product) Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Two-Round Concurrent 2PC from Sub-exponential LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Practical Decentralized Oracle Contracts for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2022

Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable.
IACR Cryptol. ePrint Arch., 2022

Quantum Rewinding for Many-Round Protocols.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Steganography-Free Zero-Knowledge.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Note on the Post-quantum Security of (Ring) Signatures.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Interaction-Preserving Compilers for Secure Computation.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Indistinguishability Obfuscation of Null Quantum Circuits and Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Pre-Constrained Encryption.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Algebraic Restriction Codes and Their Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Factoring and Pairings Are Not Necessary for IO: Circular-Secure LWE Suffices.
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022

Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero.
Proceedings of the Computer Security - ESORICS 2022, 2022

Succinct Classical Verification of Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Foundations of Coin Mixing Services.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Tidy: Symbolic Verification of Timed Cryptographic Protocols.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Sleepy Channels: Bi-directional Payment Channels without Watchtowers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Everlasting UC Commitments from Fully Malicious PUFs.
IACR Cryptol. ePrint Arch., 2021

Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA.
IACR Cryptol. ePrint Arch., 2021

Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers.
IACR Cryptol. ePrint Arch., 2021

The Round Complexity of Quantum Zero-Knowledge.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Rate-1 Quantum Fully Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

A Geometric Approach to Homomorphic Secret Sharing.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Cryptocurrencies with Security Policies and Two-Factor Authentication.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Unbounded Multi-party Computation from Learning with Errors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Post-Quantum Multi-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Compact Ring Signatures from Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Efficient CCA Timed Commitments in Class Groups.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

How to Build a Trapdoor Function from an Encryption Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
PayMo: Payment Channels For Monero.
IACR Cryptol. ePrint Arch., 2020

Circuit Privacy for Quantum Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Multikey FHE in the Plain Model.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Multi-Party Computation in Constant Rounds.
CoRR, 2020

Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Multi-key Fully-Homomorphic Encryption in the Plain Model.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Tight Verifiable Delay Functions.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Statistical Zaps and New Oblivious Transfer Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Candidate iO from Homomorphic Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Verifiable Timed Signatures Made Practical.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Combinatorial Approach to Quantum Random Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Multi-client Oblivious RAM with Poly-logarithmic Communication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Minting Mechanism for Proof of Stake Blockchains.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Kryptographische Uhren und Anwendungen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2019., 2019

Cryptographic Clocks and Applications.
PhD thesis, 2019

My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data.
Proc. Priv. Enhancing Technol., 2019

Group ORAM for privacy and access control in outsourced personal records.
J. Comput. Secur., 2019

Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Efficient Invisible and Unlinkable Sanitizable Signatures.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Laconic Conditional Disclosure of Secrets and Applications.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

Incremental Proofs of Sequential Work.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Arithmetic Garbling from Bilinear Maps.
Proceedings of the Computer Security - ESORICS 2019, 2019

Homomorphic Time-Lock Puzzles and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Subvector Commitments with Application to Succinct Arguments.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Trapdoor Hash Functions and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Functional Credentials.
Proc. Priv. Enhancing Technol., 2018

Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2018

Optimal Succinct Arguments via Hidden Order Groups.
IACR Cryptol. ePrint Arch., 2018

Minting Mechanisms for Blockchain - or - Moving from Cryptoassets to Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

Homomorphic Secret Sharing for Low Degree Polynomials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Switch Commitments: A Safety Switch for Confidential Transactions.
Proceedings of the Financial Cryptography and Data Security, 2017

Concurrency and Privacy with Payment-Channel Networks.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Subset Predicate Encryption and Its Applications.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Efficient Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Maliciously Secure Multi-Client ORAM.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015

Privacy and Access Control for Outsourced Personal Records.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Brief announcement: towards security and privacy for outsourced data in the multi-party setting.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014


  Loading...