Giulio Malavolta

Orcid: 0009-0009-9737-0094

According to our database1, Giulio Malavolta authored at least 104 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lattice-Based Timed Cryptography.
IACR Cryptol. ePrint Arch., 2024

A Computational Tsirelson's Theorem for the Value of Compiled XOR Games.
IACR Cryptol. ePrint Arch., 2024

Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup.
IACR Cryptol. ePrint Arch., 2024

Traitor Tracing without Trusted Authority from Registered Functional Encryption.
IACR Cryptol. ePrint Arch., 2024

Software with Certified Deletion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Algebraic Restriction Codes and Their Applications.
Algorithmica, December, 2023

Candidate iO from Homomorphic Encryption Schemes.
J. Cryptol., July, 2023

stoRNA: Stateless Transparent Proofs of Storage-time.
IACR Cryptol. ePrint Arch., 2023

Non-Interactive Quantum Key Distribution.
IACR Cryptol. ePrint Arch., 2023

Distributed Broadcast Encryption from Bilinear Groups.
IACR Cryptol. ePrint Arch., 2023

Unclonable Commitments and Proofs.
IACR Cryptol. ePrint Arch., 2023

On Concurrent Multi-Party Quantum Computation.
IACR Cryptol. ePrint Arch., 2023

Swoosh: Practical Lattice-Based Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2023

Registered (Inner-Product) Functional Encryption.
IACR Cryptol. ePrint Arch., 2023

Time-Lock Puzzles with Efficient Batch Solving.
IACR Cryptol. ePrint Arch., 2023

Efficient Laconic Cryptography from Learning With Errors.
IACR Cryptol. ePrint Arch., 2023

Laconic Function Evaluation for Turing Machines.
IACR Cryptol. ePrint Arch., 2023

Doubly Efficient Batched Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2023

Lattice-based Succinct Arguments from Vanishing Polynomials.
IACR Cryptol. ePrint Arch., 2023

Weakening Assumptions for Publicly-Verifiable Deletion.
IACR Cryptol. ePrint Arch., 2023

Obfuscation and Outsourced Computation with Certified Deletion.
IACR Cryptol. ePrint Arch., 2023

A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions.
IACR Cryptol. ePrint Arch., 2023

Public-Key Encryption with Quantum Keys.
IACR Cryptol. ePrint Arch., 2023

On Quantum Simulation-Soundness.
IACR Cryptol. ePrint Arch., 2023

Cryptographic Oracle-based Conditional Payments.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Lattice-Based Succinct Arguments from Vanishing Polynomials - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Weak Zero-Knowledge via the Goldreich-Levin Theorem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Everlasting UC Commitments from Fully Malicious PUFs.
J. Cryptol., 2022

Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus.
IACR Cryptol. ePrint Arch., 2022

Practical Decentralized Oracle Contracts for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2022

Quantum Rewinding for Many-Round Protocols.
IACR Cryptol. ePrint Arch., 2022

Foundations of Coin Mixing Services.
IACR Cryptol. ePrint Arch., 2022

Efficient Registration-Based Encryption.
IACR Cryptol. ePrint Arch., 2022

Multi-key and Multi-input Predicate Encryption from Learning with Errors.
IACR Cryptol. ePrint Arch., 2022

Succinct Classical Verification of Quantum Computation.
IACR Cryptol. ePrint Arch., 2022

Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable.
IACR Cryptol. ePrint Arch., 2022

Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols.
IACR Cryptol. ePrint Arch., 2022

Steganography-Free Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2022

Two-Round Concurrent 2PC from Sub-Exponential LWE.
IACR Cryptol. ePrint Arch., 2022

Indistinguishability Obfuscation of Null Quantum Circuits and Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Pre-Constrained Encryption.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero.
Proceedings of the Computer Security - ESORICS 2022, 2022

Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Tidy: Symbolic Verification of Timed Cryptographic Protocols.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Sleepy Channels: Bi-directional Payment Channels without Watchtowers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains.
IACR Cryptol. ePrint Arch., 2021

Efficient CCA Timed Commitments in Class Groups.
IACR Cryptol. ePrint Arch., 2021

A Geometric Approach to Homomorphic Secret Sharing.
IACR Cryptol. ePrint Arch., 2021

Interaction-Preserving Compilers for Secure Computation.
IACR Cryptol. ePrint Arch., 2021

Compact Ring Signatures from Learning With Errors.
IACR Cryptol. ePrint Arch., 2021

A Note on the Post-Quantum Security of (Ring) Signatures.
IACR Cryptol. ePrint Arch., 2021

The Round Complexity of Quantum Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2021

Cryptocurrencies with Security Policies and Two-Factor Authentication.
IACR Cryptol. ePrint Arch., 2021

Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA.
IACR Cryptol. ePrint Arch., 2021

Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers.
IACR Cryptol. ePrint Arch., 2021

Unbounded Multi-Party Computation from Learning with Errors.
IACR Cryptol. ePrint Arch., 2021

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
IACR Cryptol. ePrint Arch., 2021

Rate-1 Quantum Fully Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

How to Build a Trapdoor Function from an Encryption Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
PayMo: Payment Channels For Monero.
IACR Cryptol. ePrint Arch., 2020

Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures.
IACR Cryptol. ePrint Arch., 2020

Verifiable Timed Signatures Made Practical.
IACR Cryptol. ePrint Arch., 2020

Circuit Privacy for Quantum Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Statistical Zaps and New Oblivious Transfer Protocols.
IACR Cryptol. ePrint Arch., 2020

A Combinatorial Approach to Quantum Random Functions.
IACR Cryptol. ePrint Arch., 2020

Multi-Client Oblivious RAM with Poly-Logarithmic Communication.
IACR Cryptol. ePrint Arch., 2020

Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices.
IACR Cryptol. ePrint Arch., 2020

Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

Multikey FHE in the Plain Model.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Multi-Party Computation in Constant Rounds.
CoRR, 2020

Multi-key Fully-Homomorphic Encryption in the Plain Model.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Minting Mechanism for Proof of Stake Blockchains.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Kryptographische Uhren und Anwendungen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2019., 2019

Cryptographic Clocks and Applications.
PhD thesis, 2019

My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data.
Proc. Priv. Enhancing Technol., 2019

Group ORAM for privacy and access control in outsourced personal records.
J. Comput. Secur., 2019

Homomorphic Time-Lock Puzzles and Applications.
IACR Cryptol. ePrint Arch., 2019

Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography.
IACR Cryptol. ePrint Arch., 2019

Arithmetic Garbling from Bilinear Maps.
IACR Cryptol. ePrint Arch., 2019

Incremental Proofs of Sequential Work.
IACR Cryptol. ePrint Arch., 2019

Tight Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2019

Trapdoor Hash Functions and Their Applications.
IACR Cryptol. ePrint Arch., 2019

Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2019

Laconic Conditional Disclosure of Secrets and Applications.
IACR Cryptol. ePrint Arch., 2019

Efficient Invisible and Unlinkable Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2019

Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2019

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Subvector Commitments with Application to Succinct Arguments.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Functional Credentials.
Proc. Priv. Enhancing Technol., 2018

Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Inf. Secur., 2018

Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2018

Homomorphic Secret Sharing for Low Degree Polynomials.
IACR Cryptol. ePrint Arch., 2018

Optimal Succinct Arguments via Hidden Order Groups.
IACR Cryptol. ePrint Arch., 2018

Minting Mechanisms for Blockchain - or - Moving from Cryptoassets to Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

2017
Switch Commitments: A Safety Switch for Confidential Transactions.
IACR Cryptol. ePrint Arch., 2017

Concurrency and Privacy with Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2017

Maliciously Secure Multi-Client ORAM.
IACR Cryptol. ePrint Arch., 2017

Subset Predicate Encryption and Its Applications.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Efficient Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
IACR Cryptol. ePrint Arch., 2016

2015
Privacy and Access Control for Outsourced Personal Records.
IACR Cryptol. ePrint Arch., 2015

Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015

2014
Brief announcement: towards security and privacy for outsourced data in the multi-party setting.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014


  Loading...