Rafael Dowsley

Orcid: 0000-0002-7588-2410

According to our database1, Rafael Dowsley authored at least 78 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

An End-to-End Framework for Private DGA Detection as a Service.
IACR Cryptol. ePrint Arch., 2023

SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market.
CoRR, 2023

CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

A Decentralized Information Marketplace Preserving Input and Output Privacy.
Proceedings of the Second ACM Data Economy Workshop, 2023

2022
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-preserving training of tree ensembles over continuous data.
Proc. Priv. Enhancing Technol., 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

Training Differentially Private Models with Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

A Spendable Cold Wallet from QR Video.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge.
Proceedings of the Provable and Practical Security, 2022

2021
Privacy-Preserving Video Classification with Convolutional Neural Networks.
IACR Cryptol. ePrint Arch., 2021

Privacy-Preserving Feature Selection with Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2021

Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
IACR Cryptol. ePrint Arch., 2021

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels.
IEEE Access, 2021

TARDIS: A Foundation of Time-Lock Puzzles in UC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

On the Shutdown Price of Blockchain Mining Machines.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
On the Commitment Capacity of Unfair Noisy Channels.
IEEE Trans. Inf. Theory, 2020

Analysing Mining Machine Shutdown Price.
IACR Cryptol. ePrint Arch., 2020

Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model.
IACR Cryptol. ePrint Arch., 2020

High Performance Logistic Regression for Privacy-Preserving Genome Analysis.
IACR Cryptol. ePrint Arch., 2020

CRAFT: Composable Randomness and Almost Fairness from Time.
IACR Cryptol. ePrint Arch., 2020

TARDIS: Time And Relative Delays In Simulation.
IACR Cryptol. ePrint Arch., 2020

A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2020

On the Composability of Statistically Secure Random Oblivious Transfer.
Entropy, 2020

Private Speech Characterization with Secure Multiparty Computation.
CoRR, 2020

Insured MPC: Efficient Secure Computation with Financial Penalties.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation.
IEEE Trans. Dependable Secur. Comput., 2019

On the Impossibility of Structure-Preserving Deterministic Primitives.
J. Cryptol., 2019

Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection.
IACR Cryptol. ePrint Arch., 2019

Protecting Privacy of Users in Brain-Computer Interface Applications.
CoRR, 2019

Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

2018
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors.
IEEE Trans. Inf. Theory, 2018

21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State.
IACR Cryptol. ePrint Arch., 2018

ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement.
IACR Cryptol. ePrint Arch., 2018

Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
IACR Cryptol. ePrint Arch., 2018

Insured MPC: Efficient Secure Multiparty Computation with Punishable Abort.
IACR Cryptol. ePrint Arch., 2018

VirtualIdentity: Privacy-Preserving User Profiling.
CoRR, 2018

MARS: Monetized Ad-hoc Routing System (A Position Paper).
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Privacy-Preserving User Profiling with Facebook Likes.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Privacy-Preserving Linear Regression for Brain-Computer Interface Applications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability.
IEEE Trans. Inf. Theory, 2017

Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement.
IACR Cryptol. ePrint Arch., 2017

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017

A survey on design and implementation of protected searchable data in the cloud.
Comput. Sci. Rev., 2017

2016
Cryptography Based on Correlated Data: Foundations and Practice.
PhD thesis, 2016

Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
IEEE Trans. Inf. Forensics Secur., 2016

Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation.
IACR Cryptol. ePrint Arch., 2016

A Database Adapter for Secure Outsourcing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Distributed Key Management Approach.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens.
IACR Cryptol. ePrint Arch., 2015

Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015

Towards Trusted eHealth Services in the Cloud.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.
Proceedings of the Provable Security, 2015

Digital Signatures from Strong RSA without Prime Generation.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2014

How Secure is Deterministic Encryption?
IACR Cryptol. ePrint Arch., 2014

Oblivious transfer in the bounded storage model with errors.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Universally Composable Oblivious Transfer Based on a Variant of LPN.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2012
A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Inf. Theory, 2012

Oblivious Transfer Based on the McEliece Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Inf. Theory, 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Standard Security Does Not Imply Security Against Selective-Opening.
IACR Cryptol. ePrint Arch., 2011

Do you know where your cloud files are?
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product.
IACR Cryptol. ePrint Arch., 2010

Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2009

2008
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
IACR Cryptol. ePrint Arch., 2008

On the Composability of Statistically Secure Bit Commitments.
IACR Cryptol. ePrint Arch., 2008


  Loading...