Vincenzo Iovino

Orcid: 0000-0002-5006-0816

Affiliations:
  • University of Luxembourg


According to our database1, Vincenzo Iovino authored at least 40 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations.
IEEE Internet Comput., 2023

The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations.
Proceedings of the Fifth Distributed Ledger Technology Workshop (DLT 2023), 2023

Multi-input Non-interactive Functional Encryption: Constructions and Applications.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Towards Data Redaction in Bitcoin.
IEEE Trans. Netw. Serv. Manag., December, 2022

COVID-19 and cybersecurity.
IET Inf. Secur., 2022

2021
On the Effectiveness of Time Travel to Inject COVID-19 Alerts.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
"The simplest protocol for oblivious transfer" revisited.
Inf. Process. Lett., 2020

Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.
IACR Cryptol. ePrint Arch., 2020

Verifiable Inner Product Encryption Scheme.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation.
IACR Cryptol. ePrint Arch., 2019

Non-interactive Zero Knowledge Proofs in the Random Oracle Model.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Receiver- and sender-deniable functional encryption.
IET Inf. Secur., 2018

2017
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

On the Relation Between SIM and IND-RoR Security Models for PAKEs.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Mergeable Functional Encryption.
Proceedings of the Provable Security, 2017

On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017

Controlled Homomorphic Encryption: Definition and Construction.
Proceedings of the Financial Cryptography and Data Security, 2017

Tightly-Secure PAK(E).
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptol. ePrint Arch., 2016

Deniable Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Updatable Functional Encryption.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
Proceedings of the Financial Cryptography and Data Security, 2016

On the Possibility of Non-interactive E-Voting in the Public-Key Setting.
Proceedings of the Financial Cryptography and Data Security, 2016

On the Power of Public-key Function-Private Functional Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
On the Power of Public-key Functional Encryption with Function Privacy.
IACR Cryptol. ePrint Arch., 2015

Simulation-Based Secure Functional Encryption in the Random Oracle Model.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2013
On the Power of Rewinding Simulators in Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

On the Achievability of Simulation-Based Security for Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Fully Secure Hidden Vector Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
Hidden Vector Encryption Fully Secure Against Unrestricted Queries.
IACR Cryptol. ePrint Arch., 2011

Secure and Policy-Private Resource Sharing in an Online Social Network.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

jPBC: Java pairing based cryptography.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
IACR Cryptol. ePrint Arch., 2010

Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Predicate Encryption with Partial Public Keys.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

Private-Key Hidden Vector Encryption with Key Confidentiality.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Hidden-Vector Encryption with Groups of Prime Order.
Proceedings of the Pairing-Based Cryptography, 2008


  Loading...