Vincenzo Iovino

Orcid: 0000-0002-5006-0816

Affiliations:
  • University of Luxembourg


According to our database1, Vincenzo Iovino authored at least 40 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations.
IEEE Internet Comput., 2023

The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations.
IACR Cryptol. ePrint Arch., 2023

Multi-input Non-interactive Functional Encryption: Constructions and Applications.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Towards Data Redaction in Bitcoin.
IEEE Trans. Netw. Serv. Manag., December, 2022

COVID-19 and cybersecurity.
IET Inf. Secur., 2022

2020
"The simplest protocol for oblivious transfer" revisited.
Inf. Process. Lett., 2020

Verifiable Inner Product Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

On the Effectiveness of Time Travel to Inject COVID-19 Alerts.
IACR Cryptol. ePrint Arch., 2020

Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.
IACR Cryptol. ePrint Arch., 2020

Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2019

Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation.
IACR Cryptol. ePrint Arch., 2019

2018
Power of public-key function-private functional encryption.
IET Inf. Secur., 2018

Receiver- and sender-deniable functional encryption.
IET Inf. Secur., 2018

2017
Tightly-Secure PAK(E).
IACR Cryptol. ePrint Arch., 2017

On the Relation Between SIM and IND-RoR Security Models for PAKEs.
IACR Cryptol. ePrint Arch., 2017

On the power of rewinding simulators in functional encryption.
Des. Codes Cryptogr., 2017

Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptol. ePrint Arch., 2016

Updatable Functional Encryption.
IACR Cryptol. ePrint Arch., 2016

2015
Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
IACR Cryptol. ePrint Arch., 2015

Mergeable Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

On the Power of Public-key Functional Encryption with Function Privacy.
IACR Cryptol. ePrint Arch., 2015

On the Possibility of Non-Interactive E-Voting in the Public-key Setting.
IACR Cryptol. ePrint Arch., 2015

Deniable Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

2014
Simulation-Based Secure Functional Encryption in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2014

Controlled Homomorphic Encryption: Definition and Construction.
IACR Cryptol. ePrint Arch., 2014

2013
On the Achievability of Simulation-Based Security for Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

2012
Fully Secure Hidden Vector Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
Hidden Vector Encryption Fully Secure Against Unrestricted Queries.
IACR Cryptol. ePrint Arch., 2011

Secure and Policy-Private Resource Sharing in an Online Social Network.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

jPBC: Java pairing based cryptography.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
IACR Cryptol. ePrint Arch., 2010

Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts.
IACR Cryptol. ePrint Arch., 2010

Predicate Encryption with Partial Public Keys.
IACR Cryptol. ePrint Arch., 2010

2009
Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

Private-Key Hidden Vector Encryption with Key Confidentiality.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Hidden-Vector Encryption with Groups of Prime Order.
Proceedings of the Pairing-Based Cryptography, 2008


  Loading...