Vincenzo Iovino
Vincenzo Iovino
Verifierad e-postadress på unisa.it
Titel
Citeras av
Citeras av
År
jPBC: Java pairing based cryptography
A De Caro, V Iovino
2011 IEEE symposium on computers and communications (ISCC), 850-855, 2011
3862011
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 75-88, 2008
1042008
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Annual Cryptology Conference, 519-535, 2013
892013
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 347-366, 2010
732010
Selene: Voting with transparent verifiability and coercion-mitigation
PYA Ryan, PB Rønne, V Iovino
International Conference on Financial Cryptography and Data Security, 176-192, 2016
592016
Private-key hidden vector encryption with key confidentiality
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 259-277, 2009
432009
Java pairing-based cryptography library
AD Caro, V Iovino
262013
Fully secure hidden vector encryption
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 102-121, 2012
26*2012
Predicate encryption with partial public keys
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 298-313, 2010
242010
On the Power of Rewinding Simulators in Functional Encryption
A De Caro, V Iovino
Design, Codes and Cryptography, 2016
162016
Pairing-Based Cryptography–Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings
S Galbraith, K Paterson
Springer, 2008
162008
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.
G Avitabile, V Botta, V Iovino, I Visconti
IACR Cryptol. ePrint Arch. 2020, 493, 2020
142020
Simulation-Based Secure Functional Encryption in the Random Oracle Model
V Iovino, K Zebrowski
LATINCRYPT 2015 9320 (LNCS), 21-39, 2015
122015
Secure and policy-private resource sharing in an online social network
S Braghin, V Iovino, G Persiano, A Trombetta
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
102011
Power of public-key function-private functional encryption
V Iovino, Q Tang, K Żebrowski
IET Information Security 12 (4), 248-256, 2017
9*2017
Deniable Functional Encryption
V Iovino, A O'Neill
Public-key Cryptography-PKC 2016, 19th IACR International Conference on …, 2016
8*2016
Controlled homomorphic encryption: definition and construction
Y Desmedt, V Iovino, G Persiano, I Visconti
International Conference on Financial Cryptography and Data Security, 107-129, 2017
72017
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
R Giustolisi, V Iovino, P Rønne
VOTING 2016 9604 (Financial Cryptography and Data Security), 193-208, 2015
72015
On the relation between SIM and IND-RoR security models for PAKEs
JM Lopez Becerra, V Iovino, D Ostrev, M Skrobot
Proceedings of the International Conference on Security and Cryptography, 12, 2017
62017
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
A De Caro, V Iovino, G Persiano
IACR Cryptol. ePrint Arch. 2010, 492, 2010
6*2010
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20