Giulio Malavolta
Giulio Malavolta
Max Planck Institute for Security and Privacy
Geverifieerd e-mailadres voor csp.mpg.de - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1642017
Anonymous multi-hop locks for blockchain scalability and interoperability
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
Cryptology ePrint Archive, 2018
1192018
Silentwhispers: Enforcing security and privacy in decentralized credit networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
Cryptology ePrint Archive, 2016
982016
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
692015
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
462016
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles
Z Brakerski, N Döttling, S Garg, G Malavolta
Theory of Cryptography Conference, 407-437, 2019
362019
Subvector commitments with application to succinct arguments
RWF Lai, G Malavolta
Annual International Cryptology Conference, 530-560, 2019
342019
Trapdoor hash functions and their applications
N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky
Annual International Cryptology Conference, 3-32, 2019
322019
Homomorphic time-lock puzzles and applications
G Malavolta, SAK Thyagarajan
Annual International Cryptology Conference, 620-649, 2019
312019
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices.
Z Brakerski, N Döttling, S Garg, G Malavolta
IACR Cryptol. ePrint Arch. 2020, 1024, 2020
262020
Candidate iO from homomorphic encryption schemes
Z Brakerski, N Döttling, S Garg, G Malavolta
242020
Efficient ring signatures in the standard model
G Malavolta, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2017
232017
Maliciously secure multi-client oram
M Maffei, G Malavolta, M Reinert, D Schröder
International Conference on Applied Cryptography and Network Security, 645-664, 2017
192017
Statistical zaps and new oblivious transfer protocols
V Goyal, A Jain, Z Jin, G Malavolta
Annual International Conference on the Theory and Applications of …, 2020
182020
Homomorphic secret sharing for low degree polynomials
RWF Lai, G Malavolta, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2018
162018
Tight verifiable delay functions
N Döttling, S Garg, G Malavolta, PN Vasudevan
International Conference on Security and Cryptography for Networks, 65-84, 2020
152020
Succinct arguments for bilinear group arithmetic: Practical structure-preserving cryptography
RWF Lai, G Malavolta, V Ronge
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
122019
Incremental proofs of sequential work
N Döttling, RWF Lai, G Malavolta
Annual International Conference on the Theory and Applications of …, 2019
122019
Post-quantum multi-party computation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
Annual International Conference on the Theory and Applications of …, 2021
112021
Multi-key fully-homomorphic encryption in the plain model
P Ananth, A Jain, Z Jin, G Malavolta
Theory of Cryptography Conference, 28-57, 2020
11*2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20