Follow
Giuseppe Persiano
Title
Cited by
Cited by
Year
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
43762004
Noninteractive zero-knowledge
M Blum, A De Santis, S Micali, G Persiano
SIAM Journal on Computing 20 (6), 1084-1118, 1991
6031991
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
3862001
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2972001
Zero-knowledge proofs of knowledge without interaction
A De Santis, G Persiano
Proceedings., 33rd Annual Symposium on Foundations of Computer Science, 427-436, 1992
2301992
Non-interactive zero-knowledge proof systems
A De Santis, S Micali, G Persiano
Advances in Cryptology—CRYPTO’87: Proceedings 7, 52-72, 1988
1981988
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
1851994
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1272019
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008
1232008
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1142013
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
1062018
A linear-time algorithm for the feasibility of pebble motion on trees
V Auletta, A Monti, M Parente, P Persiano
Algorithmica 23 (3), 223-245, 1999
1001999
Optimal wavelength routing on directed fiber trees
T Erlebach, K Jansen, C Kaklamanis, M Mihail, P Persiano
Theoretical Computer Science 221 (1-2), 119-137, 1999
931999
Constrained bipartite edge coloring with applications to wavelength routing
C Kaklamanis, P Persiano, T Erlebach, K Jansen
Automata, Languages and Programming: 24th International Colloquium, ICALP'97 …, 1997
901997
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
A De Caro, V Iovino, G Persiano
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
882010
Non-interactive zero-knowledge with preprocessing
A De Santis, S Micali, G Persiano
Advances in Cryptology—CRYPTO’88: Proceedings 8, 269-282, 1990
831990
Deterministic truthful approximation mechanisms for scheduling related machines
V Auletta, R De Prisco, P Penna, G Persiano
STACS 2004: 21st Annual Symposium on Theoretical Aspects of Computer Science …, 2004
812004
Private stateful information retrieval
S Patel, G Persiano, K Yeo
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
742018
Branch-and-bound and backtrack search on mesh-connected arrays of processors
C Kaklamanis, G Persiano
Proceedings of the Fourth Annual ACM Symposium on Parallel Algorithms and …, 1992
721992
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
G Di Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
692004
The system can't perform the operation now. Try again later.
Articles 1–20