default search action
Vincenzo Iovino
Person information
- affiliation: University of Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti:
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations. IEEE Internet Comput. 27(2): 13-19 (2023) - [c28]Grigor Artem, Vincenzo Iovino, Razvan Rosie:
Multi-input Non-interactive Functional Encryption: Constructions and Applications. C2SI 2023: 158-177 - [c27]Vincenzo Iovino, Artem Grigor, Giuseppe Visconti:
The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations. DLT 2023 - [i27]Vincenzo Botta, Vincenzo Iovino, Ivan Visconti:
Towards Data Redaction in Bitcoin. CoRR abs/2305.10075 (2023) - [i26]Artem Grigor, Vincenzo Iovino, Giuseppe Visconti:
The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations. IACR Cryptol. ePrint Arch. 2023: 741 (2023) - 2022
- [j6]Roberto Di Pietro, Ni Trieu, Vincenzo Iovino:
COVID-19 and cybersecurity. IET Inf. Secur. 16(5): 321-323 (2022) - [j5]Vincenzo Botta, Vincenzo Iovino, Ivan Visconti:
Towards Data Redaction in Bitcoin. IEEE Trans. Netw. Serv. Manag. 19(4): 3872-3883 (2022) - 2021
- [c26]Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux:
On the Effectiveness of Time Travel to Inject COVID-19 Alerts. CT-RSA 2021: 422-443 - 2020
- [j4]Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial:
"The simplest protocol for oblivious transfer" revisited. Inf. Process. Lett. 161: 105975 (2020) - [c25]Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Universal Unconditional Verifiability in E-Voting without Trusted Parties. CSF 2020: 33-48 - [c24]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. Public Key Cryptography (1) 2020: 65-94 - [i25]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 122 (2020) - [i24]Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti:
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. IACR Cryptol. ePrint Arch. 2020: 493 (2020) - [i23]Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux:
On the Effectiveness of Time Travel to Inject COVID-19 Alerts. IACR Cryptol. ePrint Arch. 2020: 1393 (2020)
2010 – 2019
- 2019
- [c23]Vincenzo Iovino, Ivan Visconti:
Non-interactive Zero Knowledge Proofs in the Random Oracle Model. C2SI 2019: 118-141 - [i22]Vincenzo Iovino:
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation. IACR Cryptol. ePrint Arch. 2019: 745 (2019) - [i21]Vincenzo Iovino, Ivan Visconti:
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2019: 952 (2019) - 2018
- [j3]Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Receiver- and sender-deniable functional encryption. IET Inf. Secur. 12(3): 207-216 (2018) - [j2]Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
Power of public-key function-private functional encryption. IET Inf. Secur. 12(4): 248-256 (2018) - 2017
- [j1]Angelo De Caro, Vincenzo Iovino:
On the power of rewinding simulators in functional encryption. Des. Codes Cryptogr. 84(3): 373-399 (2017) - [c22]José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot:
Tightly-Secure PAK(E). CANS 2017: 27-48 - [c21]Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. Financial Cryptography Workshops 2017: 107-129 - [c20]Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Using Selene to Verify Your Vote in JCJ. Financial Cryptography Workshops 2017: 385-403 - [c19]José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot:
On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy. ICETE (Selected Papers) 2017: 173-198 - [c18]Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. ProvSec 2017: 434-451 - [c17]Rosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini:
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol. SECRYPT 2017: 139-150 - [c16]José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot:
On the Relation Between SIM and IND-RoR Security Models for PAKEs. SECRYPT 2017: 151-162 - [i20]Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial:
"The Simplest Protocol for Oblivious Transfer" Revisited. IACR Cryptol. ePrint Arch. 2017: 370 (2017) - [i19]José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot:
On the Relation Between SIM and IND-RoR Security Models for PAKEs. IACR Cryptol. ePrint Arch. 2017: 470 (2017) - [i18]José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot:
Tightly-Secure PAK(E). IACR Cryptol. ePrint Arch. 2017: 1045 (2017) - 2016
- [c15]Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Function-Private Functional Encryption. CANS 2016: 585-593 - [c14]Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Financial Cryptography Workshops 2016: 176-192 - [c13]Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne:
On the Possibility of Non-interactive E-Voting in the Public-Key Setting. Financial Cryptography Workshops 2016: 193-208 - [c12]Afonso Arriaga, Vincenzo Iovino, Qiang Tang:
Updatable Functional Encryption. Mycrypt 2016: 347-363 - [c11]Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Deniable Functional Encryption. Public Key Cryptography (1) 2016: 196-222 - [i17]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. CoRR abs/1610.06343 (2016) - [i16]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. IACR Cryptol. ePrint Arch. 2016: 975 (2016) - [i15]Afonso Arriaga, Vincenzo Iovino, Qiang Tang:
Updatable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 1179 (2016) - 2015
- [c10]Vincenzo Iovino, Karol Zebrowski:
Simulation-Based Secure Functional Encryption in the Random Oracle Model. LATINCRYPT 2015: 21-39 - [i14]Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 103 (2015) - [i13]Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Functional Encryption with Function Privacy. IACR Cryptol. ePrint Arch. 2015: 470 (2015) - [i12]Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. IACR Cryptol. ePrint Arch. 2015: 1105 (2015) - [i11]Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne:
On the Possibility of Non-Interactive E-Voting in the Public-key Setting. IACR Cryptol. ePrint Arch. 2015: 1119 (2015) - [i10]Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Deniable Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 1205 (2015) - 2014
- [i9]Vincenzo Iovino, Karol Zebrowski:
Simulation-Based Secure Functional Encryption in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2014: 810 (2014) - [i8]Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. IACR Cryptol. ePrint Arch. 2014: 989 (2014) - 2013
- [c9]Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. CRYPTO (2) 2013: 519-535 - [i7]Stefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta:
Secure and Policy-Private Resource Sharing in an Online Social Network. CoRR abs/1307.2756 (2013) - [i6]Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 364 (2013) - [i5]Angelo De Caro, Vincenzo Iovino:
On the Power of Rewinding Simulators in Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 752 (2013) - 2012
- [c8]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Hidden Vector Encryption. Pairing 2012: 102-121 - 2011
- [c7]Angelo De Caro, Vincenzo Iovino:
jPBC: Java pairing based cryptography. ISCC 2011: 850-855 - [c6]Stefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta:
Secure and Policy-Private Resource Sharing in an Online Social Network. SocialCom/PASSAT 2011: 872-875 - [i4]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Hidden Vector Encryption Fully Secure Against Unrestricted Queries. IACR Cryptol. ePrint Arch. 2011: 546 (2011) - 2010
- [c5]Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano:
Predicate Encryption with Partial Public Keys. CANS 2010: 298-313 - [c4]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. Pairing 2010: 347-366 - [i3]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. IACR Cryptol. ePrint Arch. 2010: 197 (2010) - [i2]Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano:
Predicate Encryption with Partial Public Keys. IACR Cryptol. ePrint Arch. 2010: 476 (2010) - [i1]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae. IACR Cryptol. ePrint Arch. 2010: 492 (2010)
2000 – 2009
- 2009
- [c3]Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano:
Private-Key Hidden Vector Encryption with Key Confidentiality. CANS 2009: 259-277 - [c2]Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano:
Private-Key Hidden Vector Encryption with Key Privacy. ICTCS 2009: 46-50 - 2008
- [c1]Vincenzo Iovino, Giuseppe Persiano:
Hidden-Vector Encryption with Groups of Prime Order. Pairing 2008: 75-88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint