Concurrency and privacy with payment-channel networks G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 264 | 2017 |
Anonymous multi-hop locks for blockchain scalability and interoperability G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei Cryptology ePrint Archive, 2018 | 226 | 2018 |
Silentwhispers: Enforcing security and privacy in decentralized credit networks G Malavolta, P Moreno-Sanchez, A Kate, M Maffei Cryptology ePrint Archive, 2016 | 158 | 2016 |
Privacy and access control for outsourced personal records M Maffei, G Malavolta, M Reinert, D Schröder 2015 IEEE Symposium on Security and Privacy, 341-358, 2015 | 86 | 2015 |
Subvector commitments with application to succinct arguments RWF Lai, G Malavolta Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 84 | 2019 |
Trapdoor hash functions and their applications N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 83 | 2019 |
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles Z Brakerski, N Döttling, S Garg, G Malavolta Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019 | 71 | 2019 |
Homomorphic time-lock puzzles and applications G Malavolta, SAK Thyagarajan Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 70 | 2019 |
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ... Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 63 | 2016 |
Factoring and pairings are not necessary for io: Circular-secure lwe suffices Z Brakerski, N Döttling, S Garg, G Malavolta Cryptology ePrint Archive, 2020 | 56 | 2020 |
Candidate iO from homomorphic encryption schemes Z Brakerski, N Döttling, S Garg, G Malavolta Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 55 | 2020 |
Multi-key fully-homomorphic encryption in the plain model P Ananth, A Jain, Z Jin, G Malavolta Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 41 | 2020 |
Statistical zaps and new oblivious transfer protocols V Goyal, A Jain, Z Jin, G Malavolta Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 34 | 2020 |
Maliciously secure multi-client ORAM M Maffei, G Malavolta, M Reinert, D Schröder Applied Cryptography and Network Security: 15th International Conference …, 2017 | 31 | 2017 |
Efficient ring signatures in the standard model G Malavolta, D Schröder Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017 | 30 | 2017 |
Verifiable timed signatures made practical SAK Thyagarajan, A Bhat, G Malavolta, N Döttling, A Kate, D Schröder Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 29 | 2020 |
Tight verifiable delay functions N Döttling, S Garg, G Malavolta, PN Vasudevan Security and Cryptography for Networks: 12th International Conference, SCN …, 2020 | 28 | 2020 |
Succinct arguments for bilinear group arithmetic: practical structure-preserving cryptography RWF Lai, G Malavolta, V Ronge Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 27 | 2019 |
Universal atomic swaps: Secure exchange of coins across all blockchains SAK Thyagarajan, G Malavolta, P Moreno-Sanchez 2022 IEEE Symposium on Security and Privacy (SP), 1299-1316, 2022 | 26 | 2022 |
Post-quantum multi-party computation A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 23 | 2021 |