Filter
Conference contribution

Search results

  • 2023

    Agile cryptography: A universally composable approach

    Badertscher, C., Ciampi, M. & Kiayias, A., 27 Nov 2023, Theory of Cryptography: 21st International Conference. Rothblum, G. & Wee, H. (eds.). 1 ed. Springer, Vol. 14372. p. 480-509 30 p. (Lecture Notes in Computer Science; vol. 14372).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing

    Ciampi, M., Ostrovsky, R., Siniscalchi, L. & Waldner, H., 9 Aug 2023, CRYPTO 2023: 43rd International Cryptology Conference. Springer, Vol. 14081. p. 459-488 (Lecture Notes in Computer Science; vol. 14081).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions.

    Ciampi, M. & Xia, Y., 28 May 2023, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023. Springer, Vol. 13906. p. 555-581 (Lecture Notes in Computer Science; vol. 13906).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2022

    Four-Round Black-Box Non-malleable Schemes from One-Way Permutations

    Ciampi, M., Orsini, E. & Siniscalchi, L., 21 Dec 2022, Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer, p. 300-329 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Efficient NIZK Arguments with Straight-Line Simulation and Extraction

    Ciampi, M. & Visconti, I., 10 Nov 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Collusion-Preserving Computation without a Mediator

    Ciampi, M., Lu, Y. & Zikas, V., 31 Oct 2022, 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 - Proceedings. Institute of Electrical and Electronics Engineers, p. 211-226 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2022-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum

    Andrews, J., Ciampi, M. & Zikas, V., 23 Jun 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer, p. 388-407 20 p. (Lecture Notes in Computer Science; vol. 13301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker

    Ciampi, M., Ishaq, M., Magdon-Ismail, M., Ostrovsky, R. & Zikas, V., 23 Jun 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer, p. 428-446 19 p. (Lecture Notes in Computer Science; vol. 13301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Round-Optimal and Communication-Efficient Multiparty Computation

    Ciampi, M., Ostrovsky, R., Waldner, H. & Zikas, V., 25 May 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 65-95 31 p. (Lecture Notes in Computer Science; vol. 13275).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Round-Optimal Multi-party Computation with Identifiable Abort

    Ciampi, M., Ravi, D., Siniscalchi, L. & Waldner, H., 25 May 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 335-364 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2021

    Oblivious Transfer from Trapdoor Permutations in Minimal Rounds

    Choudhuri, A. R., Ciampi, M., Goyal, V., Jain, A. & Ostrovsky, R., 4 Nov 2021, Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II. Nissim, K. & Waters, B. (eds.). Cham: Springer, p. 518-549 32 p. (Lecture Notes in Computer Science; vol. 13043).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Threshold Garbled Circuits and Ad Hoc Secure Computation

    Ciampi, M., Goyal, V. & Ostrovsky, R., 16 Jun 2021, Advances in Cryptology -- EUROCRYPT 2021. Canteaut, A. & Standaert, F-X. (eds.). Cham: Springer, p. 64-93 30 p. (Lecture Notes in Computer Science; vol. 12698).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Multi-Client Functional Encryption for Separable Functions

    Ciampi, M., Siniscalchi, L. & Waldner, H., 1 May 2021, Public-Key Cryptography -- PKC 2021. Garay, J. A. (ed.). Cham: Springer, p. 724-753 30 p. (Lecture Notes in Computer Science; vol. 12710).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2020

    Round Optimal Secure Multiparty Computation from Minimal Assumptions

    Choudhuri, A. R., Ciampi, M., Goyal, V., Jain, A. & Ostrovsky, R., 9 Dec 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II. Pass, R. & Pietrzak, K. (eds.). Springer, p. 291-319 29 p. (Lecture Notes in Computer Science; vol. 12551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Updatable Blockchains

    Ciampi, M., Karayannidis, N., Kiayias, A. & Zindros, D., 13 Sept 2020, Computer Security - ESORICS 2020. Chen, L., Li, N., Liang, K. & Schneider, S. A. (eds.). Springer, p. 590-609 20 p. (Lecture Notes in Computer Science; vol. 12309).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs

    Ciampi, M., Parisella, R. & Venturi, D., 7 Sept 2020, Security and Cryptography for Networks. SCN 2020. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 670-690 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Timed Signatures and Zero-Knowledge Proofs: Timestamping in the Blockchain Era

    Abadi, A., Ciampi, M., Kiayias, A. & Zikas, V., 27 Aug 2020, Applied Cryptography and Network Security (ACNS 2020): 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I. Springer, p. 335 - 354 20 p. (Lecture Notes in Computer Science; vol. 12146).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2018

    Combining Private Set-Intersection with Secure Two-Party Computation

    Ciampi, M. & Orlandi, C., 3 Aug 2018, Security and Cryptography for Networks: 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings. Springer, p. 464–482 19 p. (Lecture Notes in Computer Science; vol. 11035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds

    Ciampi, M., Ostrovsky, R., Siniscalchi, L. & Visconti, I., 5 Nov 2017, Theory of Cryptography. Kalai, Y. & Reyzin, L. (eds.). Cham: Springer, p. 711-742 32 p. (Lecture Notes in Computer Science; vol. 10677).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Round-Optimal Secure Two-Party Computation from Trapdoor Permutations

    Ciampi, M., Ostrovsky, R., Siniscalchi, L. & Visconti, I., 5 Nov 2017, Theory of Cryptography. Kalai, Y. & Reyzin, L. (eds.). Cham: Springer, p. 678-710 33 p. (Lecture Notes in Computer Science; vol. 10677).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Four-Round Concurrent Non-Malleable Commitments from One-Way Functions

    Ciampi, M., Ostrovsky, R., Siniscalchi, L. & Visconti, I., 29 Jul 2017, Advances in Cryptology -- CRYPTO 2017. Katz, J. & Shacham, H. (eds.). Cham: Springer, p. 127-157 31 p. (Lecture Notes in Computer Science; vol. 10402).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    Concurrent Non-Malleable Commitments (and More) in 3 Rounds

    Ciampi, M., Ostrovsky, R., Siniscalchi, L. & Visconti, I., 21 Jul 2016, Advances in Cryptology -- CRYPTO 2016. Robshaw, M. & Katz, J. (eds.). Berlin, Heidelberg: Springer, p. 270-299 30 p. (Lecture Notes in Computer Science; vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles

    Ciampi, M., Persiano, G., Siniscalchi, L. & Visconti, I., 2016, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Berlin, Heidelberg: Springer, p. 83-111 29 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Improved OR-Composition of Sigma-Protocols

    Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L. & Visconti, I., 2016, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Berlin, Heidelberg: Springer, p. 112-141 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Online/Offline OR Composition of Sigma Protocols

    Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L. & Visconti, I., 2016, Advances in Cryptology -- EUROCRYPT 2016. Fischlin, M. & Coron, J-S. (eds.). Berlin, Heidelberg: Springer, p. 63-92 30 p. (Lecture Notes in Computer Science; vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File