Panoramix:Privacy and Accountability in Networks via Optimized Randomized Mix-nets

Search results

  • 2020

    A Non-interactive Shuffle Argument with Low Trust Assumptions

    Aggelakis, A., Fauzi, P., Korfiatis, G., Louridas, P., Mergoupis-Anagnou, F., Siim, J. & Zajac, M., 14 Feb 2020, Topics in Cryptology -- CT-RSA 2020. Jarecki, S. (ed.). Cham: Springer, p. 667-692 26 p. (Lecture Notes in Computer Science; vol. 12006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Consensus from signatures of work

    Garay, J. A., Kiayias, A. & Panagiotakos, G., 14 Feb 2020, Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings. Jarecki, S. (ed.). Cham: Springer, p. 319-344 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    UC-Secure CRS Generation for SNARKs

    Abdolmaleki, B., Baghery, K., Lipmaa, H., Siim, J. & Zajac, M., 29 Jun 2019, Progress in Cryptology -- AFRICACRYPT 2019. Buchmann, J., Nitaj, A. & Rachidi, T. (eds.). Cham: Springer, p. 99-117 19 p. (Lecture Notes in Computer Science ; vol. 11627).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    A Universally Composable Framework for the Privacy of Email Ecosystems

    Chaidos, P., Fourtounelli, O., Kiayias, A. & Zacharias, T., 26 Oct 2018, Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III. Brisbane, Australia: Springer, p. 191-221 31 p. (Lecture Notes in Computer Science; vol. 11274)(Security and Cryptology; vol. 11274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Secure Outsourcing of Cryptographic Circuits Manufacturing

    Ateniese, G., Kiayias, A., Magri, B., Tselekounis, I. & Venturi, D., 7 Oct 2018, The 12th International Conference on Provable Security 25-28 October, 2018, Jeju, Rep. of Korea. Jeju, Rep. of Korea: Springer, p. 75-93 18 p. (Lecture Notes in Computer Science; vol. 11192)(Security and Cryptology; vol. 11192).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain

    David, B., Gazi, P., Kiayias, A. & Russell, A., 31 Mar 2018, Advances in Cryptology - EUROCRYPT 2018. Springer, p. 66-98 33 p. (Lecture Notes in Computer Science (LNCS); vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup

    Garay, J. A., Kiayias, A., Leonardos, N. & Panagiotakos, G., 1 Mar 2018, Public-Key Cryptography -- PKC 2018. Abdalla, M. & Dahab, R. (eds.). Rio de Janeiro, Brazil: Springer, p. 465-495 31 p. (Lecture Notes in Computer Science; vol. 10770).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    An Efficient Pairing-Based Shuffle Argument

    Fauzi, P., Lipmaa, H., Siim, J. & Zajac, M., 18 Nov 2017, Advances in Cryptology -- ASIACRYPT 2017. Takagi, T. & Peyrin, T. (eds.). Cham: Springer, p. 97-127 31 p. (Lecture Notes in Computer Science; vol. 10625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • MCMix: Anonymous Messaging via Secure Multiparty Computation

    Alexopoulos, N., Kiayias, A., Talviste, R. & Zacharias, T., 18 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 1217-1234 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol

    Kiayias, A., Russell, A., David, B. & Oliynykov, R., 29 Jul 2017, Advances in Cryptology -- CRYPTO 2017. Katz, J. & Shacham, H. (eds.). Cham: Springer, p. 357-388 32 p. (Lecture Notes in Computer Science; vol. 10401).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF

    Jarecki, S., Kiayias, A., Krawczyk, H. & Xu, J., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Cham: Springer, p. 39-58 20 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 9 Jun 2017, In: IEEE Security and Privacy. 15, 3, p. 14-23 10 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 13 Mar 2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Ceremonies for End-to-End Verifiable Elections

    Kiayias, A., Zacharias, T. & Zhang, B., 26 Feb 2017, IACR International Workshop on Public Key Cryptography: PKC 2017: Public-Key Cryptography – PKC 2017. Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    Indistinguishable Proofs of Work or Knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 9 Nov 2016, Advances in Cryptology: ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Berlin, Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Practical Non-Malleable Codes from L-more Extractable Hash Functions

    Kiayias, A., Liu, F-H. & Tselekounis, Y., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 1317-1328 12 p. (CCS '16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning

    Argyros, G., Stais, I., Jana, S., Keromytis, A. D. & Kiayias, A., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 1690-1701 12 p. (CCS '16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Blockchain Mining Games

    Kiayias, A., Koutsoupias, E., Kyropoulou, M. & Tselekounis, Y., 21 Jul 2016, Proceedings of the 2016 ACM Conference on Economics and Computation. New York, NY, USA: ACM, p. 365-382 18 p. (EC '16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File