Alessandra Scafuro

Works (21)

Updated: July 5th, 2023 15:35

2022 article

Black-Box Anonymous Commit-and-Prove

SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), Vol. 13409, pp. 591–614.

By: A. Scafuro n

Source: Web Of Science
Added: November 14, 2022

2022 article

Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust

CYBER SECURITY, CRYPTOLOGY, AND MACHINE LEARNING, Vol. 13301, pp. 318–336.

By: V. Daza*, A. Haque n, A. Scafuro n, A. Zacharakis* & A. Zapico*

Source: Web Of Science
Added: November 14, 2022

2021 article

One-Time Traceable Ring Signatures

COMPUTER SECURITY - ESORICS 2021, PT II, Vol. 12973, pp. 481–500.

By: A. Scafuro n & B. Zhang n

Source: Web Of Science
Added: April 8, 2022

2020 article

Anonymous Lottery In The Proof-of-Stake Setting

2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), pp. 318–333.

By: F. Baldimtsi*, V. Madathil n, A. Scafuro n & L. Zhou n

author keywords: Blockchain; Proof-of-Stake; Privacy
Source: Web Of Science
Added: March 8, 2021

2018 article

Population Stability: Regulating Size in the Presence of an Adversary

PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 397–406.

By: S. Goldwasser*, R. Ostrovsky*, A. Scafuro n & A. Sealfon*

Source: Web Of Science
Added: February 25, 2019

2017 chapter

Adaptively Indistinguishable Garbled Circuits

In Theory of Cryptography (pp. 40–71).

By: Z. Jafargholi*, A. Scafuro n & D. Wichs*

Source: Crossref
Added: February 24, 2020

2017 chapter

Server-Aided Secure Computation with Off-line Parties

In Computer Security – ESORICS 2017 (pp. 103–123).

By: F. Baldimtsi*, D. Papadopoulos*, S. Papadopoulos*, A. Scafuro n & N. Triandopoulos*

Source: Crossref
Added: February 24, 2020

2017 article

Sublinear Zero-Knowledge Arguments for RAM Programs

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, Vol. 10210, pp. 501–531.

By: P. Mohassel*, M. Rosulek* & A. Scafuro n

Source: Web Of Science
Added: August 6, 2018

2016 chapter

Adaptively Secure Garbled Circuits from One-Way Functions

In Advances in Cryptology – CRYPTO 2016 (pp. 149–178).

By: B. Hemenway*, Z. Jafargholi*, R. Ostrovsky*, A. Scafuro* & D. Wichs*

Source: Crossref
Added: February 24, 2020

2016 chapter

Improved OR-Composition of Sigma-Protocols

In Lecture Notes in Computer Science: Vol. 9563. Theory of Cryptography. TCC 2016 (pp. 112–141).

By: M. Ciampi*, G. Persiano*, A. Scafuro*, L. Siniscalchi* & I. Visconti*

Source: Crossref
Added: December 31, 2020

2016 chapter

NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion

In Advances in Cryptology – ASIACRYPT 2016 (pp. 777–804).

By: M. Bellare, G. Fuchsbauer & A. Scafuro*

Source: Crossref
Added: February 24, 2020

2016 chapter

Online/Offline OR Composition of Sigma Protocols

In Advances in Cryptology – EUROCRYPT 2016 (pp. 63–92).

By: M. Ciampi*, G. Persiano*, A. Scafuro*, L. Siniscalchi* & I. Visconti*

author keywords: Sigma-protocols; WI; PoKs; Delayed and adaptive input
Source: Crossref
Added: February 24, 2020

2015 chapter

Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way

In Theory of Cryptography (pp. 345–374).

By: R. Ostrovsky*, A. Scafuro* & M. Venkitasubramanian*

Source: Crossref
Added: February 24, 2020

2015 chapter

Round-Optimal Black-Box Two-Party Computation

In Lecture Notes in Computer Science (pp. 339–358).

By: R. Ostrovsky*, S. Richelson* & A. Scafuro*

Source: Crossref
Added: February 24, 2020

2013 chapter

Revisiting Lower and Upper Bounds for Selective Decommitments

In Theory of Cryptography (pp. 559–578).

By: R. Ostrovsky*, V. Rao, A. Scafuro* & I. Visconti*

Source: Crossref
Added: August 28, 2020

2013 chapter

Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

In Advances in Cryptology - ASIACRYPT 2013 (pp. 100–119).

By: I. Damgård* & A. Scafuro*

Source: Crossref
Added: August 28, 2020

2013 chapter

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

In Advances in Cryptology – EUROCRYPT 2013 (pp. 702–718).

By: R. Ostrovsky*, A. Scafuro*, I. Visconti* & A. Wadia

Source: Crossref
Added: August 28, 2020

2012 chapter

On Round-Optimal Zero Knowledge in the Bare Public-Key Model

In Advances in Cryptology – EUROCRYPT 2012 (pp. 153–171).

By: A. Scafuro* & I. Visconti*

Source: Crossref
Added: August 28, 2020

2012 chapter

Simultaneously Resettable Arguments of Knowledge

In Theory of Cryptography (pp. 530–547).

By: C. Cho, R. Ostrovsky*, A. Scafuro* & I. Visconti*

Source: Crossref
Added: August 28, 2020

2010 chapter

Impossibility Results for RFID Privacy Notions

In Transactions on Computational Science XI (pp. 39–63).

By: F. Armknecht*, A. Sadeghi*, A. Scafuro*, I. Visconti* & C. Wachsmann*

Source: Crossref
Added: August 28, 2020

2009 chapter

Revisiting DoS Attacks and Privacy in RFID-Enabled Networks

In Algorithmic Aspects of Wireless Sensor Networks (pp. 76–87).

By: P. D’Arco*, A. Scafuro* & I. Visconti*

Source: Crossref
Added: August 28, 2020