Follow
Giuseppe Persiano
Title
Cited by
Cited by
Year
Public key encryption with keyword search
D Boneh, GD Crescenzo, R Ostrovsky, G Persiano
International conference on the theory and applications of cryptographic …, 2004
38802004
Noninteractive zero-knowledge
M Blum, A De Santis, S Micali, G Persiano
SIAM Journal on Computing 20 (6), 1084-1118, 1991
5401991
Robust non-interactive zero knowledge
AD Santis, GD Crescenzo, R Ostrovsky, G Persiano, A Sahai
Annual International Cryptology Conference, 566-598, 2001
3352001
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2842001
Zero-knowledge proofs of knowledge without interaction
A De Santis, G Persiano
Proceedings., 33rd Annual Symposium on Foundations of Computer Science, 427-436, 1992
2081992
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
1701994
Non-interactive zero-knowledge proof systems
AD Santis, S Micali, G Persiano
Conference on the Theory and Application of Cryptographic Techniques, 52-72, 1987
1611987
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 75-88, 2008
1202008
On the achievability of simulation-based security for functional encryption
AD Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Annual Cryptology Conference, 519-535, 2013
1052013
A linear-time algorithm for the feasibility of pebble motion on trees
V Auletta, A Monti, M Parente, P Persiano
Algorithmica 23 (3), 223-245, 1999
921999
Constrained bipartite edge coloring with applications to wavelength routing
C Kaklamanis, P Persiano, T Erlebach, K Jansen
International Colloquium on Automata, Languages, and Programming, 493-504, 1997
911997
Optimal wavelength routing on directed fiber trees
T Erlebach, K Jansen, C Kaklamanis, M Mihail, P Persiano
Theoretical Computer Science 221 (1-2), 119-137, 1999
901999
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
AD Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 347-366, 2010
772010
Non-interactive zero-knowledge with preprocessing
AD Santis, S Micali, G Persiano
Conference on the Theory and Application of Cryptography, 269-282, 1988
751988
Deterministic truthful approximation mechanisms for scheduling related machines
V Auletta, RD Prisco, P Penna, G Persiano
Annual Symposium on Theoretical Aspects of Computer Science, 608-619, 2004
742004
Branch-and-bound and backtrack search on mesh-connected arrays of processors
C Kaklamanis, G Persiano
Proceedings of the Fourth Annual ACM Symposium on Parallel Algorithms and …, 1992
721992
Efficient wavelength routing on directed fiber trees
C Kaklamanis, P Persiano
European Symposium on Algorithms, 460-470, 1996
701996
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
682018
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
GD Crescenzo, G Persiano, I Visconti
Annual International Cryptology Conference, 237-253, 2004
682004
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
572019
The system can't perform the operation now. Try again later.
Articles 1–20