#### Filter Results:

- Full text PDF available (99)

#### Publication Year

1987

2017

- This year (4)
- Last 5 years (34)
- Last 10 years (70)

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
- EUROCRYPT
- 2003

We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email gateway wants to test whether the email contains the keyword " urgent " so that it could route the email accordingly. Alice, on the other hand does not wish to give the gatewayâ€¦ (More)

- Vincenzo Auletta, Angelo Monti, Mimmo Parente, Giuseppe Persiano
- Algorithmica
- 1996

We consider the following pebble motion problem. We are given a tree T with n vertices and two arrangements $\cal R$ and $\cal S$ of k<n distinct pebbles numbered 1, . . ., k on distinct vertices of the tree. Pebbles can move along edges of T provided that at any given time at most one pebble is traveling along an edge and each vertex of T contains at mostâ€¦ (More)

- Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, Giuseppe Persiano
- USENIX Annual Technical Conference, FREENIX Track
- 2001

- Vincenzo Iovino, Giuseppe Persiano
- Pairing
- 2008

- Manuel Blum, Alfredo De Santis, Silvio Micali, Giuseppe Persiano
- SIAM J. Comput.
- 1991

We investigate the possibility of disposing of interaction between Prover and Veriier in a zero-knowledge proof if they share beforehand a short random string. Without any assumption, we prove that non-interactive zero-knowledge proofs exist for some number theoretic languages for which no eecient algorithm is known. If deciding quadratic residuosityâ€¦ (More)

Non-Interactive Zero Knowledge (NIZK), introduced by Blum, Feld-man, and Micali in 1988, is a fundamental cryptographic primitive which has attracted considerable attention in the last decade and has been used throughout modern cryptography in several essential ways. For example, NIZK plays a central role in building provably secure public-key cryptosystemsâ€¦ (More)

- Giuseppe Persiano, Ivan Visconti
- ACISP
- 2003

In this paper we present a non-transferable anonymous credential system that is based on the concept of a chameleon certificate. A chameleon certificate is a special certificate that enjoys two interesting properties. Firstly, the owner can choose which attributes of the certificate to disclose. Moreover, a chameleon certificate is multi-show in the senseâ€¦ (More)

We investigate structural properties of statistical zero knowledge (SZK) both in the interactive and in the non-interactive model. Speciically, we look into the closure properties of SZK languages under monotone logical formula composition. This gives rise to new protocol techniques. We show that interactive SZK for random self re-ducible languages (RSR)â€¦ (More)

- Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti
- CRYPTO
- 2004

In the bare public-key model (BPK in short), each verifier is assumed to have deposited a public key in a file that is accessible by all users at all times. In this model, introduced by Canetti et al. [STOC 2000], constant-round black-box concurrent and resettable zero knowledge is possible as opposed to the standard model for zero knowledge. As pointed outâ€¦ (More)