default search action
Angelo De Caro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i19]Elli Androulaki, Angelo De Caro, Kaoutar Elkhiyaoui, Romain Gay, Rebekah Mercer, Alessandro Sorniotti:
Secure and Privacy-preserving CBDC Offline Payments using a Secure Element. IACR Cryptol. ePrint Arch. 2024: 1746 (2024) - 2023
- [c19]Francesca Falzon, Kaoutar Elkhiyaoui, Yacov Manevich, Angelo De Caro:
Short Privacy-Preserving Proofs of Liabilities. CCS 2023: 1805-1819 - [i18]Elli Androulaki, Marcus Brandenburger, Angelo De Caro, Kaoutar Elkhiyaoui, Liran Funaro, Alexandros Filios, Yacov Manevich, Senthilnathan Natarajan, Manish Sethi:
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies. IACR Cryptol. ePrint Arch. 2023: 1717 (2023) - 2022
- [c18]Amit Agarwal, Angelo De Caro, Andrew Miller:
Short Paper: Privacy Preserving Decentralized Netting. Financial Cryptography Workshops 2022: 280-298 - 2021
- [c17]Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. CANS 2021: 435-459 - [i17]Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki:
Multi-Issuer Anonymous Credentials Without a Root Authority. IACR Cryptol. ePrint Arch. 2021: 1669 (2021) - 2020
- [c16]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. AFT 2020: 255-267 - [c15]Shengjiao Cao, Yuan Yuan, Angelo De Caro, Karthik Nandakumar, Kaoutar Elkhiyaoui, Yanyan Hu:
Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems. Financial Cryptography 2020: 137-155 - [i16]Elli Androulaki, Angelo De Caro, Kaoutar Elkhiyaoui, Christian Gorenflo, Alessandro Sorniotti, Marko Vukolic:
Multi-Shard Private Transactions for Permissioned Blockchains. CoRR abs/2010.08274 (2020)
2010 – 2019
- 2019
- [c14]Tzipora Halevi, Fabrice Benhamouda, Angelo De Caro, Shai Halevi, Charanjit S. Jutla, Yacov Manevich, Qi Zhang:
Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation. Blockchain 2019: 91-98 - [c13]Elli Androulaki, Angelo De Caro, Matthias Neugschwandtner, Alessandro Sorniotti:
Endorsement in Hyperledger Fabric. Blockchain 2019: 510-519 - [c12]Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. Financial Cryptography 2019: 337-356 - [i15]Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. IACR Cryptol. ePrint Arch. 2019: 438 (2019) - [i14]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. IACR Cryptol. ePrint Arch. 2019: 1058 (2019) - [i13]Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. IACR Cryptol. ePrint Arch. 2019: 1097 (2019) - 2018
- [j5]Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Receiver- and sender-deniable functional encryption. IET Inf. Secur. 12(3): 207-216 (2018) - [c11]Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias:
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. ESORICS (1) 2018: 111-131 - [c10]Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed Cocco, Jason Yellick:
Hyperledger fabric: a distributed operating system for permissioned blockchains. EuroSys 2018: 30:1-30:15 - [i12]Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed Cocco, Jason Yellick:
Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. CoRR abs/1801.10228 (2018) - 2017
- [j4]Angelo De Caro, Vincenzo Iovino:
On the power of rewinding simulators in functional encryption. Des. Codes Cryptogr. 84(3): 373-399 (2017) - [i11]Elli Androulaki, Christian Cachin, Angelo De Caro, Alessandro Sorniotti, Marko Vukolic:
Permissioned Blockchains and Hyperledger Fabric. ERCIM News 2017(110) (2017) - [i10]Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolic:
The Transaction Graph for Modeling Blockchain Semantics. IACR Cryptol. ePrint Arch. 2017: 1070 (2017) - 2016
- [c9]Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Deniable Functional Encryption. Public Key Cryptography (1) 2016: 196-222 - [i9]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Better Security for Functional Encryption for Inner Product Evaluations. IACR Cryptol. ePrint Arch. 2016: 11 (2016) - 2015
- [c8]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. Public Key Cryptography 2015: 733-751 - [i8]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. IACR Cryptol. ePrint Arch. 2015: 17 (2015) - [i7]Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Deniable Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 1205 (2015) - 2013
- [j3]Carlo Blundo, Angelo De Caro, Clemente Galdi, Giuseppe Persiano:
Certified Information Access. J. Syst. Softw. 86(9): 2439-2450 (2013) - [c7]Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. CRYPTO (2) 2013: 519-535 - [i6]Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 364 (2013) - [i5]Angelo De Caro, Vincenzo Iovino:
On the Power of Rewinding Simulators in Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 752 (2013) - 2012
- [j2]Michel Abdalla, Angelo De Caro, Duong Hieu Phan:
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. IEEE Trans. Inf. Forensics Secur. 7(6): 1695-1706 (2012) - [c6]Michel Abdalla, Angelo De Caro, Karina Mochetti:
Lattice-Based Hierarchical Inner Product Encryption. LATINCRYPT 2012: 121-138 - [c5]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Hidden Vector Encryption. Pairing 2012: 102-121 - 2011
- [j1]Carlo Blundo, Angelo De Caro, Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, Paul G. Spirakis:
Innovative approaches for security of small artefacts. Comput. Sci. Rev. 5(1): 47-55 (2011) - [c4]Angelo De Caro, Vincenzo Iovino:
jPBC: Java pairing based cryptography. ISCC 2011: 850-855 - [i4]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Hidden Vector Encryption Fully Secure Against Unrestricted Queries. IACR Cryptol. ePrint Arch. 2011: 546 (2011) - 2010
- [c3]Vincenzo Auletta, Carlo Blundo, Angelo De Caro, Emiliano De Cristofaro, Giuseppe Persiano, Ivan Visconti:
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. Financial Cryptography Workshops 2010: 94-104 - [c2]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. Pairing 2010: 347-366 - [i3]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts. IACR Cryptol. ePrint Arch. 2010: 197 (2010) - [i2]Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae. IACR Cryptol. ePrint Arch. 2010: 492 (2010)
2000 – 2009
- 2009
- [c1]Carlo Blundo, Angelo De Caro, Giuseppe Persiano:
Untraceable Tags Based on Mild Assumptions. DPM/SETOP 2009: 178-192 - [i1]Carlo Blundo, Angelo De Caro, Giuseppe Persiano:
Untraceable Tags based on Mild Assumptions. IACR Cryptol. ePrint Arch. 2009: 380 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint