Follow
Giuseppe Persiano
Title
Cited by
Cited by
Year
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
40222004
Noninteractive zero-knowledge
M Blum, A De Santis, S Micali, G Persiano
SIAM Journal on Computing 20 (6), 1084-1118, 1991
5521991
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
3482001
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2872001
Zero-knowledge proofs of knowledge without interaction
A De Santis, G Persiano
Proceedings., 33rd Annual Symposium on Foundations of Computer Science, 427-436, 1992
2101992
On monotone formula closure of SZK
A De Santis, G Di Crescenzo, G Persiano, M Yung
Proceedings 35th Annual Symposium on Foundations of Computer Science, 454-465, 1994
1771994
Non-interactive zero-knowledge proof systems
A De Santis, S Micali, G Persiano
Advances in Cryptology—CRYPTO’87: Proceedings 7, 52-72, 1988
1751988
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008
1212008
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1112013
Optimal wavelength routing on directed fiber trees
T Erlebach, K Jansen, C Kaklamanis, M Mihail, P Persiano
Theoretical Computer Science 221 (1-2), 119-137, 1999
931999
Constrained bipartite edge coloring with applications to wavelength routing
C Kaklamanis, P Persiano, T Erlebach, K Jansen
Automata, Languages and Programming: 24th International Colloquium, ICALP'97 …, 1997
921997
A linear-time algorithm for the feasibility of pebble motion on trees
V Auletta, A Monti, M Parente, P Persiano
Algorithmica 23 (3), 223-245, 1999
911999
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
A De Caro, V Iovino, G Persiano
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
812010
Non-interactive zero-knowledge with preprocessing
A De Santis, S Micali, G Persiano
Advances in Cryptology—CRYPTO’88: Proceedings 8, 269-282, 1990
801990
Deterministic truthful approximation mechanisms for scheduling related machines
V Auletta, R De Prisco, P Penna, G Persiano
STACS 2004: 21st Annual Symposium on Theoretical Aspects of Computer Science …, 2004
772004
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
762018
Branch-and-bound and backtrack search on mesh-connected arrays of processors
C Kaklamanis, G Persiano
Proceedings of the Fourth Annual ACM Symposium on Parallel Algorithms and …, 1992
711992
Efficient wavelength routing on directed fiber trees
C Kaklamanis, P Persiano
Algorithms—ESA'96: Fourth Annual European Symposium Barcelona, Spain …, 1996
701996
Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model
G Di Crescenzo, G Persiano, I Visconti
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
692004
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
682019
The system can't perform the operation now. Try again later.
Articles 1–20