Zobrazeno 1 - 10
of 24
pro vyhledávání: '"De Caro, Angelo"'
Autor:
Androulaki, Elli, De Caro, Angelo, Elkhiyaoui, Kaoutar, Gorenflo, Christian, Sorniotti, Alessandro, Vukolic, Marko
Traditionally, blockchain systems involve sharing transaction information across all blockchain network participants. Clearly, this introduces barriers to the adoption of the technology by the enterprise world, where preserving the privacy of the bus
Externí odkaz:
http://arxiv.org/abs/2010.08274
Autor:
Androulaki, Elli, Barger, Artem, Bortnikov, Vita, Cachin, Christian, Christidis, Konstantinos, De Caro, Angelo, Enyeart, David, Ferris, Christopher, Laventman, Gennady, Manevich, Yacov, Muralidharan, Srinivasan, Murthy, Chet, Nguyen, Binh, Sethi, Manish, Singh, Gari, Smith, Keith, Sorniotti, Alessandro, Stathakopoulou, Chrysoula, Vukolić, Marko, Cocco, Sharon Weed, Yellick, Jason
Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain syste
Externí odkaz:
http://arxiv.org/abs/1801.10228
Publikováno v:
In The Journal of Systems & Software September 2013 86(9):2439-2450
Autor:
Blundo, Carlo a, De Caro, Angelo a, Dolev, Shlomi b, Gilboa, Niv b, Kopeetsky, Marina c, Persiano, Giuseppe a, ⁎, Spirakis, Paul G. d, e
Publikováno v:
In Computer Science Review 2011 5(1):47-55
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IET Information Security. Institution of Engineering & Technology (2017).
Deniable encryption, first introduced by Canetti et al. (CRYPTO 1997), allows equivocation of encrypted communication. In this work we generalize its study to functional encryption (FE). Our results are summarized as follows: We first put forward and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::f1caba4b674b1eaad52bb97eeee85cbf
http://orbilu.uni.lu/handle/10993/31154
http://orbilu.uni.lu/handle/10993/31154
Publikováno v:
[Technical Report] Cryptology ePrint Archive: Report 2016/011, IACR. 2016
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of the security challenges raised by cloud computing. A recent paper by Abdalla, Bourse, De Caro, and Pointcheval shows a functional encryption scheme for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::29b8944ec4c2a379df7b5a465362f012
https://hal.archives-ouvertes.fr/hal-01380726
https://hal.archives-ouvertes.fr/hal-01380726
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
De Caro, Angelo
2011 - 2012 Today public-key cryptographic is widely deployed and successfully used but still a major drawback exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the message other than intentionally
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1997::d1316d559efd1c1e33678e86438f4ede
https://hdl.handle.net/10556/899
https://hdl.handle.net/10556/899
Autor:
De caro, Angelo, Iovino, Vincenzo, Jain, Abhishek, O'Neill, Adam, Paneth, Omer, Persiano, Giuseppe
Publikováno v:
Advances in Cryptology-CRYPTO 2013-33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II. Springer (2013).
This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (IND-security). Our main result is a compiler that t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::1485c0697f1fb634bae38ab84baade3a
http://orbilu.uni.lu/handle/10993/24800
http://orbilu.uni.lu/handle/10993/24800