List of Papers:
(If) Size Matters: Size-Hiding Private Set Intersection
(with E. De Cristofaro and G. Tsudik).
Cryptology ePrint Archive Report 2010/220.
Deniable Cloud Storage: Sharing Files via Public-key Deniability
(with Paolo Gasti and Marina Blanton).
Workshop on Privacy in the Electronic Society (WPES ’10), 2010.
Remote Data Checking for Network Coding-based Distributed Storage
Systems (with B. Chen, R. Curtmola, and R. Burns).
ACM Cloud Computing Security Workshop (CCSW ’10), 2010.
Proofs of Storage from Homomorphic
Identification Protocols (with Seny
Kamara and Jonathan Katz).
Advances in Cryptology, (ASIACRYPT 2009)
FastAD: An Authenticated Directory for Billions of Objects (with P.
Stanton, R. Burns, and B. McKeown).
Hot Topics in Storage and File Systems (HotStorage’09), 2009.
Key-Private Proxy
Re-Encryption (with K. Benson and S. Hohenberger).
RSA Conference 2009, Cryptographers' Track (CT-RSA '09), 2009.
Full version.
Cryptology ePrint Archive Report 2008/463.
Universally Anonymous IBE
based on the Quadratic Residuosity Assumption (with P. Gasti).
RSA Conference 2009, Cryptographers' Track (CT-RSA '09), 2009.
This is the extended version of the paper in the proceedings.
Cryptology ePrint Archive Report 2009/280.
Scalable and Efficient Provable Data Possession (with R. Di Pietro, L.
V. Mancini, and G. Tsudik).
Security and Privacy in Communication Networks (SecureComm '08),
2008.
Extended version in preparation.
MR. PDP: Multiple-replica provable
data possession (with R. Curtmola, O. Khan, and R. Burns).
International Conference on Distributed Computing Systems (ICDCS
'08), 2$
Provable Data Possession at
Untrusted Stores (with R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song).
ACM Conference on Computer and Communications Security (CCS '07), 2007.
Full version.
Cryptology ePrint Archive Report 2007/202.
Identity-Based Proxy
Re-encryption (with M. Green).
Applied Cryptography and Network Security (ACNS '07), 2007.
Cryptology ePrint Archive Report 2006/473.
Secret Handshakes with Dynamic and Fuzzy
Matching (with M. Blanton and J. Kirsch).
Network annd Distributed System Security Symposium (NDSS '07), 2007.
Design and Implementation of
Verifiable Audit Trails for a Versioning
File System (with Z. Peterson, R. Burns, and S. Bono).
USENIX Conference on File and Storage Technolgoies (FAST '07),
2007.
Provably-Secure Time-Bound Hierarchical
Key Assignment Schemes (with A. De Santis, A. L. Ferrara, and B. Masucci).
ACM Conference on Computer and Communications Security (CCS '06), 2006.
Full version.
Cryptology ePrint Archive Report 2006/225.
Practical Group Signatures without
Random Oracles (with J. Camenisch, S. Hohenberger, and B. de Medeiros).
Cryptology ePrint Archive Report 2005/385.
Proxy Re-Signatures:
New Definitions, Algorithms, and Applications (with Susan Hohenberger).
ACM Conference on Computer and Communications Security (CCS '05), 2005.
Full version.
Cryptology ePrint Archive Report 2005/433.
Untraceable RFID Tags via
Insubvertible Encryption (with J. Camenisch and B. de Medeiros).
ACM Conference on Computer and Communications Security (CCS '05), 2005.
Verifiable Audit Trails for a
Versioning File System (with R. Burns, Z. Peterson, and S. Bono).
Short paper in ACM Workshop on Storage Security and Survivability (StorageSS '05), 2005.
Sanitizable Signatures (with D. Chou,
B. de Medeiros, and G. Tsudik).
European Symposium on Research in Computer Security (ESORICS '05), 2005.
Survivable Monitoring
in Dynamic Networks (with C. Riley and C. Scheideler).
IEEE Transactions on Mobile Computing, 2005.
Conference version in IEEE International Information Assurance Workshop (IWIA '04).
Improved Proxy
Re-Encryption Schemes with Applications to Secure
Distributed Storage (with K. Fu, M. Green, and S. Hohenberger).
ACM Transactions on Information and System Security (TISSEC), 2006.
Conference version in Network and Distributed
System Security Symposium (NDSS '05), 2005.
Cryptology ePrint Archive Report 2005/028.
On the Performance and Analysis of DNS Security Extensions (with R. Curtmola and A. Del Sorbo). Full version of the paper in 4th International Conference on Cryptology and Network Security (CANS 2005), LNCS of Springer-Verlag, 2005.
On the Key Exposure Problem in Chameleon Hashes (with B. de Medeiros), Full version of the paper in the Proceedings of The Fourth Conference on Security in Communication Networks (SCN'04), LNCS of Springer-Verlag, Amalfi, 2004. In Cryptology ePrint Archive, Report 2004/243.
A Provably Secure Nyberg-Rueppel Signature Variant with Applications (with B. de Medeiros). Technical Report, 2004. In Cryptology ePrint Archive, Report 2004/93.
ID-based Chameleon Hash and Applications (with B. de Medeiros). Final version. In Financial Cryptography 2004, Key West, Florida (USA). Also in Cryptology ePrint Archive, Report 2003/167.
Survivable Monitoring in Dynamic Networks (with C. Riley and C. Scheideler). In the 2nd IEEE International Information Assurance Workshop (IWIA 2004), April 8th-9th, 2004 - Charlotte, NC, USA. Proceedings by IEEE press, pp. 33--47, 2004.
Efficient Group Signatures without Trapdoors (with B. de Medeiros), This is a revised version of the paper that appeared in ASIACRYPT 2003. Also in Cryptology ePrint Archive, Report 2002/173.
Verifiable Encryption of Digital Signatures and Applications, In ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 1, February 2004, Pages 1-20. (This is the journal version of two previous papers but with new remarks on the proposed certified e-mail protocol.)
Anonymous E-Prescriptions (with B. de Medeiros), In ACM Workshop on Privacy in the Electronic Society (WPES02), Washington, DC, USA - November 21, 2002 - Sponsored by ACM SIGSAC.
Medical Information Privacy Assurance: Cryptographic and System Aspects (with R. Curtmola, B. de Medeiros, and D. Davis), in Third Conference on Security in Communication Networks 2002 (SCN02), September 12-13, 2002, Amalfi (Italy). Full version.
Quasi-efficient Revocation in Group Signatures (with D. Song and G. Tsudik), In Financial Cryptography 2002, Southampton, Bermuda, March 11-14, 2002.
Stateless-Recipient Certified E-mail System based on Verifiable Encryption (with C. Nita-Rotaru), In RSA 2002, McEnery Convention Center, San Jose, CA, USA, February 18-22, 2002.
A New Approach to DNS Security (DNSSEC) (with S. Mangard), In Eighth ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 5-8, 2001.
TRICERT: Distributed Certified E-mail Schemes (with B. de Medeiros, M. T. Goodrich), ISOC 2001 Network and Distributed System Security Symposium (NDSS'01), San Diego, CA, USA, February 2001.
Extended Capabilities for Visual Cryptography, (with C. Blundo, A. De Santis, and D. R. Stinson), in Theoretical Computer Science, Vol. 250, (2001), pp. 134-161.
A Practical and Provably Secure Coalition-resistant Group Signature Scheme (with J. Camenisch, M. Joye, G. Tsudik), in CRYPTO 2000, Santa Barbara, CA, USA Aug 20-24, 2000.
Other Old Papers:
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, in Information and Computation, Vol. 129, No. 2, (1996), pp. 86--106. Also appears in ECCC, Electronic Colloquium on Computational Complexity (TR96-012). On-line copy available as gzipped postscript and pdf.
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Constructions and Bounds for Visual Cryptography, in the proceedings of the 23rd International Colloquium on Automata, Languages and Programming (ICALP '96), Friedhelm Meyer auf der Heide and B. Monien Eds.,Vol. 1099 of "Lecture Notes in Computer Science", Springer-Verlag, Berlin, pp. 416-428, 1996.
G. Ateniese, M. Steiner, and G. Tsudik, Authenticated Group Key Agreement and Friends, in Fifth ACM Conference on Computer and Communications Security, San Francisco, CA, November 1998.
G. Ateniese and G. Tsudik, Group Signatures a' la carte, in Tenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'99), Baltimore, Maryland.
G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, On Traveling Incognito, in journal of Computer Networks (31) 8 (1999) pp. 871-884, April 23, 1999.
G. Ateniese and G. Tsudik, Some Open Issues and New Directions in Group Signatures, Financial Cryptography '99. (FC,'99) (M. Franklin, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1999.
G. Ateniese, M. Steiner, and G. Tsudik, New Muli-party Authentication Services and Key Agreement Protocols, in IEEE Journal on Selected Areas in Communications (JSAC), vol. 18, No 4, April 2000.
G. Ateniese, M. Joye, and G. Tsudik, On the Difficulty of Coalition-Resistance in Group Signature Schemes, in Second Workshop on Security in Communication Networks (SCN '99), September 1999.
G. Ateniese, Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. In 6th ACM Conference on Computer and Communications Security (ACM CCS'99).
G. Ateniese, O. Chevassut, D. Hasse, Y. Kim, and G. Tsudik, The Design of a Group Key Agreement API, IBM Research Report, and in DARPA DISCEX'2000.
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, Jonathan Stanton and Gene Tsudik, Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments, in 2000 IEEE International Conference on Distributed Computing Systems, pp.330--343, Taipei, Taiwan, April 2000.