2014

Broadcast Steganography
N. Fazio, A.R. Nicolosi, and I.M. Perera
CT-RSA ’14, LNCS 8366, pp. 64-84, Springer, 2014

pdf ]

Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
J. Soryal, I.M. Perera, I. Darwish, N. Fazio, R. Gennaro, and T. Saadawi
To appear at AINA ’14[ pdf ]


2013

Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
N. Fazio, R. Gennaro, I.M. Perera, and W.E. Skeith III
Crypto ’13, LNCS 8043, pp. 148-165, Springer, 2012[ pdf ]


2012

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
N. Fazio and I.M. Perera
PKC ’12, LNCS 7293, pp. 225-242, Springer, 2012[ pdf ]


2011

Generalized Learning Problems and Applications to Non-Commutative Cryptography
G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, and W.E. Skeith III
ProvSec ’11, LNCS 6980, pp. 324-339, Springer, 2011[ pdf ]

Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
N. Fazio, K. Iga, A. Nicolosi, L. Perret, and W.E. Skeith III
Joint AMS/SAMS International Congress, 2011[ pdf ]


2010

Public-Key Encryption with Efficient Amortized Updates
N. Chandran, R. Ostrovsky, and W.E. Skeith III
SCN ’10, LNCS 6280, pp. 17-35, Springer, 2010[ pdf ]


2009

Dynamic and Efficient Key Management for Access Hierarchies
M. Atallah, M. Blanton, N. Fazio, and K. Frikken
ACM Trans. Inf. Syst. Secur. (TISSEC), Vol. 12(3), pp. 18:1-18:43, ACM, 2009[ pdf ]


2008

Communication Complexity in Algebraic Two-Party Protocols
R. Ostrovsky and W.E. Skeith III
Crypto ’08, LNCS 5157, pp. 379-396, Springer, 2008[ pdf ]

Tutorial on Content Protection
N. Fazio and D.B. Ponceleon
ACM MM ’08, pp. 1153-1154, ACM, 2008[ pdf ]


2007

A Survey of Single-Database PIR: Techniques and Applications
R. Ostrovsky and W.E. Skeith III
PKC ’07, LNCS 4450, pp. 393-411, Springer, 2007[ pdf ]

Algebraic Lower Bounds for Computing on Encrypted Data
R. Ostrovsky and W.E. Skeith III
Electronic Colloquium on Computational Complexity (ECCC), Vol. 14(22), 2007[ pdf ]

Private Searching on Streaming Data
R. Ostrovsky and W.E. Skeith III
Journal of Cryptology, Vol. 20(4), pp. 397-430, Springer, 2007[ pdf ]

Public Key Encryption that Allows PIR Queries
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W.E. Skeith III
Crypto ’07, LNCS 4622, pp. 50-67, Springer, 2007[ pdf ]

Traitor Tracing with Optimal Transmission Rate
N. Fazio, A. Nicolosi, and D.H. Phan
ISC ’07, LNCS 4779, pp. 71-88, Springer, 2007[ pdf ]


2006

Non-Interactive Zero-Knowledge from Homomorphic Encryption
I. Damgård, N. Fazio, and A. Nicolosi
TCC ’06, LNCS 3876, pp. 41-59, Springer, 2006[ pdf ]

Output Privacy in Secure Multiparty Computation
E. Bresson, D. Catalano, N. Fazio, A. Nicolosi, and M. Yung
YACC ’06, Extended abstract, 2006[ pdf ]


2005

Scalable Public-Key Tracing and Revoking
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung
Journal of Distributed Computing, Vol. 17(4), pp.323-347, Springer, 2005[ pdf ]


2004

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya
CCS ’04, pp. 354-363, ACM, 2004[ pdf ]


2003

Fully Scalable Public-Key Traitor Tracing
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung
PODC ’03, pp. 190-199, ACM, 2003[ pdf ]

Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Y. Dodis and N. Fazio
PKC ’03, LNCS 2567, pp. 100-115, Springer, 2003[ pdf ]


2002

Public-Key Broadcast Encryption for Stateless Receivers
Y. Dodis and N. Fazio
DRM ’02, LNCS 2696, pp. 61-80, Springer, 2002[ pdf ]