2014
Broadcast Steganography
N. Fazio, A.R. Nicolosi, and I.M. Perera
CT-RSA ’14, LNCS 8366, pp. 64-84, Springer, 2014
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
J. Soryal, I.M. Perera, I. Darwish, N. Fazio, R. Gennaro, and T. Saadawi
To appear at AINA ’14[ pdf ]
2013
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
N. Fazio, R. Gennaro, I.M. Perera, and W.E. Skeith III
Crypto ’13, LNCS 8043, pp. 148-165, Springer, 2012[ pdf ]
2012
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
N. Fazio and I.M. Perera
PKC ’12, LNCS 7293, pp. 225-242, Springer, 2012[ pdf ]
2011
Generalized Learning Problems and Applications to Non-Commutative Cryptography
G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, and W.E. Skeith III
ProvSec ’11, LNCS 6980, pp. 324-339, Springer, 2011[ pdf ]
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
N. Fazio, K. Iga, A. Nicolosi, L. Perret, and W.E. Skeith III
Joint AMS/SAMS International Congress, 2011[ pdf ]
2010
Public-Key Encryption with Efficient Amortized Updates
N. Chandran, R. Ostrovsky, and W.E. Skeith III
SCN ’10, LNCS 6280, pp. 17-35, Springer, 2010[ pdf ]
2009
Dynamic and Efficient Key Management for Access Hierarchies
M. Atallah, M. Blanton, N. Fazio, and K. Frikken
ACM Trans. Inf. Syst. Secur. (TISSEC), Vol. 12(3), pp. 18:1-18:43, ACM, 2009[ pdf ]
2008
Communication Complexity in Algebraic Two-Party Protocols
R. Ostrovsky and W.E. Skeith III
Crypto ’08, LNCS 5157, pp. 379-396, Springer, 2008[ pdf ]
Tutorial on Content Protection
N. Fazio and D.B. Ponceleon
ACM MM ’08, pp. 1153-1154, ACM, 2008[ pdf ]
2007
A Survey of Single-Database PIR: Techniques and Applications
R. Ostrovsky and W.E. Skeith III
PKC ’07, LNCS 4450, pp. 393-411, Springer, 2007[ pdf ]
Algebraic Lower Bounds for Computing on Encrypted Data
R. Ostrovsky and W.E. Skeith III
Electronic Colloquium on Computational Complexity (ECCC), Vol. 14(22), 2007[ pdf ]
Private Searching on Streaming Data
R. Ostrovsky and W.E. Skeith III
Journal of Cryptology, Vol. 20(4), pp. 397-430, Springer, 2007[ pdf ]
Public Key Encryption that Allows PIR Queries
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W.E. Skeith III
Crypto ’07, LNCS 4622, pp. 50-67, Springer, 2007[ pdf ]
Traitor Tracing with Optimal Transmission Rate
N. Fazio, A. Nicolosi, and D.H. Phan
ISC ’07, LNCS 4779, pp. 71-88, Springer, 2007[ pdf ]
2006
Non-Interactive Zero-Knowledge from Homomorphic Encryption
I. Damgård, N. Fazio, and A. Nicolosi
TCC ’06, LNCS 3876, pp. 41-59, Springer, 2006[ pdf ]
Output Privacy in Secure Multiparty Computation
E. Bresson, D. Catalano, N. Fazio, A. Nicolosi, and M. Yung
YACC ’06, Extended abstract, 2006[ pdf ]
2005
Scalable Public-Key Tracing and Revoking
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung
Journal of Distributed Computing, Vol. 17(4), pp.323-347, Springer, 2005[ pdf ]
2004
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya
CCS ’04, pp. 354-363, ACM, 2004[ pdf ]
2003
Fully Scalable Public-Key Traitor Tracing
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung
PODC ’03, pp. 190-199, ACM, 2003[ pdf ]
Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Y. Dodis and N. Fazio
PKC ’03, LNCS 2567, pp. 100-115, Springer, 2003[ pdf ]
2002
Public-Key Broadcast Encryption for Stateless Receivers
Y. Dodis and N. Fazio
DRM ’02, LNCS 2696, pp. 61-80, Springer, 2002[ pdf ]