Profil

IOVINO Vincenzo

Main Referenced Co-authors
ROENNE, Peter  (5)
LOPEZ BECERRA, José Miguel  (4)
RYAN, Peter Y A  (4)
Giustolisi, Rosario (3)
O'Neill, Adam (3)
Main Referenced Keywords
functional encryption (4); cryptography (3); Functional Encryption (3); Simulation-security (2); bilinear maps (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (5)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > APSIA - Applied Security and Information Assurance (1)
Main Referenced Disciplines
Computer science (22)

Publications (total 22)

The most downloaded
491 downloads
Ryan, P., Roenne, P., & Iovino, V. (2015). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105. https://hdl.handle.net/10993/24802

The most cited

61 citations (Scopus®)

De caro, A., Iovino, V., Jain, A., O'Neill, A., Paneth, O., & Persiano, G. (2013). On the Achievability of Simulation-Based Security for Functional Encryption. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II. Springer. https://hdl.handle.net/10993/24800

Zollinger, M.-L., Ryan, P. Y. A., Roenne, P., Iovino, V., Rial, A., & Damodaran, A. S. S. (11 May 2023). Selene: A Usable Voting System with Transparent Verifiability and Coercion Mitigation [Poster presentation]. SnT Partnership Day 2023, Luxembourg City, Luxembourg.

Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2019). On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy. E-Business and Telecommunications - 2019, 173-198. doi:10.1007/978-3-030-11039-0_9
Peer reviewed

Iovino, V., & Visconti, I. (2019). Non-interactive Zero Knowledge Proofs in the Random Oracle Model. In Codes, Cryptology and Information Security (pp. 118-141). Springer, Cham. doi:10.1007/978-3-030-16458-4
Peer reviewed

Lopez Becerra, J. M., Iovino, V., Ostrev, D., Sala, P., & Skrobot, M. (2017). Tightly-Secure PAK(E). In Cryptology and Network Security. Springer.
Peer reviewed

Iovino, V., Rial, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. In Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17).
Peer reviewed

Lopez Becerra, J. M., Iovino, V., & Skrobot, M. (09 March 2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs [Paper presentation]. Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg.

De Caro, A.* , Iovino, V.* , & O'Neill, A.*. (2017). Receiver and Sender Deniable Functional Encryption. IET Information Security. doi:10.1049/iet-ifs.2017.0040
Peer Reviewed verified by ORBi
* These authors have contributed equally to this work.

Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. In Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS.
Peer reviewed

Giustolisi, R., Iovino, V., & Lenzini, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R. Giustolisi, V. Iovino, ... G. Lenzini, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS.
Peer reviewed

Desmedt, Y., Iovino, V., Persiano, G., & Visconti, I. (2017). Controlled Homomorphic Encryption: Definition and Construction. In FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Peer reviewed

Iovino, V., Tang, Q., & Zebrowski, K. (2017). On the power of Public-key Function-Private Functional Encryption. IET Information Security. doi:10.1049/iet-ifs.2016.0459
Peer Reviewed verified by ORBi

Delerue Arriaga, A., Iovino, V., & Tang, Q. (2016). Updatable Functional Encryption. In Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers (pp. 347-363). Springer. doi:10.1007/978-3-319-61273-7_17
Peer reviewed

De caro, A., Iovino, V., & O'Neill, A. (2016). Deniable Functional Encryption. In Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (1, pp. 27). Springer.
Peer reviewed

Giustolisi, R., Iovino, V., & Rønne, P. (2016). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. In Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Springer. doi:10.1007/978-3-662-53357-4_13
Peer reviewed

Gallegos-Garcia, G., Iovino, V., Roenne, P., & Ryan, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31726.

De Caro, A.* , & Iovino, V.*. (2016). On the Power of Rewinding Simulators in Functional Encryption. Designs, Codes and Cryptography. doi:10.1007/s10623-016-0272-x
Peer Reviewed verified by ORBi
* These authors have contributed equally to this work.

Iovino, V., Tang, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. In 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology. doi:10.1007/978-3-319-48965-0
Peer reviewed

Iovino, V., & Żebrowski, K. (11 September 2015). Mergeable Functional Encryption [Paper presentation]. 16th Italian Conference on Theoretical Computer Science (ICTCS), Firenze, Italy.

Giustolisi, R., Iovino, V., & Roenne, P. (2015). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. IACR Cryptology ePrint Archive, 2015, 1119.

Ryan, P., Roenne, P., & Iovino, V. (2015). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105.
Peer reviewed

Iovino, V., & Żebrowski, K. (2015). Simulation-Based Secure Functional Encryption in the Random Oracle Model. In Progress in Cryptology -- LATINCRYPT 2015 (pp. 19). Springer. doi:10.1007/978-3-319-22174-8_2
Peer reviewed

De caro, A., Iovino, V., Jain, A., O'Neill, A., Paneth, O., & Persiano, G. (2013). On the Achievability of Simulation-Based Security for Functional Encryption. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II. Springer.
Peer reviewed

Contact ORBilu