Publications

Peer-reviewed journals and conference proceedings:

  1. Updatable and Universal Common Reference Strings with Applications to zk-SNARKs by Jens Groth, Markulf Kohlweiss, Mary Maller, and Sarah Meiklejohn. In: Shacham H., Boldyreva A. (eds) Advances in Cryptology – CRYPTO 2018. CRYPTO 2018. Lecture Notes in Computer Science, vol 10993. Springer, Cham. https://doi.org/10.1007/978-3-319-96878-0_24
  2. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains by Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias. In proceedings part I of  23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, pages 111-131. Springer, Cham. https://doi.org/10.1007/978-3-319-99073-6
  3. Combining private set-intersection with secure two-party computation by Michele Ciampi and Claudio Orlandi. In proceedings of International Conference on Security and Cryptography for Networks, SCN 2018, Amalfi, Italy, September 5-7, 2018, pages 464-482. Springer, Cham. https://doi.org/10.1007/978-3-319-98113-0_25 
  4. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability by Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pages 913–930, 2018. https://doi.org/10.1145/3243734.3243848
  5. On the Security Properties of e-Voting Bulletin Boards by Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias. In Catalano D., De Prisco R. (eds) Security and Cryptography for Networks. SCN 2018. Lecture Notes in Computer Science, vol 11035. Springer, Cham. https://doi.org/10.1007/978-3-319-98113-0_27
  6. On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards by Sven Heiberg, Ivo Kubjas, Janno Siim and Jan Willemson. In proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 259-276. 
  7. Non-Interactive Secure Computation from One-Way Function by Saikrishna Badrinarayanan, Abhishek Jain; Rafail Ostrovsky and Ivan Visconti. In proceedings Part III of 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018. Springer, Cham. https://doi.org/10.1007/978-3-030-03332-3_5
  8. Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks by Mark Abspoel, Niek J. Bouman, Berry Schoenmakers and Niels de Vreede}. In Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks. In: Matsui M. (eds) Topics in Cryptology – CT-RSA 2019. CT-RSA 2019. Lecture Notes in Computer Science, vol 11405. Springer, Cham. https://doi.org/10.1007/978-3-030-12612-4_23
  9. Publicly Verifiable Proofs from Blockchains by Alessandra Scafuro, Luisa Siniscalchi and Ivan Visconti. In proceedings Part I of 2nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-17253-4_13
  10. Non-interactive Zero Knowledge Proofs in the Random Oracle Model by Vincenzo Iovino, Ivan Visconti. In Carlet C., Guilley S., Nitaj A., Souidi E. (eds) Codes, Cryptology and Information Security. C2SI 2019. Lecture Notes in Computer Science, vol 11445, pages 118-141, Rabat, Morocco, April 22-24, 2019, Springer, Cham. https://doi.org/10.1007/978-3-030-16458-4_9
  11. Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss, Vassilis Zikas. In IEEE Symposium on Security and Privacy (SP), 19-23 May 2019, Volume 1: 157-174. https://doi.ieeecomputersociety.org/10.1109/SP.2019.00063
  12. Proof-of-Stake Sidechains by Peter Gaži, Aggelos Kiayias and Dionysis Zindros. In IEEE Symposium on Security and Privacy (SP), 19-23 May 2019, pp. 139-156. doi: 10.1109/SP.2019.00040 
  13. DL-Extractable UC-Commitment Schemes by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac. In Robert Deng and Moti Yung, editors, ACNS 2019, Lecture Notes in Computer Science, Bogotá , Colombia, June 5-7, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-21568-2_19
  14. UC-Secure CRS Generation for SNARKs by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac. In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, Africacrypt 2019, Notes in Computer Science, Rabat, Morocco, July 9-11, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-23696-0_6
  15. On the Efficiency of Privacy-Preserving Smart Contract Systems by Karim Baghery. In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, Africacrypt 2019, Lecture Notes in Computer Science, Rabat, Morocco, July 9-11, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-23696-0_7
  16. Simulation Extractability in Groth's zk-SNARK by Shahla Atapoor and Karim Baghery. In ESORICS International Workshop on Cryptocurrencies and Blockchain Technology - CBT 2019, volume 11737 of Lecture Notes in Computer Science, Luxembourg, September 26-27, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-31500-9_22
  17. A Formal Treatment of Hardware Wallets by Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakosta, and Aggelos Kiayias. In Goldberg I., Moore T. (eds) Financial Cryptography and Data Security (FS), September 30, 2019. Lecture Notes in Computer Science, vol 11598. Springer, Cham https://doi.org/10.1007/978-3-030-32101-7_26
  18. Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings by Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn. In the proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, November 2019. https://doi.org/10.1145/3319535.3339817
  19. UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens by Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti. In Galbraith S., Moriai S. (eds) Advances in Cryptology – ASIACRYPT 2019. ASIACRYPT 2019. Lecture Notes in Computer Science, vol 11922, pages 577-605, Kobe, Japan, 8-12 December, 2019, Springer, Cham. https://doi.org/10.1007/978-3-030-34621-8_21
  20. Verified Security of BLT Signature Scheme by Ahto Buldas, Denis Firsov, Risto Laanoja and Ahto Truu. In the proceedings of the ACM SIGPLAN International Conference on Certified Programs and Proofs, New Orleans, USA, January 20-21, 2020. https://doi.org/10.1145/3372885.3373828
  21. SoK: A Consensus Taxonomy in the Blockchain Era by Juan Garay and Aggelos Kiayias. In: Jarecki S. (eds) Topics in Cryptology – CT-RSA 2020. CT-RSA 2020. Lecture Notes in Computer Science, vol 12006. Springer, Cham. https://doi.org/10.1007/978-3-030-40186-3_13
  22. Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era by Juan A. Garay, Aggelos Kiayias, Rafail M. Ostrovsky and Giorgos Panagiotakos. In Canteaut A., Ishai Y. (eds) Advances in Cryptology – EUROCRYPT 2020, May 1, 2020. Lecture Notes in Computer Science, vol 12106. Springer, Cham. https://doi.org/10.1007/978-3-030-45724-2_5
  23. How to Extract Useful Randomness from Unreliable Sources by Divesh Aggarwal, Maciej Obremski, João L. Ribeiro, Luisa Siniscalchi, Ivan Visconti. In Canteaut A., Ishai Y. (eds) Advances in Cryptology – EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, vol 12105, pages 343-372, Virtual, 11-14 May, 2020, Springer, Cham. https://doi.org/10.1007/978-3-030-45721-1_13 
  24. A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals by Niek J. Bouman and Niels de Vreede. In: Conti M., Zhou J., Casalicchio E., Spognardi A. (eds) Applied Cryptography and Network Security. ACNS 2020. Lecture Notes in Computer Science, vol 12146. Springer, Cham. https://doi.org/10.1007/978-3-030-57808-4_20
  25. Proof-of-Burn by Kostis Karantias, Aggelos Kiayias and Dionysis Zindros. In: Bonneau J., Heninger N. (eds) Financial Cryptography and Data Security, July 18, 2020. Lecture Notes in Computer Science, vol 12059. Springer, Cham. https://doi.org/10.1007/978-3-030-51280-4_28
  26. Black-Box Constructions of Bounded-Concurrent Secure Computation by Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti. In Clemente Galdi and Vladimir Kolesnikov, editors, SCN 20: 12th International Conference on Security in Communication Networks, volume 12238 of Lecture Notes in Computer Science, pages 87-107, Amalfi, Italy, September 14–16, 2020, Springer, Heidelberg, Germany.  https://doi.org/10.1007/978-3-030-57990-6_5
  27. Updatable blockchains by Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, and Dionysis Zindros. In Liqun Chen, Ninghui Li, Kaitai Liang, and Steve A. Schneider, editors, ESORICS 2020: 25th European Symposium on Research in Computer Security, Part II, volume 12309, Lecture Notes in Computer Science, pages 590–609, Guildford, UK, September 14–18, 2020. Springer, Heidelberg, Germany. https://doi.org/10.1007/978-3-030-59013-0_29
  28. On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs by Michele Ciampi, Roberto Parisella, and Daniele Venturi. In Clemente Galdi and Vladimir Kolesnikov, editors, SCN 20: 12th International Conference on Security in Communication Networks, volume 12238 of Lecture Notes in Computer Science, pages 670–690, Amalfi, Italy, September 14–16, 2020. Springer, Heidelberg, Germany. https://doi.org/10.1007/978-3-030-57990-6_33
  29. Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era by Aydin Abadi, Michele Ciampi, Aggelos Kiayias and Vassilis Zikas. In: Conti M., Zhou J., Casalicchio E., Spognardi A. (eds) Applied Cryptography and Network Security. ACNS 2020. Lecture Notes in Computer Science, vol 12146. Springer, Cham. https://doi.org/10.1007/978-3-030-57808-4_17 
  30. Round Optimal Secure Multiparty Computation from Minimal Assumptions by Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky. In: Pass R., Pietrzak K. (eds) Theory of Cryptography. TCC 2020. Lecture Notes in Computer Science, vol 12551. Springer, Cham. https://doi.org/10.1007/978-3-030-64378-2_11
  31. Privacy-preserving auditable token payments in a permissioned blockchain system by Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui and Bjoern Tackmann. In the proceedings of the 2nd ACM Conference on Advances in Financial Technologies (AFT '20), New York, USA, October 21 - 23, 2020. https://doi.org/10.1145/3419614.3423259
  32. Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation by Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang. In the proceedings of the 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) 2020. https://doi.org/10.1007/978-3-030-64840-4_24 
  33. Verifiable Multi-Party Business Process Automation by Joosep Simm, Jamie Steiner J., Ahto Truu. In: Del Río Ortega A., Leopold H., Santoro F.M. (eds) Business Process Management Workshops. BPM 2020. Lecture Notes in Business Information Processing, vol 397. Springer, Cham. https://doi.org/10.1007/978-3-030-66498-5_3
  34. Blockchains from Non-Idealized Hash Functions by Juan A. Garay, Aggelos Kiayias, and Giorgos Panagiotakos. In Pass R., Pietrzak K. (eds) Theory of Cryptography. TCC 2020. Lecture Notes in Computer Science, vol 12550. Springer, Cham. https://doi.org/10.1007/978-3-030-64375-1_11
  35. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System by Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti. In the proceedings of the Network and Distributed System Security Symposium (NDSS) 2021 CoronaDef Workshop, 21-25 February 2021, Volume to appear, pre-print here: https://eprint.iacr.org/2020/493.pdf
  36. Shielded Computations in Smart Contracts Overcoming Forks by Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti. In the proceedings of the Financial Cryptography and Data Security - 25th International Conference, FC 2021, March 1-5, 2021, Volume to appear, pre-print here: https://eprint.iacr.org/2019/891.pdf
  37. Efficient State Management in Distributed Ledgers by Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias. In the proceeding of the Financial Cryptography and Data Security - 25th International Conference, FC 2021, March 1-5, 2021. https://eprint.iacr.org/2021/183
  38. Another Look at Extraction and Randomization of Groth's zk-SNARK by Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov. In the proceedings of the 25th Financial Cryptography Conference (FC2021), 1-5 March 2021, Volume to appear, pre-print version here: https://fc21.ifca.ai/papers/262.pdf
  39. Mining for Privacy: How to Bootstrap a Snarky Blockchain by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. In the proceedings of the 25th Financial Cryptography Conference (FC2021), 1-5 March 2021, Volume to appear, pre-print version here: https://eprint.iacr.org/2020/401.pdf
  40. Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains by Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti. In the proceedings of the 24th edition of the International Conference on Practice and Theory of Public-Key Cryptography (PKC) 2021, 10-13 May 2021. https://doi.org/10.1007/978-3-030-75248-4_17 
  41. Multi-Client Functional Encryption for Separable Functions by Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner. In a book Public-Key Cryptography – PKC 2021, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, https://doi.org/10.1007/978-3-030-75245-3_26
  42. Dynamic Ad Hoc Clock Synchronization by Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas. In: Canteaut A., Standaert FX. (eds) Advances in Cryptology – EUROCRYPT 2021, June 16, 2021. Lecture Notes in Computer Science, vol 12698. Springer, Cham. https://doi.org/10.1007/978-3-030-77883-5_14
  43. Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems by Gennaro Avitabile, Daniele Friolo, Ivan Visconti. In the proceedings of the 19th International Conference on Applied Cryptography and Network Security (ACNS) 2021, 21-24 June 2021. https://doi.org/10.1007/978-3-030-78372-3_9 
  44. Kachina - Foundations of Private Smart Contracts by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. In the proceedings of the IEEE 34th Computer Security Foundations Symposium (CSF), June 21-24 2021, Volume 1: 47-62. https://doi.ieeecomputersociety.org/10.1109/CSF51468.2021.00002
  45. Efficient Secure Ridge Regression from Randomized Gaussian Elimination* by Frank Blom, Niek J. Bouman, Berry Schoenmakers and Niels de Vreede. In the proceeding Cyber Security Cryptography and Machine Learning, 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021. Volume 12716 of Lecture Notes in Computer Science, Springer. Volume to appear, pre-print here: https://eprint.iacr.org/2019/773
  46. Composition with Knowledge Assumptions* by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. In proceedings of the CRYPTO 2021, August 2021, Volume to appear, pre-print here: https://eprint.iacr.org/2021/165.pdf
  47. Threshold Garbled Circuits and Ad Hoc Secure Computation* by Michele Ciampi, Vipul Goyal, Rafail Ostrovsky. In the proceedings of the Eurocrypt 2021, October 2021, pre-print here: https://eprint.iacr.org/2021/308.pdf

Technical reports

  1. New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block Recursive Matrix Decomposition by Niek J. Bouman and Niels de Vreede. Cryptology ePrint Archive, Report 2018/703. Available at https://eprint.iacr.org/2018/703
  2. On QA-NIZK in the BPK Model by Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając. Cryptology ePrint Archive, Report 2018/877, 2018. Available at https://eprint.iacr.org/2018/877
  3. Proof-of-work sidechains by Aggelos Kiayias and Dionysis Zindros. Cryptology ePrint Archive, Report 2018/1048, 2018. Available at https://eprint.iacr.org/2018/1048
  4. Ouroboros-BFT: A simple Byzantine fault tolerant consensus protocol by Aggelos Kiayias and Alexander Russell. Cryptology ePrintArchive, Report 2018/1049, 2018. Available at https://eprint.iacr.org/2018/1049
  5. Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition by Matthias Fitzi, Peter Gaži, Aggelos Kiayias, and Alexander Russell. Cryptology ePrint Archive, Report 2018/1119. Available at https://eprint.iacr.org/2018/1119
  6. Multi-Protocol UC and its Use for Building Modular and Efficient Protocols by Jan Camenisch and Manu Drijvers and Björn Tackmann. Cryptology ePrint Archive, Report 2019/065, 2019. Available at https://eprint.iacr.org/2019/065
  7. Key-and-argument-updatable QA-NIZKs by Helger Lipmaa. Cryptology ePrintAarchive, Report 2019/333, 2019. Available at https://eprint.iacr.org/2019/333
  8. Simple yet efficient knowledge-sound and non-black-box any-simulation extractable ZK-SNARKs by Helger Lipmaa. Cryptology ePrint Archive, Report 2019/612, 2019. Available at https://eprint.iacr.org/2019/612
  9. Asymmetric Distributed Trust by Christian Cachin and Björn Tackmann, June 2019. Available at https://arxiv.org/abs/1906.09314 
  10. Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake by Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. Cryptology ePrint Archive, Report 2019/838. Available at https://eprint.iacr.org/2019/838
  11. Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric by Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui and Björn Tackmann. Cryptology ePrint Archive: Report 2019/1097. Available at https://eprint.iacr.org/2019/1097/20190929:183553
  12. Hydra: Fast Isomorphic State Channel by Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gaži, Philipp Kant, Aggelos Kiayias, and Alexander Russell. Cryptology ePrint Archive, Report 2020/299. Available at https://eprint.iacr.org/2020/299
  13. Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy by Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. Cryptology ePrint Archive, Report 2020/1021. Available at https://eprint.iacr.org/2020/1021
  14. Secure Quantum Two-Party Computation: Impossibility and Constructions by Michele Ciampi and Alexandru Cojocaru and Elham Kashefi and Atul Mantri. Cryptology ePrint Archive, Report 2020/1286, 2020. Available at  https://eprint.iacr.org/2020/1286
  15. Collusion-Preserving Computation without a Mediator by Michele Ciampi and Yun Lu and Vassilis Zikas. Cryptology ePrint Archive, Report 2020/497, 2020. Available at https://eprint.iacr.org/2020/497.
  16. Mir-BFT: High-Throughput Robust BFT for Decentralized Networks by Chrysoula Stathakopoulou, Tudor David, Matej Pavlovic and Marko Vukolić. Last revised January 2021. Available at https://arxiv.org/abs/1906.05552.
  17. Elmo: Recursive Virtual Payment Channels for Bitcoin by Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos. Cryptology ePrint Archive, Report 2021/747. Available at https://eprint.iacr.org/2021/747
  18. Towards Secure E-Voting with Everlasting Privacy (pdf)* by Avitabile Gennaro, Sven Heiberg, Helger Lipmaa, Janno Siim and Ivan Visconti. July 2021. 
* Published after official end of the project (30/6/2021)