Nelly Fazio's Publications
My research interests are in cryptography and
information security, with a focus on foundations (public-key and
non-commutative cryptography) and applications (content protection,
access control, and security in military scenarios).
Electronic versions of my publications are available below.[Copyright Notice]
Books
-
[ PKC11 ]
-
D. Catalano,
N. Fazio,
R. Gennaro,
and A. Nicolosi.
Public Key Cryptography - PKC 2011 - 14th
International on Practice and Theory in Public Key
Cryptography. Taormina, Italy,
March 6–9, 2011. Proceedings, Volume 6571 of Lecture Notes in
Computer Science. Springer, 2011.
[ bib]
In Books
-
[ YFDL08 ]
-
D. Yao,
N. Fazio, Y. Dodis,
and A. Lysyanskaya.
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes.
In Cryptology and Information Security Series on Identity-Based
Cryptography. M. Joye and G. Neven Editors. IOS
Press. 2008. Chapter 7, pages 101–119.
[ bib]
Articles in Refereed Journals
-
[ FINPS13 ]
-
N. Fazio,
K. Iga,
A. Nicolosi,
L. Perret,
and W.E. Skeith.
Hardness of Learning Problems over Burnside
Groups of Exponent 3.
In Designs, Codes and Cryptography. Springer 2015.
[ bib |
abstract |
.pdf ]
-
[ ABFF09 ]
-
M. Atallah,
M. Blanton,
N. Fazio, and K. Frikken.
Dynamic and Efficient Key Management for
Access Hierarchies.
In ACM Transactions on Information and System Security
(TISSEC), 12(3):18:1–18:43, 2009.
[ bib |
abstract |
.pdf ]
-
[ DFKY05 ]
-
Y. Dodis,
N. Fazio,
A. Kiayias,
and M. Yung.
Scalable Public-Key Tracing and Revoking.
Invited to the Journal of Distributed Computing,
17(4):323–347, 2005.
[ bib |
abstract |
.pdf ]
Articles in Refereed Conference Proceedings
-
[ FGJS17 ]
-
N. Fazio,
R. Gennaro,
T. Jafarikhah,
and W.E. Skeith.
Homomorphic Secret Sharing from Paillier Encryption.
In the 11th International Conference on Provable Security—ProvSec
'17. Xi’an, China, October 23–25, 2017. Springer LNCS ?, pages ?–?.
[ bib |
abstract |
.pdf ]
-
[ FNP15 ]
-
N. Fazio,
A. Nicolosi,
and M. Perera,
Oblivious Group Storage.
In the Annual Conference of International Technology
Alliance---ACITA '15. Maryland, USA, September
15–17, 2015.
[ bib |
abstract |
.pdf ]
-
[ SPDFGS14 ]
-
J. Soryal,
M. Perera,
I. Darwish, N. Fazio,
R. Gennaro,
and T. Saadawi.
Combating Insider Attacks in IEEE 802.11
Wireless Networks with Broadcast Encryption.
In the 28th IEEE International Conference on Advanced Information
Networking and Applications—AINA '14. Victoria, Canada,
May 13–16, 2014
[ bib |
abstract |
.pdf ]
-
[ FNP14 ]
-
N. Fazio,
A. Nicolosi,
and M. Perera,
Broadcast Steganography.
In RSA Conference Cryptographers' Track—CT–RSA
'14. San Francisco, CA, USA, February 24–28,
2014. Springer LNCS 8366, pages 64–84.
[ bib |
abstract |
.pdf ]
-
[ FGPS13 ]
-
N. Fazio,
R. Gennaro,
M. Perera
and W.E. Skeith,
Hardcore Predicates for a Diffie-Hellman
Problem over Finite Fields.
In the 33rd IACR International Cryptology Conference—CRYPTO
'13. Santa Barbara, CA, USA. August 18–22, 2013. Springer
LNCS 8043, pages 148–165.
[ bib |
abstract |
.pdf ]
-
[ FaPe12 ]
-
N. Fazio
and M. Perera.
Outsider-Anonymous Broadcast Encryption
with Sublinear Ciphertexts.
In the 15th IACR International Conference on Practice and Theory of
Public-Key Cryptography—PKC '12). Darmstadt, Germany,
May 21–23, 2012. Springer LNCS 7293, pages
225–242.
[ bib |
abstract |
.pdf ]
-
[ FaPe12b ]
-
N. Fazio and M. Perera.
Protecting Receivers' Identities in Secure
Data Distribution.
In Annual Conference of International Technology
Alliance—ACITA '12. Southampton, UK, September
17–21, 2012.
[ bib |
abstract |
.pdf ]
-
[ BFNSS11 ]
-
G. Baumslag,
N. Fazio, A. Nicolosi,
V. Shpilrain,
and W.E. Skeith.
Generalized Learning Problems and
Applications to Non-Commutative Cryptography.
In the 5th International Conference on Provable Security—ProvSec
'11. Xi’an, China, October 16–18, 2011. Springer LNCS 6980, pages 324–339.
[ bib |
abstract |
.pdf ]
-
[ FaPo08 ]
-
N. Fazio, and D.B. Ponceleon.
Tutorial on Content Protection.
In ACM International Conference on Multimedia
2008. Vancouver, British Columbia, Canada, October 26–31,
2008. Pages 1153–1154.
[ bib |
abstract |
.pdf ]
-
[ FNP07 ]
-
N. Fazio,
A. Nicolosi,
and D.H. Phan.
Traitor Tracing with Optimal Transmission Rate.
In the 10th International Security Conference—ISC
'07. Valparaiso, Chile, October 9–12, 2007. Springer LNCS
4779, pages 71–88.
[ bib |
abstract |
.pdf ]
-
[ DFN06 ]
-
I. Damgård,
N. Fazio,
and A. Nicolosi.
Non-Interactive Zero-Knowledge from Homomorphic Encryption.
In the 3rd IACR Theory of Cryptography Conference—TCC
'06. New York, NY, USA, March 4–7, 2006. Springer LNCS 3876,
pages 41–59.
[ bib |
abstract |
.pdf ]
-
[ BCFNY06 ]
-
E. Bresson,
D. Catalano,
N. Fazio,
A. Nicolosi,
and M. Yung.
Output Privacy in Secure Multiparty Computation.
In the 3rd Yet Another Conference on Cryptography—YACC
'06. Porquerolles Island, France, June 19–23, 2006.
[ bib |
abstract |
.pdf ]
-
[ YFDL04 ]
-
D. Yao,
N. Fazio, Y. Dodis,
and A. Lysyanskaya.
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
In the 11th ACM Computer and Communications Security—CCS
'04. Washington, DC, USA, October 25–29, 2004. ACM Press,
pages 354–363.
[ bib |
abstract |
.pdf ]
-
[ DFKY03 ]
-
Y. Dodis,
N. Fazio,
A. Kiayias, and
M. Yung.
Scalable Public-Key Tracing and Revoking.
In the 22nd Annual Symposium on Principles of Distributed
Computing—PODC '03. Boston, MA, USA, July 13–16,
2003. ACM Press pages 190–199.
[ bib |
abstract |
.pdf ]
-
[ DoFa03 ]
-
Y. Dodis and
N. Fazio.
Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
In the 6th IACR Practice and Theory of Public Key Cryptography—PKC
'03. Miami, FL, USA, January 6–8, 2003. Springer LNCS 2567, pages 100–115.
[ bib |
abstract |
.pdf ]
-
[ DoFa02 ]
-
Y. Dodis and
N. Fazio.
Public-Key Broadcast Encryption for Stateless
Receivers.
In ACM Digital Rights Management—DRM '02. Washington,
DC, USA, November 18, 2002. Springer LNCS 2696, pages
61–80.
[ bib |
abstract |
.pdf ]
Invited Abstracts
-
[ FINPS11-abstract ]
-
N. Fazio, K. Iga, A. Nicolosi, L. Perret,
and W.E. Skeith.
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
In Joint AMS/SAMS International Congress of the American and
South African Mathematical Societies (Special Session:
Combinatorial and computational group theory with
applications). Porth Elizabeth, South Africa, November
29–December 3, 2011.
[ bib |
.pdf ]
-
[ FaSk10-abstract ]
-
N. Fazio, and W.E. Skeith.
Group-Theoretic Cryptography:
Respice, Adspice, Prospice.
In AMS Sectional Meetings (Special Session: Groups, Computation,
and Applications). Newark, NJ, USA, May 22–23, 2010.
[ bib |
.pdf ]
-
[ Faz09-abstract ]
-
N. Fazio.
Bilinear Groups and Algebraic Cryptography.
In AMS/MAA Joint Mathematics Meetings (Special Session on
Algebraic Cryptography and Generic Complexity). Washington, DC,
USA, January 5–8, 2009.
[ bib |
.pdf ]
Patents
-
[ FWG10-patent ]
-
N. Fazio, T.M. Wong, and R. Golding.
Method For Authenticated Communication In Dynamic Federated Environments.
U.S. Patent Application, Publication Number UC 2010/0037055
A1, 2010.
Theses
-
[ Faz06-thesis ]
-
N. Fazio.
On Cryptographic Techniques for Digital Rights Management.
New York University, 2006. PhD thesis
[ bib |
abstract |
.pdf ]
-
[ Faz01-thesis ]
-
N. Fazio.
Nuove Tecniche Crittografiche per le Trasmissioni su Larga Scala.
Università di Catania, 2001. Tesi di Laurea (in
Italian).
[ bib |
abstract |
.pdf ]
Technical Reports
-
[ FGPS13-full ]
-
N. Fazio,
R. Gennaro,
M. Perera
and W.E. Skeith,
Hardcore Predicates for a Diffie-Hellman
Problem over Finite Fields.
In Cryptology E-Print Archive, 2013. Full version of [FGPS13].
[ bib |
abstract |
.pdf ]
-
[ FNP13-full ]
-
N. Fazio,
A. Nicolosi,
and M. Perera,
Broadcast Steganography.
In Cryptology E-Print Archive, 2013. Full version of [FNP14].
[ bib |
abstract |
.pdf ]
-
[ FaPe12-full ]
-
N. Fazio
and M. Perera,
Outsider-Anonymous Broadcast Encryption with
Sublinear Ciphertexts.
In Cryptology E-Print Archive, 2012. Full version of [FaPe12].
[ bib |
abstract |
.pdf ]
-
[ FINPS11-full ]
-
N. Fazio, K. Iga,
A. Nicolosi, L. Perret,
and W.E. Skeith,
Hardness of Learning Problems over Burnside
Groups of Exponent 3.
In Cryptology E-Print Archive, 2011. Full version of [BFNSS13].
[ bib |
abstract |
.pdf ]
-
[ BFNSS11-full ]
-
G. Baumslag,
N. Fazio, A. Nicolosi,
V. Shpilrain,
and W.E. Skeith.
Generalized Learning Problems and
Applications to Non-Commutative Cryptography.
In Cryptology E-Print Archive, 2011. Full version of [BFNSS11].
[ bib |
abstract |
.pdf ]
-
[ FWG08 ]
-
N. Fazio, T.M. Wong, and R. Golding.
Authenticated Communication in Dynamic Federated Systems.
Manuscript, 2008.
[ bib |
abstract |
.pdf ]
-
[ ABFF06 ]
-
M. Atallah, M. Blanton,
N. Fazio, and K. Frikken.
Dynamic and Efficient Key Management for Access Hierarchies.
In CERIAS Technical Report TR 2006-09, Purdue University, 2006.
[ bib |
abstract |
.pdf ]
-
[ YFDL04-full ]
-
D. Yao,
N. Fazio, Y. Dodis,
and A. Lysyanskaya.
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
In Cryptology E-Print Archive, 2004. Full version of [YFDL04].
[ bib |
abstract |
.pdf ]
-
[ DFKY04-full ]
-
Y. Dodis,
N. Fazio, A. Kiayias, and
M. Yung.
Scalable Public-Key Tracing and Revoking.
In Cryptology E-Print Archive, 2004. Full version of [DFKY03].
[ bib |
abstract |
.pdf ]
-
[ DoFa03-full ]
-
Y. Dodis and
N. Fazio.
Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
In Cryptology E-Print Archive, 2003. Full version of [DoFa03].
[ bib |
abstract |
.pdf ]
-
[ FaNi03 ]
-
N. Fazio, and A. Nicolosi.
Cryptographic Accumulators: Definitions, Constructions and Applications.
Manuscript, 2003.
[ bib |
abstract |
.pdf ]
-
[ FaNi00 ]
-
N. Fazio, and A. Nicolosi.
Relations between Formal and
Semi-formal Specification Systems: a Case Study.
Manuscript, 2000.
[ bib |
abstract |
.pdf ]