Nelly Fazio's Publications

My research interests are in cryptography and information security, with a focus on foundations (public-key and non-commutative cryptography) and applications (content protection, access control, and security in military scenarios).

Electronic versions of my publications are available below.[Copyright Notice]

Books
[ PKC11 ]
D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi. Public Key Cryptography - PKC 2011 - 14th International on Practice and Theory in Public Key Cryptography. Taormina, Italy, March 6–9, 2011. Proceedings, Volume 6571 of Lecture Notes in Computer Science. Springer, 2011.
[PKC 2011] [ bib]
In Books
[ YFDL08 ]
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya. Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes. In Cryptology and Information Security Series on Identity-Based Cryptography. M. Joye and G. Neven Editors. IOS Press. 2008. Chapter 7, pages 101–119.
[PKC 2011] [ bib]
Articles in Refereed Journals
[ FINPS13 ]
N. Fazio, K. Iga, A. Nicolosi, L. Perret, and W.E. Skeith. Hardness of Learning Problems over Burnside Groups of Exponent 3. In Designs, Codes and Cryptography. Springer 2013.
[ bib | abstract | .pdf ]
[ ABFF09 ]
M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and Efficient Key Management for Access Hierarchies. In ACM Transactions on Information and System Security (TISSEC), 12(3):18:1–18:43, 2009.
[ bib | abstract | .pdf ]
[ DFKY05 ]
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung. Scalable Public-Key Tracing and Revoking. Invited to the Journal of Distributed Computing, 17(4):323–347, 2005.
[ bib | abstract | .pdf ]
Articles in Refereed Conference Proceedings
[ FGJS17 ]
N. Fazio, R. Gennaro, T. Jafarikhah, and W.E. Skeith. Homomorphic Secret Sharing from Paillier Encryption. In the 11th International Conference on Provable Security—ProvSec '17. Xi’an, China, October 23–25, 2017. Springer LNCS ?, pages ?–?.
[ bib | abstract | .pdf ]
[ FNP15 ]
N. Fazio, A. Nicolosi, and M. Perera, Oblivious Group Storage. In the Annual Conference of International Technology Alliance---ACITA '15. Maryland, USA, September 15–17, 2015.
[ bib | abstract | .pdf ]
[ SPDFGS14 ]
J. Soryal, M. Perera, I. Darwish, N. Fazio, R. Gennaro, and T. Saadawi. Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption. In the 28th IEEE International Conference on Advanced Information Networking and Applications—AINA '14. Victoria, Canada, May 13–16, 2014
[ bib | abstract | .pdf ]
[ FNP14 ]
N. Fazio, A. Nicolosi, and M. Perera, Broadcast Steganography. In RSA Conference Cryptographers' Track—CT–RSA '14. San Francisco, CA, USA, February 24–28, 2014. Springer LNCS 8366, pages 64–84.
[ bib | abstract | .pdf ]
[ FGPS13 ]
N. Fazio, R. Gennaro, M. Perera and W.E. Skeith, Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields. In the 33rd IACR International Cryptology Conference—CRYPTO '13. Santa Barbara, CA, USA. August 18–22, 2013. Springer LNCS 8043, pages 148–165.
[ bib | abstract | .pdf ]
[ FaPe12 ]
N. Fazio and M. Perera. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In the 15th IACR International Conference on Practice and Theory of Public-Key Cryptography—PKC '12). Darmstadt, Germany, May 21–23, 2012. Springer LNCS 7293, pages 225–242.
[ bib | abstract | .pdf ]
[ FaPe12b ]
N. Fazio and M. Perera. Protecting Receivers' Identities in Secure Data Distribution. In Annual Conference of International Technology Alliance—ACITA '12. Southampton, UK, September 17–21, 2012.
[ bib | abstract | .pdf ]
[ BFNSS11 ]
G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, and W.E. Skeith. Generalized Learning Problems and Applications to Non-Commutative Cryptography. In the 5th International Conference on Provable Security—ProvSec '11. Xi’an, China, October 16–18, 2011. Springer LNCS 6980, pages 324–339.
[ bib | abstract | .pdf ]
[ FaPo08 ]
N. Fazio, and D.B. Ponceleon. Tutorial on Content Protection. In ACM International Conference on Multimedia 2008. Vancouver, British Columbia, Canada, October 26–31, 2008. Pages 1153–1154.
[ bib | abstract | .pdf ]
[ FNP07 ]
N. Fazio, A. Nicolosi, and D.H. Phan. Traitor Tracing with Optimal Transmission Rate. In the 10th International Security Conference—ISC '07. Valparaiso, Chile, October 9–12, 2007. Springer LNCS 4779, pages 71–88.
[ bib | abstract | .pdf ]
[ DFN06 ]
I. Damgård, N. Fazio, and A. Nicolosi. Non-Interactive Zero-Knowledge from Homomorphic Encryption. In the 3rd IACR Theory of Cryptography Conference—TCC '06. New York, NY, USA, March 4–7, 2006. Springer LNCS 3876, pages 41–59.
[ bib | abstract | .pdf ]
[ BCFNY06 ]
E. Bresson, D. Catalano, N. Fazio, A. Nicolosi, and M. Yung. Output Privacy in Secure Multiparty Computation. In the 3rd Yet Another Conference on Cryptography—YACC '06. Porquerolles Island, France, June 19–23, 2006.
[ bib | abstract | .pdf ]
[ YFDL04 ]
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya. ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. In the 11th ACM Computer and Communications Security—CCS '04. Washington, DC, USA, October 25–29, 2004. ACM Press, pages 354–363.
[ bib | abstract | .pdf ]
[ DFKY03 ]
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung. Scalable Public-Key Tracing and Revoking. In the 22nd Annual Symposium on Principles of Distributed Computing—PODC '03. Boston, MA, USA, July 13–16, 2003. ACM Press pages 190–199.
[ bib | abstract | .pdf ]
[ DoFa03 ]
Y. Dodis and N. Fazio. Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. In the 6th IACR Practice and Theory of Public Key Cryptography—PKC '03. Miami, FL, USA, January 6–8, 2003. Springer LNCS 2567, pages 100–115.
[ bib | abstract | .pdf ]
[ DoFa02 ]
Y. Dodis and N. Fazio. Public-Key Broadcast Encryption for Stateless Receivers. In ACM Digital Rights Management—DRM '02. Washington, DC, USA, November 18, 2002. Springer LNCS 2696, pages 61–80.
[ bib | abstract | .pdf ]
Invited Abstracts
[ FINPS11-abstract ]
N. Fazio, K. Iga, A. Nicolosi, L. Perret, and W.E. Skeith. Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3. In Joint AMS/SAMS International Congress of the American and South African Mathematical Societies (Special Session: Combinatorial and computational group theory with applications). Porth Elizabeth, South Africa, November 29–December 3, 2011.
[ bib | .pdf ]
[ FaSk10-abstract ]
N. Fazio, and W.E. Skeith. Group-Theoretic Cryptography: Respice, Adspice, Prospice. In AMS Sectional Meetings (Special Session: Groups, Computation, and Applications). Newark, NJ, USA, May 22–23, 2010.
[ bib | .pdf ]
[ Faz09-abstract ]
N. Fazio. Bilinear Groups and Algebraic Cryptography. In AMS/MAA Joint Mathematics Meetings (Special Session on Algebraic Cryptography and Generic Complexity). Washington, DC, USA, January 5–8, 2009.
[ bib | .pdf ]
Patents
[ FWG10-patent ]
N. Fazio, T.M. Wong, and R. Golding. Method For Authenticated Communication In Dynamic Federated Environments. U.S. Patent Application, Publication Number UC 2010/0037055 A1, 2010.
Theses
[ Faz06-thesis ]
N. Fazio. On Cryptographic Techniques for Digital Rights Management. New York University, 2006. PhD thesis
[ bib | abstract | .pdf ]
[ Faz01-thesis ]
N. Fazio. Nuove Tecniche Crittografiche per le Trasmissioni su Larga Scala. Università di Catania, 2001. Tesi di Laurea (in Italian).
[ bib | abstract | .pdf ]
Technical Reports
[ FGPS13-full ]
N. Fazio, R. Gennaro, M. Perera and W.E. Skeith, Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields. In Cryptology E-Print Archive, 2013. Full version of [FGPS13].
[ bib | abstract | .pdf ]
[ FNP13-full ]
N. Fazio, A. Nicolosi, and M. Perera, Broadcast Steganography. In Cryptology E-Print Archive, 2013. Full version of [FNP14].
[ bib | abstract | .pdf ]
[ FaPe12-full ]
N. Fazio and M. Perera, Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In Cryptology E-Print Archive, 2012. Full version of [FaPe12].
[ bib | abstract | .pdf ]
[ FINPS11-full ]
N. Fazio, K. Iga, A. Nicolosi, L. Perret, and W.E. Skeith, Hardness of Learning Problems over Burnside Groups of Exponent 3. In Cryptology E-Print Archive, 2011. Full version of [BFNSS13].
[ bib | abstract | .pdf ]
[ BFNSS11-full ]
G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, and W.E. Skeith. Generalized Learning Problems and Applications to Non-Commutative Cryptography. In Cryptology E-Print Archive, 2011. Full version of [BFNSS11].
[ bib | abstract | .pdf ]
[ FWG08 ]
N. Fazio, T.M. Wong, and R. Golding. Authenticated Communication in Dynamic Federated Systems. Manuscript, 2008.
[ bib | abstract | .pdf ]
[ ABFF06 ]
M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and Efficient Key Management for Access Hierarchies. In CERIAS Technical Report TR 2006-09, Purdue University, 2006.
[ bib | abstract | .pdf ]
[ YFDL04-full ]
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya. ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. In Cryptology E-Print Archive, 2004. Full version of [YFDL04].
[ bib | abstract | .pdf ]
[ DFKY04-full ]
Y. Dodis, N. Fazio, A. Kiayias, and M. Yung. Scalable Public-Key Tracing and Revoking. In Cryptology E-Print Archive, 2004. Full version of [DFKY03].
[ bib | abstract | .pdf ]
[ DoFa03-full ]
Y. Dodis and N. Fazio. Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. In Cryptology E-Print Archive, 2003. Full version of [DoFa03].
[ bib | abstract | .pdf ]
[ FaNi03 ]
N. Fazio, and A. Nicolosi. Cryptographic Accumulators: Definitions, Constructions and Applications. Manuscript, 2003.
[ bib | abstract | .pdf ]
[ FaNi00 ]
N. Fazio, and A. Nicolosi. Relations between Formal and Semi-formal Specification Systems: a Case Study. Manuscript, 2000.
[ bib | abstract | .pdf ]


The documents distributed by this server have been provided as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that the works are offered here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be distributed without the explicit permission of the copyright holder.

Copyright © Nelly Fazio