Aarhus University Seal / Aarhus Universitets segl

Claudio Orlandi

  1. 2020
  2. Published

    Security of Hedged Fiat–Shamir Signatures under Fault Attacks. / Aranha, Diego F.; Orlandi, Claudio; Takahashi, Akira; Zaverucha, Greg.

    39th Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2020. Springer, 2020. p. 644-674 (Lecture Notes in Computer Science, Vol. 12105).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  3. 2019
  4. Published

    Quisquis: A New Design for Anonymous Cryptocurrencies. / Fauzi, Prastudy Mungkas; Meiklejohn, Sarah; Mercer, Rebekah Hannah; Orlandi, Claudio.

    Advances in Cryptology – ASIACRYPT 2019. 2019. p. 649-678 (Lecture Notes in Computer Science, Vol. 11921).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  5. Published

    TOPPool : Time-aware Optimized Privacy-Preserving Ridesharing. / Pagnin, Elena; Gunnarsson, Gunnar; Talebi, Pedram; Orlandi, Claudio; Sabelfeld, Andrei.

    In: Proceedings on Privacy Enhancing Technologies, Vol. 2019, No. 4, 10.2019, p. 93-111.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  6. Published

    Proofs of Replicated Storage Without Timing Assumptions. / Damgård, Ivan Bjerre; Ganesh, Chaya; Orlandi, Claudio.

    Advances in Cryptology – CRYPTO 2019 . Springer, 2019. p. 355-380 (Lecture Notes in Computer Science, Vol. 11692).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  7. Published

    Commodity-Based 2PC for Arithmetic Circuits. / Damgård, Ivan; Haagh, Helene; Nielsen, Michael; Orlandi, Claudio.

    Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. ed. / Martin Albrecht. Springer, 2019. p. 154-177 (Lecture Notes in Computer Science, Vol. 11929).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  8. Published

    Commodity-Based 2PC for Arithmetic Circuits. / Damgård, Ivan Bjerre; Haagh, Helene; Nielsen, Michael; Orlandi, Claudio.

    Cryptology ePrint Archive. 2019.

    Research output: Other contributionNet publication - Internet publicationResearch

  9. Published

    Proof-of-Stake Protocols for Privacy-Aware Blockchains. / Ganesh, Chaya; Orlandi, Claudio; Tschudi, Daniel.

    Advances in Cryptology – EUROCRYPT 2019 . ed. / Yuval Ishai; Vincent Rijmen. Cham : Springer, 2019. p. 690-719 (Lecture Notes in Computer Science, Vol. 11476).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  10. Published

    Sharing Information with Competitors. / Branzei, Simina; Orlandi, Claudio; Yang, Guang.

    Algorithmic Game Theory: SAGT 2019. ed. / Dimitris Fotakis; Evangelos Markakis. Cham : Springer, 2019. p. 34-48 (Lecture Notes in Computer Science, Vol. 11801).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  11. 2018
  12. Published

    Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. / Dalskov, Anders P. K.; Orlandi, Claudio.

    ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. ed. / Jong Kim; Gail-Joon Ahn; Seungjoo Kim. New York, NY, USA : Association for Computing Machinery, 2018. p. 343-355 (ASIACCS '18).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  13. Published

    Combining Private Set-Intersection with Secure Two-Party Computation. / Ciampi, Michele; Orlandi, Claudio.

    Security and Cryptography for Networks. ed. / Dario Catalano; Roberto De Prisco. Vol. 11035 Cham : Springer VS, 2018. p. 464-482 (Lecture Notes in Computer Science (LNCS); No. 11035).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  14. Published

    Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. / Damgård, Ivan; Orlandi, Claudio; Simkin, Mark.

    Advances in Cryptology - CRYPTO 2018. ed. / Hovav Shacham; Alexandra Boldyreva. Vol. 10992 Cham : Springer VS, 2018. p. 799-829 (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  15. 2017
  16. Published

    Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. / Chase, Melissa; Derler, David; Goldfeder, Steven; Orlandi, Claudio; Ramacher, Sebastian; Rechberger, Christian; Slamanig, Daniel; Zaverucha, Greg.

    CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : Association for Computing Machinery, 2017. p. 1825-1842 (CCS '17).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  17. Published

    Access Control Encryption for Equality, Comparison, and More. / Fuchsbauer, Georg; Gay, Romain; Kowalczyk, Lucas; Orlandi, Claudio.

    Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II. ed. / Serge Fehr. Vol. 10175 Springer, Berlin, Heidelberg : Springer VS, 2017. p. 88-118 (Lecture Notes in Computer Science, Vol. 10175).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  18. Published

    Faster Zero-Knowledge Protocols and Applications : Invited Talk Abstract. / Orlandi, Claudio.

    Innovative Security Solutions for Information Technology and Communications - 10th International Conference,SecITC 2017, Revised Selected Papers: Innovative Security Solutions for Information Technology and Communications. ed. / Pooya Farshim; Emil Simion. Vol. 10543 Springer VS, 2017. p. 1-11 (Lecture Notes in Computer Science, Vol. 10543).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  19. Published

    Revealing Encryption for Partial Ordering. / Haagh, Helene; Ji, Yue; Li, Chenxing; Orlandi, Claudio; Song, Yifan.

    Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings. ed. / Maire O’Neill. Cham : Springer VS, 2017. p. 3-22 (Lecture Notes in Computer Science, Vol. 10655).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  20. Published

    PrivatePool: Privacy-Preserving Ridesharing. / Hallgren, Per A.; Orlandi, Claudio; Sabelfeld, Andrei.

    30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017. IEEE Press, 2017. p. 276-291.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  21. Published

    Security of Symmetric Primitives under Incorrect Usage of Keys. / Farshim, Pooya; Orlandi, Claudio; Rosie, Razvan.

    In: IACR Trans. Symmetric Cryptol., Vol. 2017, No. 1, 2017, p. 449-473.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

  22. 2016
  23. Published

    On the CCA (in)security of MTProto. / Jakobsen, Jakob; Orlandi, Claudio.

    Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices: SPSM '16. New York, NY, USA : Association for Computing Machinery, 2016. p. 113-116.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  24. Published

    A Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas P.; Nielsen, Jesper Buus; Orlandi, Claudio.

    2016Internet Archive.

    Research output: Other contributionNet publication - Internet publicationResearch

  25. Published

    Access Control Encryption: Enforcing Information Flow with Cryptography. / Damgård, Ivan Bjerre; Haagh, Helene Flyvholm; Orlandi, Claudio.

    TCC 2016-B: Fourteenth IACR Theory of Cryptography Conference. ed. / Martin Hirt; Adam Smith. Vol. 9986 Springer VS, 2016. p. 547-576 (Lecture Notes in Computer Science, Vol. 9986).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  26. Published

    Cross and Clean: Amortized Garbled Circuits with Constant Overhead. / Nielsen, Jesper Buus; Orlandi, Claudio.

    Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I. ed. / Martin Hirt; Adam Smith. Vol. 9985 Berlin : Springer VS, 2016. p. 582-603 (Lecture Notes in Computer Science (LNCS), Vol. 9985).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  27. Published

    How To Bootstrap Anonymous Communication. / Jakobsen, Sune K.; Orlandi, Claudio.

    Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016. New York, NY : Association for Computing Machinery, 2016. p. 333-344.

    Research output: Contribution to book/anthology/report/proceedingBook chapterResearchpeer-review

  28. Published

    Non-Interactive Verifiable Secret Sharing for Monotone Circuits. / Bai, Ge; Damgård, Ivan; Orlandi, Claudio; Xia, Yu.

    Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. ed. / David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Vol. 9646 Springer VS, 2016. p. 225-244 (Lecture Notes in Computer Science (LNCS), Vol. 9646).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  29. Published

    Revealing Encryption for Partial Ordering. / Haagh, Helene; Ji, Yue; Li, Chenxing; Orlandi, Claudio; Song, Yifan.

    2016Internetudgivelse.

    Research output: Other contributionNet publication - Internet publicationResearch

  30. Published

    ZKBoo: Faster Zero-Knowledge for Boolean Circuits. / Giacomelli, Irene; Madsen, Jesper; Orlandi, Claudio.

    25th USENIX Security Symposium : (USENIX Security 16). USENIX - The Advanced Computing Systems Association, 2016. p. 1069-1083.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  31. 2015
  32. Published

    High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. / Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela ; Scholl, Peter; Smart, Nigel P.

    2015Report 2015/472.

    Research output: Other contributionNet publication - Internet publicationResearch

  33. Published

    How to Bootstrap Anonymous Communication. / Jakobsen, Sune K.; Orlandi, Claudio.

    2015IACR eprint.

    Research output: Other contributionNet publication - Internet publicationResearch

  34. Published

    How to Bootstrap Anonymous Communication. / Jakobsen, Sune K.; Orlandi, Claudio.

    2015Arxiv eprint.

    Research output: Other contributionNet publication - Internet publicationResearch

  35. Published

    On the CCA (in)security of MTProto. / Jakobsen, Jakob; Orlandi, Claudio.

    2015Report 2015/1177.

    Research output: Other contributionNet publication - Internet publicationResearch

  36. Published

    Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio.

    Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. ed. / Elisabeth Oswald; Marc Fischlin. Springer VS, 2015. p. 191-219 (Lecture Notes in Computer Science, Vol. 9057).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  37. Published

    Privacy-enhancing overlays in bitcoin. / Meiklejohn, Sarah; Orlandi, Claudio.

    Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. ed. / Michael Brenner ; Nicolas Christin ; Benjamin Johnson ; Kurt Rohloff . Vol. 8976 Springer, 2015. p. 127-141 (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  38. Published

    The Simplest Protocol for Oblivious Transfer. / Chou, Tung; Orlandi, Claudio.

    2015eprint.

    Research output: Other contributionNet publication - Internet publicationResearch

  39. Published

    The simplest protocol for oblivious transfer. / Chou, Tung; Orlandi, Claudio.

    Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. ed. / Kristin Lauter ; Francisco Rodríguez-Henríquez . Vol. 9230 Springer, 2015. p. 40-58 (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  40. 2014
  41. Published

    Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Orlandi, Claudio.

    Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14 . ed. / Gail-Joon Ahn ; Alina Oprea; Reihaneh Safavi-Naini. Association for Computing Machinery, 2014. p. 81-92 .

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  42. Published

    Obfuscation ⇒ (IND-CPA Security ⇏ Circular Security). / Marcedone , Antonio ; Orlandi, Claudio.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. ed. / Michel Abdalla ; Roberto De Prisco . Springer VS, 2014. p. 77-90 (Lecture Notes in Computer Science, Vol. 8642).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  43. Published
  44. Published

    Publicly Auditable Secure Multi-Party Computation. / Baum, Carsten; Damgård, Ivan Bjerre; Orlandi, Claudio.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. ed. / Michel Abdalla ; Roberto De Prisco . Springer VS, 2014. p. 175-196 (Lecture Notes in Computer Science, Vol. 8642).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  45. Published

    Statistical Concurrent Non-malleable Zero Knowledge. / Orlandi, Claudio; Ostrovsky, Rafail; Rao, Vanishree; Sahai, Amit; Visconti, Ivan.

    Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings. ed. / Yehuda Lindell. Springer Publishing Company, 2014. p. 167-191 (Lecture Notes in Computer Science, Vol. 8349).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  46. 2013
  47. Published

    Zero-knowledge using garbled circuits : Or how to prove non-algebraic statements efficiently. / Jawurek, Marek; Kerschbaum, Florian; Orlandi, Claudio.

    Proceedings of the ACM Conference on Computer and Communications Security, CCS '13. ed. / Ahmad-Reza Sadeghi ; Virgil Gligor; Moti Yung . Association for Computing Machinery, 2013. p. 955-966 (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  48. Published

    Hiding the Input-Size in Secure Two-Party Computation. / Lindell, Yehuda ; Nissim, Kobbi ; Orlandi, Claudio.

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II. ed. / Kazue Sako; Palash Sarkar. Vol. 8197 Springer VS, 2013. p. 421-440 (Lecture Notes in Computer Science, Vol. 8270).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  49. Published

    MiniLEGO : Efficient secure two-party computation from general assumptions. / Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.

    Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. ed. / Thomas Johansson; Phong Q. Nguyen. Springer VS, 2013. p. 537-556 (Lecture Notes in Computer Science, Vol. 7881 ).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  50. Published

    On the Power of Correlated Randomness in Secure Computation. / Ishai, Yuval ; Kushilevitz, Eyal ; Meldgaard, Sigurd Torkel; Orlandi, Claudio; Paskin-Cherniavsky, Anat .

    Theory of Cryptography: 10th TCC 2013. Proceedings. ed. / Amit Sahai. Springer VS, 2013. p. 600-620 (Lecture Notes in Computer Science, Vol. 7785).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  51. 2012
  52. Published

    Privacy-aware mechanism design. / Nissim, K.; Orlandi, Claudio; Smorodinsky, R.

    Proceedings of the ACM Conference on Electronic Commerce, EC '12. ed. / Boi Faltings. Association for Computing Machinery, 2012. p. 774-789.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  53. Published

    Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity. / Asharov, Gilad; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 7658, 2012, p. 681-698 .

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  54. 2011
  55. Published

    Is Multiparty Computation Any Good In Practice? / Orlandi, Claudio.

    In: I E E E International Conference on Acoustics, Speech and Signal Processing. Proceedings, 2011, p. 5848-5851.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  56. Published

    Lower and Upper Bounds for Deniable Public-Key Encryption. / Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 125-142.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  57. Published

    On Invertible Sampling and Adaptive Security. / Ishai, Yuval; Kumarasubramanian, Abishek; Orlandi, Claudio; Sahai, Amit.

    In: Lecture Notes in Computer Science, Vol. 6477, 2011, p. 466-482.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  58. Published

    Secure Computation in Untrusted Environments. / Orlandi, Claudio.

    Department of Computer Science, Aarhus University, 2011. 130 p.

    Research output: Book/anthology/dissertation/reportPh.D. thesisResearch

  59. Published

    Semi-Homomorphic Encryption and Multiparty Computation. / Bendlin, Rikke; Damgård, Ivan Bjerre; Orlandi, Claudio; Zakarias, Sarah Nouhad Haddad.

    In: Lecture Notes in Computer Science, Vol. 6632, 2011, p. 169-188.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  60. 2010
  61. Published

    Multiparty Computation for Dishonest Majority : From Passive to Active Security at Low Cost. / Damgård, Ivan Bjerre; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 6223, 2010, p. 558-576.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  62. Published

    On the Necessary and Sufficient Assumptions for UC Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5978, 2010, p. 109-127.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  63. 2009
  64. Published

    Essentially Optimal Universally Composable Oblivious Transfer. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5461, 2009, p. 1-14.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review

  65. Published

    LEGO for Two-Party Secure Computation. / Nielsen, Jesper Buus; Orlandi, Claudio.

    In: Lecture Notes in Computer Science, Vol. 5444, 2009, p. 368-386.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperConference articleResearchpeer-review