About

Brief Bio:

I received my Ph.D. from the Massachusetts Institute of Technology in 1996, and was a researcher at the IBM T.J.Watson Research Center before joining City College in the Summer of 2012. My research focuses on cryptography and network security and more in general on theoretical computer science. My most recent works address the security of the cloud computing infrastructure, the issues of privacy and anonymity in electronic communication, and proactive security to minimize the effects of system break-ins.

Interests

Google Presence

Projects

Papers

2020
One Round Threshold ECDSA with Identifiable Abort.
One Round Threshold ECDSA with Identifiable Abort.
R Gennaro, S Goldfeder
IACR Cryptol. ePrint Arch. 2020, 540
2
2020
2018
Fine-grained secure computation
Fine-grained secure computation
M Campanelli, R Gennaro
Theory of Cryptography Conference, 66-97
6
2018
2018
Threshold cryptosystems from threshold fully homomorphic encryption
Threshold cryptosystems from threshold fully homomorphic encryption
D Boneh, R Gennaro, S Goldfeder, A Jain, S Kim, PMR Rasmussen, ...
Annual International Cryptology Conference, 565-596
0
2018
2018
Fast multiparty threshold ECDSA with fast trustless setup
Fast multiparty threshold ECDSA with fast trustless setup
R Gennaro, S Goldfeder
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …
39
2018
2018
Lattice-based zk-SNARKs from square span programs
Lattice-based zk-SNARKs from square span programs
R Gennaro, M Minelli, A Nitulescu, M Orrù
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …
18
2018
2017
Zero-knowledge contingent payments revisited: Attacks and payments for services
Zero-knowledge contingent payments revisited: Attacks and payments for services
M Campanelli, R Gennaro, S Goldfeder, L Nizzardo
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …
57
2017
2017
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
International Conference on Provable Security, 381-399
12
2017
2017
Efficient rational proofs for space bounded computations
Efficient rational proofs for space bounded computations
M Campanelli, R Gennaro
International Conference on Decision and Game Theory for Security, 53-73
7
2017
2017
Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security
Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security
D Boneh, R Gennaro, S Goldfeder
International Conference on Cryptology and Information Security in Latin …
11
2017
2017
Verifiable outsourced computation: A survey
Verifiable outsourced computation: A survey
R Gennaro
Proceedings of the ACM Symposium on Principles of Distributed Computing, 313-313
1
2017
2017
2017
Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin
Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin
S Goldfeder, J Bonneau, R Gennaro, A Narayanan
International Conference on Financial Cryptography and Data Security, 321-339
28
2017
2016
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
R Gennaro, S Goldfeder, A Narayanan
International Conference on Applied Cryptography and Network Security, 156-174
107
2016
2015
Sequentially composable rational proofs
Sequentially composable rational proofs
M Campanelli, R Gennaro
International Conference on Decision and Game Theory for Security, 270-288
15
2015
2015
Highly scalable verifiable encrypted search
Highly scalable verifiable encrypted search
WA Drazen, E Ekwedike, R Gennaro
2015 IEEE Conference on communications and network security (CNS), 497-505
7
2015
2015
2015
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al.
36
2015
2014
Efficiently verifiable computation on encrypted data
Efficiently verifiable computation on encrypted data
D Fiore, R Gennaro, V Pastro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …
147
2014
2014
2014
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
J Soryal, IM Perera, I Darwish, N Fazio, R Gennaro, T Saadawi
2014 IEEE 28th International Conference on Advanced Information Networking …
2
2014
Read more

Google Trends (past one year)

0.0
Learn about Google Trends

Academic Achievement

Twitter Influence

0/100
Learn about weight

Recent Twitter Hashtags

Recent Tweets

Popular People

Yonatan Sompolinsky
Yonatan Sompolinsky Scholar @ Hebrew University
Silvio Micali
Silvio Micali Scholar @ MIT CSAIL
Elaine Ou
Elaine Ou Writer @ The University of Sydney
Rosario Gennaro
Rosario Gennaro Scholar @ CUNY | Center For Algorithms And Interactive Scientific Software (CAISS) | MIT | City College Of New York | IBM T.J.Watson Research Center
Charles Rackoff
Charles Rackoff Scholar @ University Of Toronto
Browse all people