Publications


My research focuses on cryptography and its applications to resolving issues of security and privacy in distributed systems. I am interested in designing and building practical software systems whose security and privacy properties can be modeled and assessed within the mathematical framework of modern cryptography. I also develops efficient cryptographic protocols for security tasks like data secrecy and authentication that are quantifiably hard to break, and investigates the viability of new mathematical problems as the source of computational intractability suitable for cryptographic applications.

Some of the following publications are based upon work supported by the National Science Foundation under Grants CNS #1040784 (FIA: Collaborative Research: NEBULA: A Future Internet That Supports Trustworthy Cloud Computing) and CNS #1117679 (Collaborative Research: Provable Security from Group Theory and Applications). Any opinions, findings, and conclusions or recommendations expressed in publications arising from this research are those of the author(s) and do not necessarily reflect the views of the National Science Foundation or any other funding agency.


Books
[ PKC11 ]
Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi.
Public Key Cryptography - PKC 2011 - 14th International on Practice and Theory in Public Key Cryptography.
March 6–9, 2011. Proceedings, Volume 6571 of Lecture Notes in Computer Science. Springer, 2011.
[PKC 2011]
Book Chapters
[ FIA13 ]
Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo
The NEBULA Future Internet Architecture
In The Future Internet (Springer LNCS 7858), Dublin, Ireland, May 2013.
Articles in Refereed Journals
[ FIA14 ]
Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo
A Brief Overview of the NEBULA Future Internet Architecture
Computer Communication Review (ACM), July 2014.
[ FINPS13 ]
Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, and William E. Skeith III
Hardness of Learning Problems over Burnside Groups of Exponent 3.
Designs, Codes, and Cryptography, 2013.
Articles in Refereed Conference Proceedings
[ FNP14 ]
Nelly Fazio, Antonio Nicolosi, and I. Milinda Perera
Broadcast Steganography.
In CT-RSA'14, San Francisco, CA, February 2014.
[ NWNMMS11 ]
Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, and Arun Seehra
Verifying and enforcing network paths with ICING
In ACM CoNEXT'11, Tokyo, Japan, December 2011.
[ BFNSS11 ]
Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi , Vladimir Shpilrain, and William E. Skeith III
Generalized Learning Problems and Applications to Non-Commutative Cryptography
In ProvSec'11, Xi'an, China, October 2011.
[ SNWMNS09 ]
Arun Seehra, Jad Naous, Michael Walfish, David Mazières, Antonio Nicolosi, and Scott Shenker
A Policy Framework for the Future Internet
In HotNets-VIII, New York, NY, October 2009.
[ MiNi08 ]
Daniele Micciancio and Antonio Nicolosi
Efficient Bounded Distance Decoders for Barnes-Wall Lattices
In ISIT'08, Toronto, Canada, July 2008.
[ FNP07 ]
Nelly Fazio, Antonio Nicolosi, and Duong Hieu Phan
Traitor Tracing with Optimal Transmission Rate
In ISC'07, Valparaiso, Chile, October 2007.
[ FrNi07 ]
Michael Freedman and Antonio Nicolosi
Efficient Private Techniques for Verifying Social Proximity
In IPTPS'07, Bellevue, WA, February 2007.
[ BCFNY06 ]
Emmanuel Bresson, Dario Catalano, Nelly Fazio, Antonio Nicolosi, and Moti Yung
Output Privacy in Secure Multiparty Computation
In YACC'06, Ile de Porquerolles, France, June 2006.
[ DFN06 ]
Ivan Damgård, Nelly Fazio, and Antonio Nicolosi
Non-Interactive Zero-Knowledge from Homomorphic Encryption
In TCC'06, New York, NY, March 2006.
[ DKNS04 ]
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, and Victor Shoup
Anonymous Identification in Ad Hoc Groups
In EUROCRYPT'04, Interlaken, Switzerland, May 2004.
[ NiMa04 ]
Antonio Nicolosi and David Mazières
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
In IPTPS'04, San Diego, CA, February 2004.
[ NiAn03 ]
Antonio Nicolosi and Siddhartha Annapureddy
P2PCast: A Peer-to-Peer Multicast Scheme for Streaming Data
In ISW'03, Cambridge, MA, August 2003.
[ NDM03 ]
Antonio Nicolosi, Max Krohn, Yevgeniy Dodis, and David Mazières
Proactive Two-Party Signatures for User Authentication
In NDSS'03, San Diego, CA, February 2003.
Invited Abstracts
[ Nic11-abstract ]
Antonio Nicolosi
Verifiable Network Paths for the NEBULA Data Plane
In IEEE CCW'11, Hyannis, MA, October 2011.
[ BNZ11-abstract ]
Carl Bosley, Antonio Nicolosi, and Miaomiao Zhang
Learning from Noisy Parities via Nearest-Neighbor Search
In Joint AMS/SAMS International Congress, Port Elizabeth, South Africa, November–December 2011.
[ FINPS11-abstract ]
Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, and William E. Skeith III
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3
In Joint AMS/SAMS International Congress, Port Elizabeth, South Africa, November–December 2011.
[ Nic09-abstract ]
Antonio Nicolosi
Average-Case vs Generic-Case Complexity of Lattice Problems
In AMS/MAA Joint Mathematics Meeting
(Special Session on Algebraic Cryptography and Generic Complexity)
, Washington, DC, January 2009.
Theses
[ Nic07-thesis ]
Antonio Nicolosi
Authentication Mechanisms for Open Distributed Systems
Ph.D. Thesis, New York University, New York, NY, September 2007.
[ Nic01-thesis ]
Antonio Nicolosi
Sicurezza e Applicazioni Crittografiche della Funzione Diffie-Hellman
Laurea Thesis, Università di Catania, Italy, July 2001.
Technical Reports
[ FNP13-eprint ]
Nelly Fazio, Antonio Nicolosi, and I. Milinda Perera
Broadcast Steganography.
Cryptology E-Print Archive, 2013.
[ BNZ12-tr ]
Carl Bosley, Antonio Nicolosi, Miaomiao Zhang
Algorithms for Learning Parity with Noise (LPN) and Computational Syndrome Decoding (CSD)
Technical Report, Department of Computer Science, Stevens, February 2012.
[ FINPS11-eprint ]
Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, and William E. Skeith III
Hardness of Learning Problems over Burnside Groups of Exponent 3.
Cryptology E-Print Archive, 2012.
[ BFNSS11-eprint ]
Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi , Vladimir Shpilrain, and William E. Skeith III
Generalized Learning Problems and Applications to Non-Commutative Cryptography
Cryptology E-Print Archive, 2011.
[ BHN11-eprint ]
Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi
HBN: An HB-like protocol secure against man-in-the-middle attacks
Cryptology E-Print Archive, 2011.
[ NSWMNS10 ]
Jad Naous, Arun Seehra Michael Walfish, David Mazières, Antonio Nicolosi, and Scott Shenker
Defining and Enforcing Transit Policies in a Future Internet
Technical Report TR-10-07, Department of Computer Science, UT Austin, February 2010.
[ NEBULA10 ]
Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo
NEBULA: A future Internet architecture that supports trustworthy cloud computing
NSF FIA white paper, September 2010.
[ NSWMNS09 ]
Jad Naous, Arun Seehra Michael Walfish, David Mazières, Antonio Nicolosi, and Scott Shenker
The Design and Implementation of a Policy Framework for the Future Internet
Technical Report TR-09-28, Department of Computer Science, UT Austin, September 2009.
[ NWMNS09 ]
Jad Naous, Michael Walfish, David Mazières, Antonio Nicolosi, and Arun Seehra
Network Security via Explicit Consent
Technical Report TR-09-12, Department of Computer Science, UT Austin, March 2009.
[ FaNi03 ]
Nelly Fazio and Antonio Nicolosi
Cryptographic Accumulators: Definitions, Constructions and Applications
Technical Report, NYU Courant, April 2003.
[ FaNi00 ]
Nelly Fazio and Antonio Nicolosi
Relations between Formal and Semi-formal Specification Systems: a Case Study
Technical Report, Università di Catania, September 2000.

The documents distributed by this server have been provided as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that the works are offered here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be distributed without the explicit permission of the copyright holder.

Copyright © Antonio R. Nicolosi


Valid HTML 4.01! Valid CSS!
Antonio Nicolosi