I am a researcher at University of Salerno (Unisa).
My main research interests include cryptography, cybersecurity and e-voting.
V. Iovino, S. Vaudenay, M. Vuagnoux. On the Effectiveness of Time Travel to Inject COVID-19 Alerts. IACR ePrint Archive 2020. Video
G. Avitabile, V. Botta, V. Iovino, I. Visconti. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. IACR ePrint Archive 2020.
Z. A. Genç, V. Iovino, A. Rial. The "Simplest Protocol for Oblivious Transfer" Revisited. In Information Processing Letters Journal, 2020.
V. Iovino, A. Rial, P. B. Rønne, P. Y. A. Ryan. (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. In IEEE CSF 2020.
N. Soroush, V. Iovino, A. Rial, P. Ronne, P. Ryan. Verifiable Inner Product Encryption Scheme. in PKC 2020, Springer.
G. Drevon, V. Iovino, A. Kampa. Itugen: Transparent and Anonymous voting without Tallying Authorities. Presented at ITASEC 2020.
Vincenzo Iovino, Ivan Visconti. Non-interactive Zero Knowledge Proofs in the Random Oracle Model. In C2SI 2019, Springer.
A. De Caro, V. Iovino, A. O'Neill. Receiver- and sender-deniable functional encryption. In IET Information Security Journal, 2018.
V. Iovino, Q. Tang, K. Żebrowski. Power of Public-key Function-Private Functional Encryption. In IET Information Security Journal, 2018.
J. Becerra, V. Iovino, D. Ostrev, P. Sala, M. Skrobot. Tightly-Secure PAK(E). To appear in CANS 2017, Springer LNCS.
V. Iovino, K. Żebrowski. Mergeable Functional Encryption. In PROVSEC 2017, Springer LNCS.
J. Becerra, V. Iovino, D. Ostrev, M. Skrobot. On the Relation Between SIM and IND-RoR Security Models for PAKEs. In SECRYPT 2017.
R. Giustolisi, V. Iovino, G. Lenzini. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In SECRYPT 2017.
Y. Desmedt, V. Iovino, G. Persiano, I. Visconti. Controlled Homomorphic Encryption: Definition and Construction. In Financial Cryptography 2017 - WAHC, Springer LNCS.
P. Rønne, Vincenzo Iovino, A. Rial, P. Ryan. Using Selene to Verify your Vote in JCJ. In Financial Cryptography - VOTING 2017, Springer LNCS.
A. Arriaga, V. Iovino, Q. Tang. Updatable Functional Encryption. In Mycrypt 2016, Springer LNCS, Volume 10311, 2016.
G. Gallegos-Garcia, V. Iovino, A. Rial, P. B. Rønne, P. Y. A. Ryan. (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. Manuscript, 2016.
V. Iovino, Q. Tang, K. Żebrowski. On the power of Public-key Functional Encryption with Function Privacy. In CANS 2016, Springer LNCS, Volume 10052, pages 585-593, 2016.
A. De Caro, V. Iovino. On the Power of Rewinding Simulators in Functional Encryption. In Design, Codes and Cryptography (2016), Springer. DOI: 10.1007/s10623-016-0272-x.
A. De Caro, V. Iovino, A. O'Neill. Deniable Functional Encryption. In PKC 2016, Springer LNCS, Volume 9614, pages 196-222, 2016.
R. Giustolisi, V. Iovino, P. B. Rønne. On the possibility of non-interactive voting in the public-key setting. In Financial Cryptography and Data Security - FC 2016 International Workshops - VOTING 2016, Springer LNCS, Volume 9604, pages 193-208.
P. Y. A. Ryan, P. B. Rønne, V. Iovino. Selene: Voter Friendly, Coercion Mitigating, Verifiable Voting. In Financial Cryptography and Data Security - FC 2016 International Workshops - VOTING 2016, Springer LNCS, Volume 9604, pages 176-192.
V. Iovino and K. Żebrowski. Simulation-based Secure Functional Encryption in the Random Oracle Model. In Progress in Cryptology - LATINCRYPT 2015, Springer LNCS, Volume 9230, pages 21–39, 2015.
A. De Caro, Vincenzo Iovino, A. Jain, A. O'Neill, G. Persiano. On the Achievability of Simulation-Based Security for Functional Encryption. In CRYPTO 2013, Springer LNCS, Volume 8043, pages 519-535, 2013.
Special issue in Advances in Functional Encryption.
I am editing a Special Issue titled: "Advances in Functional Encryption" for the journal Information. The purpose of this Special Issue is to present the latest developments in functional encryption and related primitives and technologies. For more details and topics of interest please visit the Special Issue website: https://www.mdpi.com/journal/information/special_issues/Functional_Encryption
Immuni Detector & Paparazzi+cam attack
I developed this Android app to detect how many users of the contact tracing app Immuni are around you. After installation, go in settings->apps->Immuni Detector and enable all permissions for allowing the app to work. Run the app and click Discover. The app also allows to log the time and position of any encounter and thus can be used to perform a Paparazzi attack.
My implementation of Paparazzi attack can be found here. It can be combined with a camera to automatically take pictures of infected citizens that pass close to the camera.
firstname.lastname@example.org (replace numbers with letters)