Dario Fiore
Applied Filters
- Dario Fiore
- AuthorRemove filter
People
Colleagues
- Dario Fiore (71)
- Dario Catalano (28)
- Rosario Gennaro (15)
- Luca Nizzardo (8)
- Matteo Campanelli (8)
- Antonio Faonio (7)
- Dimitris Kolonelos (7)
- Mario Di Raimondo (6)
- Elena Pagnin (4)
- Michel Ferreira Abdalla (4)
- Claudio Soriente (3)
- David Balbás (3)
- Dominique Schröder (3)
- Emanuele Giunta (3)
- Ida Tucker (3)
- Andre Scedrov (2)
- Bogdan Warinschi (2)
- Gilles Barthe (2)
- Michael Backes (2)
- Nigel Paul Smart (2)
Publication
Proceedings/Book Names
- CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2)
- PKC'12: Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography (2)
- Public-Key Cryptography – PKC 2020 (2)
- Public-Key Cryptography – PKC 2023 (2)
- Public-Key Cryptography – PKC 2024 (2)
- Theory of Cryptography (2)
- Advances in Cryptology – ASIACRYPT 2019 (1)
- Advances in Cryptology – ASIACRYPT 2020 (1)
- Advances in Cryptology – ASIACRYPT 2021 (1)
- Advances in Cryptology – ASIACRYPT 2022 (1)
- Advances in Cryptology – CRYPTO 2024 (1)
- Applied Cryptography and Network Security (1)
- Applied Cryptography and Network Security (1)
- Applied Cryptography and Network Security (1)
- Computer Security – ESORICS 2022 (1)
- Financial Cryptography and Data Security (1)
- Public-Key Cryptography – PKC 2021 (1)
- Security and Cryptography for Networks (1)
- Theory of Cryptography (1)
- Topics in Cryptology – CT-RSA 2022 (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOpen AccessPublished By ACMPublished By ACM
Real-World Universal zkSNARKs are Non-Malleable
- Antonio Faonio
EURECOM, Biot, France
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Luigi Russo
EURECOM, Biot, France
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security•December 2024, pp 3138-3151• https://doi.org/10.1145/3658644.3690351Simulation extractability is a strong security notion of zkSNARKs that guarantees that an attacker who produces a valid proof must know the corresponding witness, even if the attacker had prior access to proofs generated by other users. Notably, ...
- 0Citation
- 85
- Downloads
MetricsTotal Citations0Total Downloads85Last 12 Months85Last 6 weeks54
- Antonio Faonio
- Article
Fully-Succinct Multi-key Homomorphic Signatures from Standard Assumptions
- Gaspard Anthoine
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
https://ror.org/03n6nwv02Universidad Politécnica de Madrid, Madrid, Spain
, - David Balbás
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
https://ror.org/03n6nwv02Universidad Politécnica de Madrid, Madrid, Spain
, - Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
Advances in Cryptology – CRYPTO 2024•August 2024, pp 317-351• https://doi.org/10.1007/978-3-031-68382-4_10AbstractMulti-Key Homomorphic Signatures (MKHS) allow one to evaluate a function on data signed by distinct users while producing a succinct and publicly-verifiable certificate of the correctness of the result. All the constructions of MKHS in the state ...
- 0Citation
MetricsTotal Citations0
- Gaspard Anthoine
- Article
Witness Encryption for Succinct Functional Commitments and Applications
- Matteo Campanelli
Protocol Labs, San Francisco, USA
, - Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
, - Hamidreza Khoshakhlagh
Concordium, Aarhus, Denmark
Public-Key Cryptography – PKC 2024•April 2024, pp 132-167• https://doi.org/10.1007/978-3-031-57722-2_5AbstractWitness encryption (WE), introduced by Garg, Gentry, Sahai, and Waters (STOC 2013) allows one to encrypt a message to a statement for some NP language , such that any user holding a witness for can decrypt the ciphertext. The extreme power of this ...
- 0Citation
MetricsTotal Citations0
- Matteo Campanelli
- Article
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees
- Matteo Campanelli
Protocol Labs, Aarhus, Denmark
, - Antonio Faonio
https://ror.org/00sse7z02EURECOM, Sophia Antipolis, France
, - Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
, - Tianyu Li
https://ror.org/02e2c7k09Delft University of Technology, Delft, Netherlands
, - Helger Lipmaa
https://ror.org/03z77qz90University of Tartu, Tartu, Estonia
Public-Key Cryptography – PKC 2024•April 2024, pp 337-369• https://doi.org/10.1007/978-3-031-57722-2_11AbstractLookup arguments allow to prove that the elements of a committed vector come from a (bigger) committed table. They enable novel approaches to reduce the prover complexity of general-purpose zkSNARKs, implementing “non-arithmetic operations" such ...
- 0Citation
MetricsTotal Citations0
- Matteo Campanelli
- Article
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
- Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
, - Dimitris Kolonelos
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
https://ror.org/03n6nwv02Universidad Politénica de Madrid, Madrid, Spain
, - Paola de Perthuis
DIENS, École Normale Supérieure, CNRS, Inria, Université PSL, Paris, France
Cosmian, Paris, France
Advances in Cryptology – ASIACRYPT 2023•December 2023, pp 166-200• https://doi.org/10.1007/978-981-99-8733-7_6AbstractRegistration-Based Encryption (RBE) [Garg et al. TCC’18] is a public-key encryption mechanism in which users generate their own public and secret keys, and register their public keys with a central authority called the key curator. Similarly to ...
- 4Citation
MetricsTotal Citations4
- Dario Fiore
- Article
From Polynomial IOP and Commitments to Non-malleable zkSNARKs
- Antonio Faonio
https://ror.org/00sse7z02EURECOM, Sophia Antipolis, Biot, France
, - Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
, - Markulf Kohlweiss
https://ror.org/01nrxwf90University of Edinburgh and Input Output, Edinburgh, Scotland
, - Luigi Russo
https://ror.org/00sse7z02EURECOM, Sophia Antipolis, Biot, France
, - Michal Zajac
Nethermind, London, England
AbstractWe study sufficient conditions to compile simulation-extractable zkSNARKs from information-theoretic interactive oracle proofs (IOP) using a simulation-extractable commit-and-prove system for its oracles. Specifically, we define simulation ...
- 2Citation
MetricsTotal Citations2
- Antonio Faonio
- Article
Chainable Functional Commitments for Unbounded-Depth Circuits
- David Balbás
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
https://ror.org/03n6nwv02Universidad Politécnica de Madrid, Madrid, Spain
, - Dario Catalano
https://ror.org/03a64bh57University of Catania, Catania, Italy
, - Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
, - Russell W. F. Lai
https://ror.org/020hwjq30Aalto University, Espoo, Finland
AbstractA functional commitment (FC) scheme allows one to commit to a vector and later produce a short opening proof of for any admissible function f. Since their inception, FC schemes supporting ever more expressive classes of functions have ...
- 9Citation
MetricsTotal Citations9
- David Balbás
- research-articleOpen AccessPublished By ACMPublished By ACM
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing
- David Balbás
IMDEA Software Institute & Universidad Politécnica de Madrid, Madrid, Spain
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Maria Isabel González Vasco
Universidad Carlos III de Madrid, Madrid, Spain
, - Damien Robissout
IMDEA Software Institute, Madrid, Spain
, - Claudio Soriente
NEC Laboratories Europe, Madrid, Spain
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security•November 2023, pp 1437-1451• https://doi.org/10.1145/3576915.3623160Cryptographic proof systems provide integrity, fairness, and privacy in applications that outsource data processing tasks. However, general-purpose proof systems do not scale well to large inputs. At the same time, ad-hoc solutions for concrete ...
- 2Citation
- 637
- Downloads
MetricsTotal Citations2Total Downloads637Last 12 Months553Last 6 weeks51
- David Balbás
- research-article
Zero-knowledge proofs for set membership: efficient, succinct, modular
- Daniel Benarroch
Inversed Technologies, Madrid, Spain
cLabs, Berlin, Germany
, - Matteo Campanelli
Protocol Labs, San Francisco, USA
cLabs, Berlin, Germany
, - Dario Fiore
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
cLabs, Berlin, Germany
, - Kobi Gurkan
https://ror.org/03n6nwv02Universidad Politécnica de Madrid, Madrid, Spain
Geometry Research, London, UK
cLabs, Berlin, Germany
, - Dimitris Kolonelos
Protocol Labs, San Francisco, USA
https://ror.org/04xvfkh51IMDEA Software Institute, Madrid, Spain
cLabs, Berlin, Germany
Designs, Codes and Cryptography, Volume 91, Issue 11•Nov 2023, pp 3457-3525 • https://doi.org/10.1007/s10623-023-01245-1AbstractWe consider the problem of proving in zero knowledge that an element of a public set satisfies a given property without disclosing the element, i.e., for some u, “ and P(u) holds”. This problem arises in many applications (anonymous ...
- 1Citation
MetricsTotal Citations1
- Daniel Benarroch
- Article
Efficient and Universally Composable Single Secret Leader Election from Pairings
- Dario Catalano
Università di Catania, Catania, Italy
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Emanuele Giunta
IMDEA Software Institute, Madrid, Spain
Universidad Politecnica de Madrid, Madrid, Spain
Scuola Superiore di Catania, Catania, Italy
Public-Key Cryptography – PKC 2023•May 2023, pp 471-499• https://doi.org/10.1007/978-3-031-31368-4_17AbstractSingle Secret Leader Election (SSLE) protocols allow a set of users to elect a leader among them so that the identity of the winner remains secret until she decides to reveal herself. This notion was formalized and implemented in a recent result ...
- 0Citation
MetricsTotal Citations0
- Dario Catalano
- Article
Extendable Threshold Ring Signatures with Enhanced Anonymity
- Gennaro Avitabile
IMDEA Software Institute, Madrid, Spain
, - Vincenzo Botta
University of Warsaw, Warsaw, Poland
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
Public-Key Cryptography – PKC 2023•May 2023, pp 281-311• https://doi.org/10.1007/978-3-031-31368-4_11AbstractThreshold ring signatures are digital signatures that allow t parties to sign a message while hiding their identity in a larger set of n users called “ring”. Recently, Aranha et al. [PKC 2022] introduced the notion of extendable threshold ring ...
- 1Citation
MetricsTotal Citations1
- Gennaro Avitabile
- Article
Unilaterally-Authenticated Key Exchange
- Yevgeniy Dodis
Department of Computer Science, New York University, New York, USA
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
Financial Cryptography and Data Security•April 2017, pp 542-560• https://doi.org/10.1007/978-3-319-70972-7_31AbstractKey Exchange (KE), which enables two parties (e.g., a client and a server) to securely establish a common private key while communicating over an insecure channel, is one of the most fundamental cryptographic primitives. In this work, we address ...
- 3Citation
MetricsTotal Citations3
- Yevgeniy Dodis
- Article
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures
- Dario Catalano
University of Catania, Catania, Italy
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Ida Tucker
IMDEA Software Institute, Madrid, Spain
Advances in Cryptology – ASIACRYPT 2022•December 2022, pp 159-188• https://doi.org/10.1007/978-3-031-22972-5_6AbstractFunctional Commitments (FC) allow one to reveal functions of committed data in a succinct and verifiable way. In this paper we put forward the notion of additive-homomorphic FC and show two efficient, pairing-based, realizations of this primitive ...
- 10Citation
MetricsTotal Citations10
- Dario Catalano
- Article
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups
- Dario Catalano
University of Catania, Catania, Italy
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Rosario Gennaro
Protocol Labs., New York, USA
, - Emanuele Giunta
IMDEA Software Institute, Madrid, Spain
Universidad Politecnica de Madrid, Madrid, Spain
AbstractVector Commitments allow one to (concisely) commit to a vector of messages so that one can later (concisely) open the commitment at selected locations. In the state of the art of vector commitments, algebraic constructions have emerged as a ...
- 5Citation
MetricsTotal Citations5
- Dario Catalano
- research-articlePublished By ACMPublished By ACM
Succinct Zero-Knowledge Batch Proofs for Set Accumulators
- Matteo Campanelli
Protocol Labs, San Francisco, CA, USA
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Semin Han
Hanyang University, Seoul, Republic of Korea
, - Jihye Kim
Kookmin University, Seoul, Republic of Korea
, - Dimitris Kolonelos
IMDEA Software Institute & Universidad Politécnica de Madrid, Madrid, Spain
, - Hyunok Oh
Hanyang University, Seoul, Republic of Korea
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security•November 2022, pp 455-469• https://doi.org/10.1145/3548606.3560677Cryptographic accumulators are a common solution to proving information about a large set S. They allow one to compute a short digest of S and short certificates of some of its basic properties, notably membership of an element. Accumulators also allow ...
- 10Citation
- 667
- Downloads
MetricsTotal Citations10Total Downloads667Last 12 Months204Last 6 weeks22
- Matteo Campanelli
- research-articlePublished By ACMPublished By ACM
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams
- Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Ida Tucker
IMDEA Software Institute, Madrid, Spain
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security•November 2022, pp 1067-1080• https://doi.org/10.1145/3548606.3560630We study the problem of privacy-preserving proofs on streamed authenticated data. In this setting, a server receives a continuous stream of data from a trusted data provider, and is requested to prove computations over the data to third parties in a ...
- 4Citation
- 495
- Downloads
MetricsTotal Citations4Total Downloads495Last 12 Months105Last 6 weeks16
- Dario Fiore
- Article
Ring Signatures with User-Controlled Linkability
- Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Lydia Garms
IMDEA Software Institute, Madrid, Spain
Keyless Technologies Limited, London, UK
, - Dimitris Kolonelos
IMDEA Software Institute, Madrid, Spain
Universidad Politecnica de Madrid, Madrid, Spain
, - Claudio Soriente
NEC Laboratories Europe, Heidelberg, Germany
, - Ida Tucker
Zondax AG, Zug, Switzerland
Computer Security – ESORICS 2022•September 2022, pp 405-426• https://doi.org/10.1007/978-3-031-17146-8_20AbstractAnonymous authentication primitives, e.g., group or ring signatures, allow one to realize privacy-preserving data collection applications, as they strike a balance between authenticity of data being collected and privacy of data providers. At PKC ...
- 0Citation
MetricsTotal Citations0
- Dario Fiore
- Article
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings
- Hien Chu
Friedrich Alexander Universität Erlangen-Nürnberg, Erlangen, Germany
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Dimitris Kolonelos
IMDEA Software Institute, Madrid, Spain
Universidad Politenica de Madrid, Madrid, Spain
, - Dominique Schröder
Friedrich Alexander Universität Erlangen-Nürnberg, Erlangen, Germany
Security and Cryptography for Networks•September 2022, pp 639-662• https://doi.org/10.1007/978-3-031-14791-3_28AbstractFunctional commitments (Libert et al. [ICALP’16]) allow a party to commit to a vector of length n and later open the commitment at functions of the committed vector succinctly, namely with communication logarithmic or constant in n. Existing ...
- 1Citation
MetricsTotal Citations1
- Hien Chu
- research-articlePublished By ACMPublished By ACM
Adaptively Secure Single Secret Leader Election from DDH
- Dario Catalano
University of Catania, Catania, Italy
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Emanuele Giunta
IMDEA Software Institute & Universidad Politecnica de Madrid, Madrid, Spain
PODC'22: Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing•July 2022, pp 430-439• https://doi.org/10.1145/3519270.3538424Single Secret Leader Election protocols (SSLE, for short) allow a group of users to select a random leader so that the latter remains secret until she decides to reveal herself. Thanks to this feature, SSLE can be used to build an election mechanism for ...
- 5Citation
- 183
- Downloads
MetricsTotal Citations5Total Downloads183Last 12 Months36Last 6 weeks6- 1
Supplementary MaterialS9-T1.mp4
- Dario Catalano
- Article
Progressive and Efficient Verification for Digital Signatures
- Cecilia Boschini
Technion, Haifa, Israel
Reichman University, Herzliya, Israel
, - Dario Fiore
IMDEA Software Institute, Madrid, Spain
, - Elena Pagnin
Lund University, Lund, Sweden
Applied Cryptography and Network Security•June 2022, pp 440-458• https://doi.org/10.1007/978-3-031-09234-3_22AbstractDigital signatures are widely deployed to authenticate the source of incoming information, or to certify data integrity. Common signature verification procedures return a decision (accept/reject) only at the very end of the execution. If ...
- 1Citation
MetricsTotal Citations1
- Cecilia Boschini
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner