Trabajos publicados en revistas o congresos internacionales
-
O. Farràs, T. B. Hansen, T. Kaced, C. Padró.
On the Information Ratio of Non-perfect Secret Sharing Schemes.
Algorithmica 79 (4) (2017) 987-1013.
DOI: 10.1007/s00453-016-0217-9
-
D. Fiore, M.I. González Vasco, C. Soriente.
Partitioned Group Password-Based Authenticated Key Exchange.
Comput. J. 60 (12) (2017) 1912-1922.
DOI: 10.1093/comjnl/bxx078
-
P. D'Arco, M.I. González Vasco, A. Pérez, C. Soriente, R. Steinwandt.
Private set intersection: New generic constructions and feasibility results.
Adv. in Math. of Comm. 11 (3) (2017) 481-502.
DOI: 10.3934/amc.2017040
-
J. Herranz.
Attribute-based encryption implies identity-based encryption.
IET Information Security 11 (6) (2017) 332-337.
DOI: 10.1049/iet-ifs.2016.0490
-
F. Benhamouda, J. Herranz, M. Joye, B. Libert.
Efficient cryptosystems from 2k-th power residue symbols.
Journal of Cryptology 30 (2) (2017) 519-549.
DOI: 10.1007/s00145-016-9229-5
-
A. Escala, G. Herold, E. Kiltz, C. Ràfols, J.L. Villar.
An algebraic framework for Diffie-Hellman Assumptions.
Journal of Cryptology 30 (1) (2017) 242-288.
DOI: 10.1007/s00145-015-9220-6
-
N. Costa, R. Martínez, P. Morillo.
Proof of a shuffle for lattice-based cryptography.
Proc. of NORDSEC'17,
Lecture Notes in Computer Science 10674 (2017) 280-296. Tartu, Estonia, 2017.
DOI: 10.1007/978-3-319-70290-2_17
-
S. Guasch, P. Morillo.
How to challenge and cast your e-vote.
Proc. of FC'16,
Lecture Notes in Computer Science 9603 (2017) 130-145. Barbados, 2016.
DOI: 10.1007/978-3-662-54970-4_8
-
J.L. Villar.
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems.
Proc. of PKC 2017,
Lecture Notes in Computer Science 10174 (2017) 435-464. Amsterdam, Netherlands, 2017.
DOI: 10.1007/978-3-662-54365-8_18
-
M.I. González Vasco, A. Pérez, A. Suárez.
Pitfalls in a server-aided authenticated group key establishment.
Information Science 363 (2016) 1-7.
DOI: 10.1016/j.ins.2016.05.004
-
M.I. González Vasco, F. Hess, R. Steinwandt.
Combined schemes for signature and encryption: The public-key and the identity-based setting.
Information and Computation 247 (2016) 1-10.
DOI: 10.1016/j.ic.2015.11.001
-
M. Fueyo, J. Herranz.
On the efficiency of revocation in RSA-based anonymous systems.
IEEE Transactions on Information Forensics & Security 11 (8) (2016) 1771-1779.
DOI: 10.1109/TIFS.2016.2559443
-
J. Herranz.
Attribute-based versions of Schnorr and ElGamal.
Applicable Algebra in Engineering, Communication and Computing 27 (1) (2016) 17-57.
DOI: 10.1007/s00200-015-0270-7
-
S. Martín, C. Padró, A. Yang.
Secret sharing, rank inequalities and information inequalities.
IEEE Transactions on Information Theory 62 (1) (2016) 599-609.
DOI: 10.1109/TIT.2015.2500232
-
A. Escala, S. Guasch, J. Herranz, P. Morillo.
Universal cast-as-intended verifiability.
Proc. of FC'16,
Lecture Notes in Computer Science 9604 (2016) 233-250. Barbados, 2016.
DOI: 10.1007/978-3-662-53357-4_16
-
C. Ràfols, P. Morillo, J.L. Villar.
The Kernel Matrix Diffie-Hellman Assumption.
Proc. of ASIACRYPT'16,
Lecture Notes in Computer Science 10031 (2016) 729-758. Hanoi, Vietnam, 2016.
DOI: 10.1007/978-3-662-53887-6_27
-
O. Farràs, C. Padró.
Extending Brickell-Davenport theorem to non-perfect secret sharing schemes.
Des. Codes Cryptography 74(2) (2015) 495-510.
DOI: 10.1007/s10623-013-9858-8
-
I. Cascudo, R. Cramer, D. Mirandola, C. Padró, C. Xing.
On secret sharing with nonlinear product reconstruction.
SIAM Journal on Discrete Mathematics 29 (2) (2015) 1114-1131.
DOI: 10.1137/130931886.
-
R. Cramer, C. Padró, C. Xing.
Optimal algebraic manipulation detection codes in the constant-error model.
Proc. of TCC 2015,
Lecture Notes in Computer Science 9014 (2015) 481-501. Warsaw, Poland, 2015.
DOI: 10.1007/978-3-662-46494-6_20
-
P. Bibiloni, A. Escala, P. Morillo.
Vote validatability in Mix-Net-based eVoting.
Proc. of VoteID 2015,
Lecture Notes in Computer Science 9269 (2015) 92-109. Bern, Switzerland, 2015.
DOI: 10.1007/978-3-319-22270-7_6
-
M.I. González-Vasco, A. Pérez, P. Taborda, J.L. Villar.
Cryptanalysis of a key exchange scheme based on block matrices.
Information Sciences 276 (2014) 319-331.
DOI: 10.1016/j.ins.2013.11.009
-
J. Herranz, A. Ruiz, G. Saéz.
Signcryption schemes with threshold unsigncryption, and applications.
Designs, Codes and Cryptography 70 (3) (2014) 323-345.
DOI: 10.1007/s10623-012-9688-0
-
J. Herranz, A. Ruiz, G. Saéz.
New results and applications for multi-secret sharing schemes.
Designs, Codes and Cryptography 73 (3) (2014) 841-864.
DOI: 10.1007/s10623-013-9831-6
-
J. Herranz.
Attribute-based signatures from RSA.
Theoretical Computer Science 527 (2014) 73-82.
DOI: 10.1016/j.tcs.2014.01.028
-
O. Farràs, C. Padró, C. Xing, A. Yang.
Natural Generalizations of Threshold Secret Sharing.
IEEE Trans. Information Theory 60 (3) (2014) 1652-1664.
DOI: 10.1109/TIT.2014.2300113
-
O. Farràs, T.B. Hansen, T. Kaced, C. Padró.
Optimal Non-perfect Uniform Secret Sharing Schemes.
Proc. of CRYPTO 2014,
Lecture Notes in Computer Science 8617 (2014) 217-234. Santa Bárbara CA, USA, 2014.
DOI: 10.1007/978-3-662-44381-1_13
-
A. Escala, J. Herranz, B. Libert, C. Ràfols.
Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications.
Proc. of PKC 2014,
Lecture Notes in Computer Science 8383 (2014) 239-256. Buenos Aires, Argentina, 2014.
DOI: 10.1007/978-3-642-54631-0_14
-
A. Beimel, A. Ben-Efraim, C. Padró, I. Tyomkin.
Multi-linear Secret-Sharing Schemes.
Proc. of TCC 2014,
Lecture Notes in Computer Science 8349 (2014) 394-418. San Diego CA, USA, 2014.
DOI: 10.1007/978-3-642-54242-8_17
Trabajos publicados en abierto
-
O. Farràs, T. Kaced, Sebastià Martín, Carles Padró.
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing. Cryptology ePrint Archive, Report 2017/919 [2017].
-
N. Costa, R. Martínez, P. Morillo.
Proof of a shuffle for lattice-based cryptography. Cryptology ePrint Archive, Report 2017/900 [2017].
-
D. Fiore, M.I. Gonzalez Vasco, C. Soriente.
Partitioned Group Password-Based Authenticated Key Exchange. Cryptology ePrint Archive, Report 2017/141 [2017].
-
J. Herranz.
Attribute-Based Encryption Implies Identity-Based Encryption. Cryptology ePrint Archive, Report 2017/054 [2017].
-
J.L. Villar.
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. Cryptology ePrint Archive, Report 2017/001 [2017].
-
M.I. Gonzalez Vasco, A. Pérez, A. Corona.
Group key exchange protocols withstanding ephemeral-key reveals. Cryptology ePrint Archive, Report 2016/1166 [2016].
-
O. Farràs, S. Martín, C. Padró.
A Note on Non-Perfect Secret Sharing. Cryptology ePrint Archive, Report 2016/348 [2016].
-
P. Morillo, C. Ràfols, J.L. Villar.
Matrix Computational Assumptions in Multilinear Groups. Cryptology ePrint Archive, Report 2015/353 [2015].
-
J. Herranz.
Attribute-Based Versions of Schnorr and ElGamal. Cryptology ePrint Archive, Report 2015/213 [2015].
-
O. Farràs, T.B. Hansen, T. Kaced, C. Padró.
On the Information Ratio of Non-Perfect Secret Sharing Schemes. Cryptology ePrint Archive, Report 2014/124 [2014].
Last updated: Feb 20 11:20:42 2018 by jorge (dot) villar (at) upc (dot) edu