Go to the content (press return)

Scientific and technological production

1 to 50 of 126 results
 
  • Attribute-based versions of Schnorr and ElGamal

     Herranz, J.
    Applicable algebra in engineering communication and computing
    Vol. 27, num. 1, p. 17-57
    DOI: 10.1007/s00200-015-0270-7
    Date of publication: 2016-01
    Journal article
  • Revisiting distance-based record linkage for privacy-preserving release of statistical datasets

     Herranz, J.; Nin, J.; Rodríguez, P.; Tassa, T.
    Data and knowledge engineering
    Vol. 100, num. A, p. 78-93
    DOI: 10.1016/j.datak.2015.07.009
    Date of publication: 2015-07-17
    Journal article
  • New results and applications for multi-secret sharing schemes  Open access

     Herranz, J.; Ruiz, A.; Saez, G.
    Designs codes and cryptography
    Vol. 73, num. 3, p. 841-864
    DOI: 10.1007/s10623-013-9831-6
    Date of publication: 2014-12-01
    Journal article
    Access to the full text
  • Attribute-based signatures from RSA

     Herranz, J.
    Theoretical computer science
    Vol. 527, num. March 2014, p. 73-82
    DOI: 10.1016/j.tcs.2014.01.028
    Date of publication: 2014-03
    Journal article
  • Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications

     Escala, A.; Herranz, J.; Libert, B.; Rafols, C.
    Lecture notes in computer science
    Vol. 8383, p. 239-256
    DOI: 10.1007/978-3-642-54631-0_14
    Date of publication: 2014-03
    Journal article
  • Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications

     Escala, A.; Herranz, J.; Libert, B.; Rafols, C.
    International Conference on Practice and Theory in Public Key Cryptography
    p. 239-256
    DOI: 10.1007/978-3-642-54631-0-14
    Presentation's date: 2014-03
    Presentation of work at congresses
  • Hacia una sociedad digital segura: avances matemáticos en criptografía y su impacto en las tecnologías digitales

     Morillo, M.; Saez, G.; Martin, S.; González-Vasco, M.I.; Steinwandt, R.; d'Arco, P.; Kiltz, E.; Padro, C.; Herranz, J.; Pérez del Pozo, Á.L.; Villar, J.
    Competitive project
  • Secure and efficient anonymization of distributed confidential databases

     Herranz, J.; Nin, J.
    International journal of information security
    Vol. 13, num. 6, p. 497-512
    DOI: 10.1007/s10207-014-0237-x
    Date of publication: 2014
    Journal article
  • Contributions to Secret Sharing and Other Distributed Cryptosystems  Open access

     Ruiz, A.
    Universitat Politècnica de Catalunya
    Theses
  • Sharing many secrets with computational provable security

     Herranz, J.; Ruiz, A.; Saez, G.
    Information processing letters
    Vol. 113, num. 14-16, p. 572-579
    DOI: 10.1016/j.ipl.2013.05.003
    Date of publication: 2013-07
    Journal article
  • Foreword from the DPM 2012 program chairs

     Di Pietro, R.; Herranz, J.
    Lecture notes in computer science
    Vol. 7731, p. 5
    Date of publication: 2012-09-13
    Journal article
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica  Open access

     Herranz, J.; Sisternes, J.R.
    Reunión Española sobre Criptología y Seguridad de la Información
    p. 1-6
    Presentation's date: 2012-09
    Presentation of work at congresses
    Access to the full text
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar  Open access

     Herranz, J.; Ruiz, A.; Saez, G.
    Reunión Española sobre Criptología y Seguridad de la Información
    p. 1-6
    Presentation's date: 2012-09
    Presentation of work at congresses
    Access to the full text
  • Identity-based encryption with master key-dependent message security and leakage-resilience

     Galindo, D.; Herranz, J.; Villar, J.
    European Symposium on Research in Computer Security
    p. 627-642
    DOI: 10.1007/978-3-642-33167-1_36
    Presentation's date: 2012-09
    Presentation of work at congresses
  • More hybrid and secure protection of statistical data sets

     Herranz, J.; Nin, J.; Sole, M.
    IEEE transactions on dependable and secure computing
    Vol. 9, num. 5, p. 727-740
    DOI: 10.1109/TDSC.2012.40
    Date of publication: 2012-09
    Journal article
  • Attribute-based encryption schemes with constant-size ciphertexts

     Attrapadung, N.; Herranz, J.; Laguillaumie, F.; Libert, B.; de Panafieu, E.; Rafols, C.
    Theoretical computer science
    Vol. 422, p. 15-38
    DOI: 10.1016/j.tcs.2011.12.004
    Date of publication: 2012-03-09
    Journal article
  • Kd-trees and the real disclosure risks of large statistical databases

     Herranz, J.; Nin, J.; Sole, M.
    Information fusion
    Vol. 13, num. 4, p. 260-273
    DOI: 10.1016/j.inffus.2011.03.001
    Date of publication: 2012
    Journal article
  • Short attribute-based signatures for threshold predicates

     Herranz, J.; Laguillaumie, F.; Libert, B.; Rafols, C.
    Cryptographers' Track at the RSA Conference
    p. 51-67
    DOI: 10.1007/978-3-642-27954-6_4
    Presentation's date: 2012
    Presentation of work at congresses
  • Restricted adaptive oblivious transfer

     Herranz, J.
    Theoretical computer science
    Vol. 412, num. 46, p. 6498-6506
    DOI: 10.1016/j.tcs.2011.06.023
    Date of publication: 2011-10-28
    Journal article
  • Optimal symbol alignment distance: a new distance for sequences of symbols  Open access

     Herranz, J.; Nin, J.; Sole, M.
    IEEE transactions on knowledge and data engineering
    Vol. 23, num. 10, p. 1541-1554
    DOI: 10.1109/TKDE.2010.190
    Date of publication: 2011-10-14
    Journal article
    Access to the full text
  • Any 2-asummable bipartite function is weighted threshold

     Herranz, J.
    Discrete applied mathematics
    Vol. 159, num. 11, p. 1079-1084
    DOI: 10.1016/j.dam.2011.01.023
    Date of publication: 2011-07-06
    Journal article
  • Revocable attribute-based signatures with adaptive security in the standard model

     Escala, A.; Herranz, J.; Morillo, M.
    International Conference on Cryptology in Africa
    p. 224-241
    Presentation's date: 2011-07-05
    Presentation of work at congresses
  • Revocable attribute-based signatures with adaptive security in the standard model

     Escala, A.; Herranz, J.; Morillo, M.
    Lecture notes in computer science
    Vol. 6737, p. 224-241
    Date of publication: 2011-05-10
    Journal article
  • Relations between semantic security and anonymity in identity based encryption

     Herranz, J.; Laguillaumie, F.; Rafols, C.
    Information processing letters
    Vol. 11, num. 10, p. 453-460
    DOI: 10.1016/j.ipl.2011.02.002
    Date of publication: 2011
    Journal article
  • Attribute-based signature with policy-and-endorsement mechanism

     Herranz, J.
    Mathematical reviews
    Date of publication: 2011
    Journal article
  • Attribute-based group key establishment

     Herranz, J.
    Mathematical reviews
    Date of publication: 2011
    Journal article
  • New approaches for deniable authentication

     Herranz, J.
    Mathematical reviews
    Date of publication: 2011
    Journal article
  • On the generic construcion of identity-based signatures with additional properties

     Galindo, D.; Herranz, J.; Kiltz, E.
    Advances in mathematics
    Vol. 4, num. 4, p. 423-453
    DOI: 10.3934/amc.2010.4.453
    Date of publication: 2010-11
    Journal article
  • Using classification methods to evaluate attribute disclosure risk

     Nin, J.; Herranz, J.; Torra, V.
    International Conference on Modeling Decisions for Artificial Intelligence
    p. 277-286
    DOI: 10.1007/978-3-642-16292-3_27
    Presentation's date: 2010-10-29
    Presentation of work at congresses
  • Fully secure threshold unsigncryption

     Herranz, J.; Saez, G.
    International Conference on Provable Security
    p. 261-278
    DOI: 10.1007/978-3-642-16280-0_18
    Presentation's date: 2010-10-14
    Presentation of work at congresses
  • Fully secure threshold unsigncryption

     Herranz, J.; Saez, G.
    Lecture notes in computer science
    Vol. 6402, p. 261-278
    DOI: 10.1007/978-3-642-16280-0_18
    Date of publication: 2010-10-13
    Journal article
  • On server trust in private proxy auctions

     Di Crescenzo, G.; Herranz, J.; Saez, G.
    Electronic commerce research
    Vol. 10, num. 3-4, p. 291-311
    DOI: 10.1007/s10660-010-9057-x
    Date of publication: 2010-10-09
    Journal article
  • Máxima seguridad para firmas digitales con verificación distribuida  Open access

     Herranz, J.; Ruiz, A.; Saez, G.
    Reunión Española sobre Criptología y Seguridad de la Información
    p. 150-162
    Presentation's date: 2010-09-10
    Presentation of work at congresses
    Access to the full text
  • Introduction to privacy and anonymity in information management systems

     Herranz, J.; Nin, J.
    DOI: 10.1007/978-1-84996-238-4_1
    Date of publication: 2010-07-29
    Book chapter
    Image
  • Extensions of access structures and their cryptographic applications

     Daza, V.; Herranz, J.; Morillo, M.; Rafols, C.
    Applicable algebra in engineering communication and computing
    Vol. 21, num. 4, p. 257-284
    DOI: 10.1007/s00200-010-0125-1
    Date of publication: 2010-07
    Journal article
  • Classifying data from protected statistical datasets  Open access

     Herranz, J.; Matwin, S.; Nin, J.; Torra, V.
    Computers and security
    Vol. 29, num. 8, p. 875-890
    DOI: 10.1016/j.cose.2010.05.005
    Date of publication: 2010-06-09
    Journal article
    Access to the full text
  • Constant size ciphertexts in threshold attribute-based encryption  Open access

     Herranz, J.; Laguillaumie, F.; Rafols, C.
    International Conference on Practice and Theory in Public Key Cryptography
    p. 19-34
    DOI: 10.1007/978-3-642-13013-7_2
    Presentation's date: 2010-05-26
    Presentation of work at congresses
    Access to the full text
  • CRIPTOGRAFIA DE CLAVE PUBLICA Y COMPARTICIÓN DE SECRETOS

     Morillo, M.; Gracia, I.; Martí-Farré, J.; Martin, S.; Padro, C.; Saez, G.; Herranz, J.; Rafols, C.; Heidarvand, S.; Villar, J.
    Competitive project
  • European Network of Excellence for Cryptology II

     Morillo, M.; Martí-Farré, J.; Padro, C.; Rafols, C.; Gracia, I.; Heidarvand, S.; Herranz, J.; Saez, G.; Martin, S.; Villar, J.
    Competitive project
  • Distributed privacy-preserving methods for statistical disclosure control

     Herranz, J.; Nin, J.; Torra, V.
    Lecture notes in computer science
    Vol. 5939, p. 33-47
    Date of publication: 2010
    Journal article
  • Additively homomorphic encryption with d-operand multiplications

     Aguilar, C.; Gaborit, P.; Herranz, J.
    Lecture notes in computer science
    Vol. 6223, p. 138-154
    DOI: 10.1007/978-3-642-14623-7_8
    Date of publication: 2010
    Journal article
  • Some (in)sufficient conditions for secure hybrid encryption

     Herranz, J.; Hofheinz, D.; Kiltz, E.
    Information and computation
    Vol. 208, num. 11, p. 1243-1257
    DOI: 10.1016/j.ic.2010.07.002
    Date of publication: 2010
    Journal article
  • Constant size ciphertexts in threshold attribute-based encryption

     Herranz, J.; Laguillaumie, F.; Rafols, C.
    Lecture notes in computer science
    Vol. 6056, p. 19-34
    DOI: 10.1007/978-3-642-13013-7_2
    Date of publication: 2010
    Journal article
  • Partial symbol ordering distance

     Herranz, J.; Nin, J.
    International Conference on Modeling Decisions for Artificial Intelligence
    p. 293-302
    DOI: 10.1007/978-3-642-04820-3_27
    Presentation's date: 2009-12
    Presentation of work at congresses
  • Distributed privacy-preserving methods for statistical disclosure control

     Herranz, J.; Nin, J.; Torra, V.
    International Workshop on Data Privacy Management
    p. 33-47
    DOI: 10.1007/978-3-642-11207-2_4
    Presentation's date: 2009-09-23
    Presentation of work at congresses
  • The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure

     Choi, S.; Herranz, J.; Hofheinz, D.; Hwang, J.; Kiltz, E.; Lee, D.; Yung, M.
    Information processing letters
    Vol. 109, num. 16, p. 897-901
    DOI: 10.1016/j.ipl.2009.04.007
    Date of publication: 2009-07
    Journal article
  • Flaws in some self-healing key distribution schemes with revocation

     Daza, V.; Herranz, J.; Saez, G.
    Information processing letters
    Vol. 109, num. 11, p. 523-526
    Date of publication: 2009-05
    Journal article
  • On the transferability of private signatures

     Herranz, J.
    Information sciences
    Vol. 179, num. 11, p. 1647-1656
    Date of publication: 2009-05
    Journal article