Go to the content (press return)

Scientific and technological production

1 to 50 of 123 results
 
  • New results and applications for multi-secret sharing schemes  Open access

     Herranz Sotoca, Javier; Ruiz Rodriguez, Alexandre; Saez Moreno, German
    Designs codes and cryptography
    Vol. 73, num. 3, p. 841-864
    DOI: 10.1007/s10623-013-9831-6
    Date of publication: 2014-12-01
    Journal article
    Access to the full text
  • Attribute-based signatures from RSA

     Herranz Sotoca, Javier
    Theoretical computer science
    Vol. 527, num. March 2014, p. 73-82
    DOI: 10.1016/j.tcs.2014.01.028
    Date of publication: 2014-03
    Journal article
  • Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications

     Escala Ribas, Alex; Herranz Sotoca, Javier; Libert, Benoit; Rafols Salvador, Carla
    Lecture notes in computer science
    Vol. 8383, p. 239-256
    DOI: 10.1007/978-3-642-54631-0_14
    Date of publication: 2014-03
    Journal article
  • Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications

     Escala Ribas, Alex; Herranz Sotoca, Javier; Libert, Benoit; Rafols Salvador, Carla
    International Conference on Practice and Theory in Public Key Cryptography
    p. 239-256
    DOI: 10.1007/978-3-642-54631-0-14
    Presentation's date: 2014-03
    Presentation of work at congresses
  • Hacia una sociedad digital segura: avances matemáticos en criptografía y su impacto en las tecnologías digitales

     Morillo Bosch, Maria Paz; Saez Moreno, German; Martin Mollevi, Sebastia; González Vasco, Maria Isabel; Steinwandt, Rainer; d'Arco, Paolo; Kiltz, Eike; Padro Laimon, Carles; Herranz Sotoca, Javier; Pérez del Pozo, Ángel; Villar Santos, Jorge Luis
    Competitive project
  • Contributions to Secret Sharing and Other Distributed Cryptosystems  Open access

     Ruiz Rodriguez, Alexandre
    Universitat Politècnica de Catalunya
    Theses
  • Sharing many secrets with computational provable security

     Herranz Sotoca, Javier; Ruiz, Alexandre; Saez Moreno, German
    Information processing letters
    Vol. 113, num. 14-16, p. 572-579
    DOI: 10.1016/j.ipl.2013.05.003
    Date of publication: 2013-07
    Journal article
  • Foreword from the DPM 2012 program chairs

     Di Pietro, Roberto; Herranz Sotoca, Javier
    Lecture notes in computer science
    Vol. 7731, p. 5
    Date of publication: 2012-09-13
    Journal article
  • More hybrid and secure protection of statistical data sets

     Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc
    IEEE transactions on dependable and secure computing
    Vol. 9, num. 5, p. 727-740
    DOI: 10.1109/TDSC.2012.40
    Date of publication: 2012-09
    Journal article
    Image
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar  Open access

     Herranz Sotoca, Javier; Ruiz Rodriguez, Alexandre; Saez Moreno, German
    Reunión Española sobre Criptología y Seguridad de la Información
    p. 1-6
    Presentation's date: 2012-09
    Presentation of work at congresses
    Access to the full text
  • Identity-based encryption with master key-dependent message security and leakage-resilience

     Galindo, David; Herranz Sotoca, Javier; Villar Santos, Jorge Luis
    European Symposium on Research in Computer Security
    p. 627-642
    DOI: 10.1007/978-3-642-33167-1_36
    Presentation's date: 2012-09
    Presentation of work at congresses
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica  Open access

     Herranz Sotoca, Javier; Sisternes, Juan Ramón
    Reunión Española sobre Criptología y Seguridad de la Información
    p. 1-6
    Presentation's date: 2012-09
    Presentation of work at congresses
    Access to the full text
  • Attribute-based encryption schemes with constant-size ciphertexts

     Attrapadung, Nuttapong; Herranz Sotoca, Javier; Laguillaumie, Fabien; Libert, B.; de Panafieu, Elie; Rafols Salvador, Carla
    Theoretical computer science
    Vol. 422, p. 15-38
    DOI: 10.1016/j.tcs.2011.12.004
    Date of publication: 2012-03-09
    Journal article
  • Kd-trees and the real disclosure risks of large statistical databases

     Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc
    Information fusion
    Vol. 13, num. 4, p. 260-273
    DOI: 10.1016/j.inffus.2011.03.001
    Date of publication: 2012
    Journal article
    Image
  • Short attribute-based signatures for threshold predicates

     Herranz Sotoca, Javier; Laguillaumie, Fabien; Libert, B.; Rafols Salvador, Carla
    Cryptographers' Track at the RSA Conference
    p. 51-67
    DOI: 10.1007/978-3-642-27954-6_4
    Presentation's date: 2012
    Presentation of work at congresses
  • Restricted adaptive oblivious transfer

     Herranz Sotoca, Javier
    Theoretical computer science
    Vol. 412, num. 46, p. 6498-6506
    DOI: 10.1016/j.tcs.2011.06.023
    Date of publication: 2011-10-28
    Journal article
  • Optimal symbol alignment distance: a new distance for sequences of symbols  Open access

     Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc
    IEEE transactions on knowledge and data engineering
    Vol. 23, num. 10, p. 1541-1554
    DOI: 10.1109/TKDE.2010.190
    Date of publication: 2011-10-14
    Journal article
    Access to the full text
  • Any 2-asummable bipartite function is weighted threshold

     Herranz Sotoca, Javier
    Discrete applied mathematics
    Vol. 159, num. 11, p. 1079-1084
    DOI: 10.1016/j.dam.2011.01.023
    Date of publication: 2011-07-06
    Journal article
  • Revocable attribute-based signatures with adaptive security in the standard model

     Escala Ribas, Alex; Herranz Sotoca, Javier; Morillo Bosch, Maria Paz
    International Conference on Cryptology in Africa
    p. 224-241
    Presentation's date: 2011-07-05
    Presentation of work at congresses
  • Revocable attribute-based signatures with adaptive security in the standard model

     Escala Ribas, Alex; Herranz Sotoca, Javier; Morillo Bosch, Maria Paz
    Lecture notes in computer science
    Vol. 6737, p. 224-241
    Date of publication: 2011-05-10
    Journal article
  • Relations between semantic security and anonymity in identity based encryption

     Herranz Sotoca, Javier; Laguillaumie, Fabien; Rafols Salvador, Carla
    Information processing letters
    Vol. 11, num. 10, p. 453-460
    DOI: 10.1016/j.ipl.2011.02.002
    Date of publication: 2011
    Journal article
  • Attribute-based group key establishment

     Herranz Sotoca, Javier
    Mathematical reviews
    Date of publication: 2011
    Journal article
  • New approaches for deniable authentication

     Herranz Sotoca, Javier
    Mathematical reviews
    Date of publication: 2011
    Journal article
  • Attribute-based signature with policy-and-endorsement mechanism

     Herranz Sotoca, Javier
    Mathematical reviews
    Date of publication: 2011
    Journal article
  • On the generic construcion of identity-based signatures with additional properties

     Galindo, David; Herranz Sotoca, Javier; Kiltz, Eike
    Advances in mathematics
    Vol. 4, num. 4, p. 423-453
    DOI: 10.3934/amc.2010.4.453
    Date of publication: 2010-11
    Journal article
  • Using classification methods to evaluate attribute disclosure risk

     Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra Raventós, Vicenç
    International Conference on Modeling Decisions for Artificial Intelligence
    p. 277-286
    DOI: 10.1007/978-3-642-16292-3_27
    Presentation's date: 2010-10-29
    Presentation of work at congresses
  • Fully secure threshold unsigncryption

     Herranz Sotoca, Javier; Saez Moreno, German
    International Conference on Provable Security
    p. 261-278
    DOI: 10.1007/978-3-642-16280-0_18
    Presentation's date: 2010-10-14
    Presentation of work at congresses
  • Fully secure threshold unsigncryption

     Herranz Sotoca, Javier; Saez Moreno, German
    Lecture notes in computer science
    Vol. 6402, p. 261-278
    DOI: 10.1007/978-3-642-16280-0_18
    Date of publication: 2010-10-13
    Journal article
  • On server trust in private proxy auctions

     Di Crescenzo, Giovanni; Herranz Sotoca, Javier; Saez Moreno, German
    Electronic commerce research
    Vol. 10, num. 3-4, p. 291-311
    DOI: 10.1007/s10660-010-9057-x
    Date of publication: 2010-10-09
    Journal article
    Image
  • Máxima seguridad para firmas digitales con verificación distribuida  Open access

     Herranz Sotoca, Javier; Ruiz Rodriguez, Alexandre; Saez Moreno, German
    Reunión Española sobre Criptología y Seguridad de la Información
    p. 150-162
    Presentation's date: 2010-09-10
    Presentation of work at congresses
    Access to the full text
  • Introduction to privacy and anonymity in information management systems

     Herranz Sotoca, Javier; Nin Guerrero, Jordi
    DOI: 10.1007/978-1-84996-238-4_1
    Date of publication: 2010-07-29
    Book chapter
    Image
  • Extensions of access structures and their cryptographic applications

     Daza Fernandez, Vanesa; Herranz Sotoca, Javier; Morillo Bosch, Maria Paz; Rafols Salvador, Carla
    Applicable algebra in engineering communication and computing
    Vol. 21, num. 4, p. 257-284
    DOI: 10.1007/s00200-010-0125-1
    Date of publication: 2010-07
    Journal article
  • Classifying data from protected statistical datasets  Open access

     Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra Raventós, Vicenç
    Computers and security
    Vol. 29, num. 8, p. 875-890
    DOI: 10.1016/j.cose.2010.05.005
    Date of publication: 2010-06-09
    Journal article
    Access to the full text
  • Constant size ciphertexts in threshold attribute-based encryption  Open access

     Herranz Sotoca, Javier; Laguillaumie, Fabien; Rafols Salvador, Carla
    International Conference on Practice and Theory in Public Key Cryptography
    p. 19-34
    DOI: 10.1007/978-3-642-13013-7_2
    Presentation's date: 2010-05-26
    Presentation of work at congresses
    Access to the full text
  • Additively homomorphic encryption with d-operand multiplications

     Aguilar Melchor, Carlos; Gaborit, Philippe; Herranz Sotoca, Javier
    Lecture notes in computer science
    Vol. 6223, p. 138-154
    DOI: 10.1007/978-3-642-14623-7_8
    Date of publication: 2010
    Journal article
  • Some (in)sufficient conditions for secure hybrid encryption

     Herranz Sotoca, Javier; Hofheinz, Dennis; Kiltz, Eike
    Information and computation
    Vol. 208, num. 11, p. 1243-1257
    DOI: 10.1016/j.ic.2010.07.002
    Date of publication: 2010
    Journal article
  • Constant size ciphertexts in threshold attribute-based encryption

     Herranz Sotoca, Javier; Laguillaumie, Fabien; Rafols Salvador, Carla
    Lecture notes in computer science
    Vol. 6056, p. 19-34
    DOI: 10.1007/978-3-642-13013-7_2
    Date of publication: 2010
    Journal article
  • Distributed privacy-preserving methods for statistical disclosure control

     Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra Raventós, Vicenç
    Lecture notes in computer science
    Vol. 5939, p. 33-47
    Date of publication: 2010
    Journal article
    Image
  • CRIPTOGRAFIA DE CLAVE PUBLICA Y COMPARTICIÓN DE SECRETOS

     Morillo Bosch, Maria Paz; Gracia Rivas, Ignacio; Martí Farré, Jaume; Martin Mollevi, Sebastia; Padro Laimon, Carles; Saez Moreno, German; Herranz Sotoca, Javier; Rafols Salvador, Carla; Heidarvand, Somayed; Villar Santos, Jorge Luis
    Competitive project
  • European Network of Excellence for Cryptology II

     Morillo Bosch, Maria Paz; Martí Farré, Jaume; Padro Laimon, Carles; Rafols Salvador, Carla; Gracia Rivas, Ignacio; Heidarvand, Somayed; Herranz Sotoca, Javier; Saez Moreno, German; Martin Mollevi, Sebastia; Villar Santos, Jorge Luis
    Competitive project
  • Partial symbol ordering distance

     Herranz Sotoca, Javier; Nin Guerrero, Jordi
    International Conference on Modeling Decisions for Artificial Intelligence
    p. 293-302
    DOI: 10.1007/978-3-642-04820-3_27
    Presentation's date: 2009-12
    Presentation of work at congresses
    Image
  • Distributed privacy-preserving methods for statistical disclosure control

     Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra Raventós, Vicenç
    International Workshop on Data Privacy Management
    p. 33-47
    DOI: 10.1007/978-3-642-11207-2_4
    Presentation's date: 2009-09-23
    Presentation of work at congresses
  • The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure

     Choi, SG; Herranz Sotoca, Javier; Hofheinz, D; Hwang, JY; Kiltz, E; Lee, DH; Yung, M
    Information processing letters
    Vol. 109, num. 16, p. 897-901
    DOI: 10.1016/j.ipl.2009.04.007
    Date of publication: 2009-07
    Journal article
  • On the transferability of private signatures

     Herranz Sotoca, Javier
    Information sciences
    Vol. 179, num. 11, p. 1647-1656
    Date of publication: 2009-05
    Journal article
  • Flaws in some self-healing key distribution schemes with revocation

     Daza Fernandez, Vanesa; Herranz Sotoca, Javier; Saez Moreno, German
    Information processing letters
    Vol. 109, num. 11, p. 523-526
    Date of publication: 2009-05
    Journal article
  • Ideal homogeneous access structures constructed from graphs  Open access

     Herranz Sotoca, Javier
    Journal of universal computer science
    Vol. 15, num. 14, p. 2881-2893
    DOI: 10.3217/jucs-015-14-2881
    Date of publication: 2009
    Journal article
    Access to the full text
  • Partial symbol ordering distance

     Herranz Sotoca, Javier; Nin Guerrero, Jordi
    Lecture notes in computer science
    Vol. 5861, p. 293-302
    DOI: 10.1007/978-3-642-04820-3_27
    Date of publication: 2009
    Journal article
  • A cryptographic solution for private distributed simple meeting scheduling  Open access

     Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi
    International Conference of the Catalan Association for Artificial Intelligence
    p. 275-283
    DOI: 10.3233/978-1-60750-061-2-275
    Presentation's date: 2009
    Presentation of work at congresses
    Access to the full text