[go: up one dir, main page]

Follow
Javier Herranz
Title
Cited by
Cited by
Year
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C Ràfols
International Workshop on Public Key Cryptography, 19-34, 2010
3542010
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
2562012
Forking lemmas for ring signature schemes
J Herranz, G Sáez
International Conference on Cryptology in India, 266-279, 2003
2512003
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Rafols
Cryptographers’ track at the RSA conference, 51-67, 2012
1832012
Additively Homomorphic Encryption with d-Operand Multiplications
CA Melchor, P Gaborit, J Herranz
Annual Cryptology Conference, 138-154, 2010
1742010
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
International Conference on the Theory and Application of Cryptology and …, 2006
1582006
Revocable attribute-based signatures with adaptive security in the standard model
A Escala, J Herranz, P Morillo
International conference on cryptology in Africa, 224-241, 2011
1392011
New identity-based ring signature schemes
J Herranz, G Sáez
International Conference on Information and Communications Security, 27-39, 2004
1362004
Deterministic identity-based signatures for partial aggregation
J Herranz
The Computer Journal 49 (3), 322-330, 2006
1092006
Rethinking rank swapping to decrease disclosure risk
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 64 (1), 346-364, 2008
1082008
On the disclosure risk of multivariate microaggregation
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 67 (3), 399-412, 2008
722008
Identity-based ring signatures from RSA
J Herranz
Theoretical Computer Science 389 (1-2), 100-117, 2007
722007
New results on multipartite access structures
J Herranz, G Sáez
IEE Proceedings-Information Security 153 (4), 153-162, 2006
602006
New results and applications for multi-secret sharing schemes
J Herranz, A Ruiz, G Sáez
Designs, codes and cryptography 73 (3), 841-864, 2014
542014
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
482007
Identity-based encryption with master key-dependent message security and leakage-resilience
D Galindo, J Herranz, J Villar
European Symposium on Research in Computer Security, 627-642, 2012
472012
Cryptographic techniques for mobile ad-hoc networks
V Daza, J Herranz, P Morillo, C Rafols
Computer Networks 51 (18), 4938-4950, 2007
472007
KEM/DEM: Necessary and sufficient conditions for secure hybrid encryption
J Herranz, D Hofheinz, E Kiltz
Manuscript in preparation, 2006
472006
Some (in) sufficient conditions for secure hybrid encryption
J Herranz, D Hofheinz, E Kiltz
Information and Computation 208 (11), 1243-1257, 2010
45*2010
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
J Herranz, G Sáez
International Conference on Financial Cryptography, 286-302, 2003
452003
The system can't perform the operation now. Try again later.
Articles 1–20