Javier Herranz

From MaRDI portal
Person:404937

Available identifiers

zbMath Open herranz.javierWikidataQ58733234 ScholiaQ58733234MaRDI QIDQ404937

List of research outcomes





PublicationDate of PublicationType
Secret Sharing Schemes for (k, n)-Consecutive Access Structures2023-06-28Paper
How (not) to achieve both coercion resistance and cast as intended verifiability in remote evoting2022-06-29Paper
Shorter lattice-based zero-knowledge proofs for the correctness of a shuffle2022-06-01Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
On the Computational Security of a Distributed Key Distribution Scheme2018-06-12Paper
Efficient cryptosystems from \(2^k\)-th power residue symbols2017-05-22Paper
Attribute-based versions of Schnorr and ElGamal2016-02-16Paper
New results and applications for multi-secret sharing schemes2014-09-04Paper
Sharing many secrets with computational provable security2014-04-11Paper
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications2014-03-25Paper
Signcryption schemes with threshold unsigncryption, and applications2014-03-17Paper
Attribute-based signatures from RSA2014-03-13Paper
Ad-hoc threshold broadcast encryption with shorter ciphertexts2013-12-06Paper
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience2013-10-23Paper
Relations between semantic security and anonymity in identity-based encryption2013-03-28Paper
Short Attribute-Based Signatures for Threshold Predicates2012-06-08Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
Restricted adaptive oblivious transfer2011-12-07Paper
Any 2-asummable bipartite function is weighted threshold2011-08-10Paper
Revocable attribute-based signatures with adaptive security in the standard model2011-06-29Paper
On the generic construction of identity-based signatures with additional properties2011-06-03Paper
On server trust in private proxy auctions2010-11-30Paper
A new algorithm to search for small nonzero \(|x^3-y^2|\) values2010-11-07Paper
Some (in)sufficient conditions for secure hybrid encryption2010-10-22Paper
Fully secure threshold unsigncryption2010-10-12Paper
Additively homomorphic encryption with \(d\)-operand multiplications2010-08-24Paper
Extensions of access structures and their cryptographic applications2010-08-23Paper
Flaws in some self-healing key distribution schemes with revocation2010-08-16Paper
On the security of public key cryptosystems with a double decryption mechanism2010-06-09Paper
Constant size ciphertexts in threshold attribute-based encryption2010-05-28Paper
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures2010-03-31Paper
Distributed RSA Signature Schemes for General Access Structures2010-02-09Paper
Partial symbol ordering distance2009-12-17Paper
A Generic Construction for Token-Controlled Public Key Encryption2008-09-09Paper
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption2008-06-17Paper
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts2008-06-10Paper
On the Generic Construction of Identity-Based Signatures with Additional Properties2008-04-24Paper
Identity-based ring signatures from RSA2008-01-07Paper
Cryptographic techniques for mobile ad-hoc networks2007-11-30Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Distributed ring signatures from general dual access structures2006-11-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44507782004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44084552003-06-29Paper

Research outcomes over time

This page was built for person: Javier Herranz