Javier Herranz

From MaRDI portal
Person:404937

Available identifiers

zbMath Open herranz.javierWikidataQ58733234 ScholiaQ58733234MaRDI QIDQ404937

List of research outcomes

PublicationDate of PublicationType
Secret Sharing Schemes for (k, n)-Consecutive Access Structures2023-06-28Paper
How (not) to achieve both coercion resistance and cast as intended verifiability in remote evoting2022-06-29Paper
Shorter lattice-based zero-knowledge proofs for the correctness of a shuffle2022-06-01Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
On the Computational Security of a Distributed Key Distribution Scheme2018-06-12Paper
Efficient cryptosystems from \(2^k\)-th power residue symbols2017-05-22Paper
Attribute-based versions of Schnorr and ElGamal2016-02-16Paper
New results and applications for multi-secret sharing schemes2014-09-04Paper
Sharing many secrets with computational provable security2014-04-11Paper
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications2014-03-25Paper
Signcryption schemes with threshold unsigncryption, and applications2014-03-17Paper
Attribute-based signatures from RSA2014-03-13Paper
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts2013-12-06Paper
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience2013-10-23Paper
Relations between semantic security and anonymity in identity-based encryption2013-03-28Paper
Short Attribute-Based Signatures for Threshold Predicates2012-06-08Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
Restricted adaptive oblivious transfer2011-12-07Paper
Any 2-asummable bipartite function is weighted threshold2011-08-10Paper
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model2011-06-29Paper
On the generic construction of identity-based signatures with additional properties2011-06-03Paper
On server trust in private proxy auctions2010-11-30Paper
A new algorithm to search for small nonzero |𝑥³-𝑦²| values2010-11-07Paper
Some (in)sufficient conditions for secure hybrid encryption2010-10-22Paper
Fully Secure Threshold Unsigncryption2010-10-12Paper
Additively Homomorphic Encryption with d-Operand Multiplications2010-08-24Paper
Extensions of access structures and their cryptographic applications2010-08-23Paper
Flaws in some self-healing key distribution schemes with revocation2010-08-16Paper
On the security of public key cryptosystems with a double decryption mechanism2010-06-09Paper
Constant Size Ciphertexts in Threshold Attribute-Based Encryption2010-05-28Paper
Computer Aided Verification2010-03-31Paper
Distributed RSA Signature Schemes for General Access Structures2010-02-09Paper
Partial Symbol Ordering Distance2009-12-17Paper
A Generic Construction for Token-Controlled Public Key Encryption2008-09-09Paper
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption2008-06-17Paper
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts2008-06-10Paper
On the Generic Construction of Identity-Based Signatures with Additional Properties2008-04-24Paper
Identity-based ring signatures from RSA2008-01-07Paper
Cryptographic techniques for mobile ad-hoc networks2007-11-30Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Distributed ring signatures from general dual access structures2006-11-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44507782004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44084552003-06-29Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Javier Herranz