Carla Ràfols

From MaRDI portal
(Redirected from Person:417987)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Folding schemes with selective verification2024-10-16Paper
Linear-map vector commitments and their practical applications
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Simulation Extractable Versions of Groth’s zk-SNARK Revisited2023-03-22Paper
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
QA-NIZK arguments of same opening for bilateral commitments
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Updateable Inner Product Argument with Logarithmic Verifier and Applications
Lecture Notes in Computer Science
2022-10-13Paper
Signatures of knowledge for Boolean circuits under standard assumptions
Theoretical Computer Science
2022-05-31Paper
An algebraic framework for universal and updatable SNARKs2022-03-31Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
Shorter pairing-based arguments under standard assumptions2020-05-11Paper
Shorter quadratic QA-NIZK proofs2020-01-28Paper
Short tightly secure signatures for signing a vector of group elements: a new approach
Theoretical Computer Science
2019-10-18Paper
An algebraic framework for Diffie-Hellman assumptions
Journal of Cryptology
2017-03-02Paper
The kernel matrix Diffie-Hellman assumption
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
New Techniques for Non-interactive Shuffle and Range Arguments
Applied Cryptography and Network Security
2016-10-04Paper
QA-NIZK arguments in asymmetric groups: new tools and new constructions
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Stretching Groth-Sahai: NIZK proofs of partial satisfiability
Theory of Cryptography
2015-07-06Paper
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On dynamic distribution of private keys over MANETs
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Ad-hoc threshold broadcast encryption with shorter ciphertexts
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
An algebraic framework for Diffie-Hellman assumptions
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Relations between semantic security and anonymity in identity-based encryption
Information Processing Letters
2013-03-28Paper
Short attribute-based signatures for threshold predicates
Lecture Notes in Computer Science
2012-06-08Paper
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
2012-05-14Paper
Extensions of access structures and their cryptographic applications
Applicable Algebra in Engineering, Communication and Computing
2010-08-23Paper
Constant size ciphertexts in threshold attribute-based encryption
Public Key Cryptography – PKC 2010
2010-05-28Paper
scientific article; zbMATH DE number 5556018 (Why is no real title available?)2009-05-22Paper
The Security of All Bits Using List Decoding
Public Key Cryptography – PKC 2009
2009-03-24Paper
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Provable Security
2008-06-10Paper
Cryptographic techniques for mobile ad-hoc networks
Computer Networks
2007-11-30Paper


Research outcomes over time


This page was built for person: Carla Ràfols