Carla Ràfols

From MaRDI portal
Person:417987

Available identifiers

zbMath Open rafols.carlaMaRDI QIDQ417987

List of research outcomes





PublicationDate of PublicationType
Folding schemes with selective verification2024-10-16Paper
Linear-map vector commitments and their practical applications2023-08-21Paper
Simulation Extractable Versions of Groth’s zk-SNARK Revisited2023-03-22Paper
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions2022-11-09Paper
QA-NIZK Arguments of Same Opening for Bilateral Commitments2022-11-09Paper
Updateable Inner Product Argument with Logarithmic Verifier and Applications2022-10-13Paper
Signatures of knowledge for Boolean circuits under standard assumptions2022-05-31Paper
An algebraic framework for universal and updatable SNARKs2022-03-31Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
Shorter pairing-based arguments under standard assumptions2020-05-11Paper
Shorter quadratic QA-NIZK proofs2020-01-28Paper
Short tightly secure signatures for signing a vector of group elements: a new approach2019-10-18Paper
An algebraic framework for Diffie-Hellman assumptions2017-03-02Paper
The Kernel Matrix Diffie-Hellman Assumption2017-02-01Paper
New Techniques for Non-interactive Shuffle and Range Arguments2016-10-04Paper
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions2016-06-10Paper
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability2015-07-06Paper
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations2014-08-07Paper
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications2014-03-25Paper
On dynamic distribution of private keys over MANETs2013-12-06Paper
Ad-hoc threshold broadcast encryption with shorter ciphertexts2013-12-06Paper
An Algebraic Framework for Diffie-Hellman Assumptions2013-09-17Paper
Relations between semantic security and anonymity in identity-based encryption2013-03-28Paper
Short Attribute-Based Signatures for Threshold Predicates2012-06-08Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
Extensions of access structures and their cryptographic applications2010-08-23Paper
Constant Size Ciphertexts in Threshold Attribute-Based Encryption2010-05-28Paper
https://portal.mardi4nfdi.de/entity/Q36258822009-05-22Paper
The Security of All Bits Using List Decoding2009-03-24Paper
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts2008-06-10Paper
Cryptographic techniques for mobile ad-hoc networks2007-11-30Paper

Research outcomes over time

This page was built for person: Carla Ràfols