Enviaments recents

  • Small primitive roots and malleability of RSA 

    Jiménez Urroz, Jorge; Dieulefait, Luis Victor (2012)
    Text en actes de congrés
    Accés obert
    In their paper [9], P. Paillier and J. Villar make a conjectur e about the malleability of an RSA modulus. In this paper we present an ex plicit algo- rithm refuting the conjecture. Concretely we can factorize an RSA ...
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica 

    Herranz Sotoca, Javier; Sisternes, Juan Ramón (2012)
    Text en actes de congrés
    Accés obert
    Los esquemas de cifrado de clave p´ ublica con propiedades homom´orficas tienen muchas utilidades en aplicaciones reales. Entre los esquemas con propiedades homom´orficas aditivas existentes, hay una familia (desde el ...
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2012)
    Text en actes de congrés
    Accés obert
    Las firmas digitales con verificaci´on distribuida protegen en cierta manera el nivel de anonimato o privacidad del firmante, ya que un subconjunto autorizado de usuarios deben colaboran para verificar la (in)validez ...
  • On method-specific record linkage for risk assessment 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2007)
    Text en actes de congrés
    Accés obert
    Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused ...
  • Anonymous subscription schemes : a flexible fonstruction for on-line services access 

    González Vasco, Maria Isabel; Heidarvand, Somayed; Villar Santos, Jorge Luis (IEEE Press. Institute of Electrical and Electronics Engineers, 2010)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hiding the identity of the user into the e-coin, and providing an additional triggering mechanism that opens this identity in ...
  • A fair and abuse-free contract signing protocol from Boneh-Boyen signature 

    Heidarvand, Somayed; Villar Santos, Jorge Luis (Springer Verlag, 2010)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures on a given contract, in such a way that either both of them get the other party’s signature, or none of them gets anything. ...
  • A cryptographic solution for private distributed simple meeting scheduling 

    Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
    Text en actes de congrés
    Accés obert
    Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
  • Attribute selection in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
  • Constant size ciphertexts in threshold attribute-based encryption 

    Herranz Sotoca, Javier; Laguillaumie, Fabien; Ràfols Salvador, Carla (Springer Verlag, 2010)
    Text en actes de congrés
    Accés obert
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ...
  • Máxima seguridad para firmas digitales con verificación distribuida 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (Publicacions de l'ETSE de la URV, 2010)
    Text en actes de congrés
    Accés obert
    Una de las opciones para proteger el nivel de anonimato o privacidad de un firmante es construir firmas digitales con verificación distribuida: se requiere la colaboración de un subconjunto autorizado de usuarios para ...

Mostra'n més