Enviaments recents

  • Ideal hierarchical secret sharing schemes 

    Farràs Ventura, Oriol; Padró Laimon, Carles (Springer, 2010)
    Text en actes de congrés
    Accés obert
    Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal ...
  • Optimal non-perfect uniform secret sharing schemes 

    Farràs Ventura, Oriol; Hansen, Torben; Kaced, Tarik; Padró Laimon, Carles (Springer, 2014)
    Text en actes de congrés
    Accés obert
    A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum ...
  • The Kernel Matrix Diffie-Hellman assumption 

    Morillo Bosch, M. Paz; Rafols Salvador, Carla; Villar Santos, Jorge Luis (Springer, 2016)
    Comunicació de congrés
    Accés obert
    We put forward a new family of computational assumptions, the Kernel Matrix Diffie-Hellman Assumption. Given some matrix A sampled from some distribution D, the kernel assumption says that it is hard to find “in the exponent” ...
  • Small primitive roots and malleability of RSA 

    Jiménez Urroz, Jorge; Dieulefait, Luis Victor (2012)
    Text en actes de congrés
    Accés obert
    In their paper [9], P. Paillier and J. Villar make a conjectur e about the malleability of an RSA modulus. In this paper we present an ex plicit algo- rithm refuting the conjecture. Concretely we can factorize an RSA ...
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica 

    Herranz Sotoca, Javier; Sisternes, Juan Ramón (2012)
    Text en actes de congrés
    Accés obert
    Los esquemas de cifrado de clave p´ ublica con propiedades homom´orficas tienen muchas utilidades en aplicaciones reales. Entre los esquemas con propiedades homom´orficas aditivas existentes, hay una familia (desde el ...
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2012)
    Text en actes de congrés
    Accés obert
    Las firmas digitales con verificaci´on distribuida protegen en cierta manera el nivel de anonimato o privacidad del firmante, ya que un subconjunto autorizado de usuarios deben colaboran para verificar la (in)validez ...
  • On method-specific record linkage for risk assessment 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2007)
    Text en actes de congrés
    Accés obert
    Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused ...
  • Anonymous subscription schemes : a flexible fonstruction for on-line services access 

    González Vasco, Maria Isabel; Heidarvand, Somayed; Villar Santos, Jorge Luis (IEEE Press. Institute of Electrical and Electronics Engineers, 2010)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hiding the identity of the user into the e-coin, and providing an additional triggering mechanism that opens this identity in ...
  • A fair and abuse-free contract signing protocol from Boneh-Boyen signature 

    Heidarvand, Somayed; Villar Santos, Jorge Luis (Springer Verlag, 2010)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures on a given contract, in such a way that either both of them get the other party’s signature, or none of them gets anything. ...
  • A cryptographic solution for private distributed simple meeting scheduling 

    Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
    Text en actes de congrés
    Accés obert
    Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...

Mostra'n més