Now showing items 1-20 of 28

  • A cryptographic solution for private distributed simple meeting scheduling 

    Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
    Conference report
    Open Access
    Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
  • Attribute-based encryption implies identity-based encryption 

    Herranz Sotoca, Javier (2017-11-01)
    Article
    Open Access
    In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, they show how an attribute-based encryption ...
  • Attribute-based versions of Schnorr and ElGamal 

    Herranz Sotoca, Javier (2016-01)
    Article
    Open Access
    We design in this paper the first attribute-based cryptosystems that work in the classical discrete logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension of Schnorr signatures, ...
  • Attribute selection in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
    Conference report
    Restricted access - publisher's policy
    Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica 

    Herranz Sotoca, Javier; Sisternes, Juan Ramón (2012)
    Conference report
    Open Access
    Los esquemas de cifrado de clave p´ ublica con propiedades homom´orficas tienen muchas utilidades en aplicaciones reales. Entre los esquemas con propiedades homom´orficas aditivas existentes, hay una familia (desde el ...
  • Classifying data from protected statistical datasets 

    Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
    Article
    Open Access
    Statistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ...
  • Constant size ciphertexts in threshold attribute-based encryption 

    Herranz Sotoca, Javier; Laguillaumie, Fabien; Ràfols Salvador, Carla (Springer Verlag, 2010)
    Conference report
    Open Access
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ...
  • Distributed privacy-preserving methods for statistical disclosure control 

    Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
    Article
    Restricted access - publisher's policy
    Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ...
  • Efficient cryptosystems from 2k-th power residue symbols 

    Herranz Sotoca, Javier; Libert, Benoit; Joye, Marc; Benhamouda, Fabrice (2017-04)
    Article
    Open Access
    Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomizing the plaintext for public-key encryption and introduced the notion of semantic security. They also realized a cryptosystem ...
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2012)
    Conference report
    Open Access
    Las firmas digitales con verificaci´on distribuida protegen en cierta manera el nivel de anonimato o privacidad del firmante, ya que un subconjunto autorizado de usuarios deben colaboran para verificar la (in)validez ...
  • How to group attributes in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
    Article
    Restricted access - publisher's policy
    Microaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ...
  • Ideal homogeneous access structures constructed from graphs 

    Herranz Sotoca, Javier (2009)
    Article
    Open Access
    Starting from a new relation between graphs and secret sharing schemes introduced by Xiao, Liu and Zhang, we show a method to construct more general ideal homogeneous access structures. The method has some advantages: it ...
  • Kd-trees and the real disclosure risks of large statistical databases 

    Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (Elsevier, 2011)
    Article
    Restricted access - publisher's policy
    In data privacy, record linkage can be used as an estimator of the disclosure risk of protected data. To model the worst case scenario one normally attempts to link records from the original data to the protected data. ...
  • Máxima seguridad para firmas digitales con verificación distribuida 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (Publicacions de l'ETSE de la URV, 2010)
    Conference report
    Open Access
    Una de las opciones para proteger el nivel de anonimato o privacidad de un firmante es construir firmas digitales con verificación distribuida: se requiere la colaboración de un subconjunto autorizado de usuarios para ...
  • More hybrid and secure protection of statistical data sets 

    Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (IEEE Computer Society Publications, 2012-09)
    Article
    Restricted access - publisher's policy
    Different methods and paradigms to protect data sets containing sensitive statistical information have been proposed and studied. The idea is to publish a perturbed version of the data set that does not leak confidential ...
  • New results and applications for multi-secret sharing schemes 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2014-12-01)
    Article
    Open Access
    In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of ...
  • On method-specific record linkage for risk assessment 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2007)
    Conference report
    Open Access
    Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused ...
  • On server trust in private proxy auctions 

    Di Crescenzo, Giovanni; Herranz Sotoca, Javier; Sáez Moreno, Germán (2010-10-09)
    Article
    Restricted access - publisher's policy
    We investigate proxy auctions, an auction model which is proving very successful for on-line businesses (e.g.http://www.ebay.com), where a trusted server manages bids from clients by continuously updating the current price ...
  • On the computational security of a distributed key distribution scheme 

    Daza, Vanesa; Herranz Sotoca, Javier; Sáez Moreno, Germán (IEEE, 2008-08)
    Article
    Open Access
    In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about ...
  • On the disclosure risk of multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (Elsevier Science Ltd., 2008-07-22)
    Article
    Restricted access - publisher's policy
    The aim of data protection methods is to protect a microdata file both minimizing the disclosure risk and preserving the data utility. Microaggregation is one of the most popular such methods among statistical agencies. ...