Now showing items 1-20 of 36

  • A cryptographic solution for private distributed simple meeting scheduling 

    Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
    Conference report
    Open Access
    Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
  • Attribute-based encryption implies identity-based encryption 

    Herranz Sotoca, Javier (2017-11-01)
    Article
    Open Access
    In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, they show how an attribute-based encryption ...
  • Attribute-based versions of Schnorr and ElGamal 

    Herranz Sotoca, Javier (2016-01)
    Article
    Open Access
    We design in this paper the first attribute-based cryptosystems that work in the classical discrete logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension of Schnorr signatures, ...
  • Attribute selection in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
    Conference report
    Restricted access - publisher's policy
    Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica 

    Herranz Sotoca, Javier; Sisternes, Juan Ramón (2012)
    Conference report
    Open Access
    Los esquemas de cifrado de clave p´ ublica con propiedades homom´orficas tienen muchas utilidades en aplicaciones reales. Entre los esquemas con propiedades homom´orficas aditivas existentes, hay una familia (desde el ...
  • Classifying data from protected statistical datasets 

    Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
    Article
    Open Access
    Statistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ...
  • CODIS I CRIPTOGRAFIA 

    Herranz Sotoca, Javier (Universitat Politècnica de Catalunya, 2016-12-22)
    Exam
    Restricted access to the UPC academic community
  • CODIS I CRIPTOGRAFIA 

    Herranz Sotoca, Javier (Universitat Politècnica de Catalunya, 2015-01-09)
    Exam
    Restricted access to the UPC academic community
  • CODIS I CRIPTOGRAFIA 

    Herranz Sotoca, Javier (Universitat Politècnica de Catalunya, 2016-11-02)
    Exam
    Restricted access to the UPC academic community
  • CODIS I CRIPTOGRAFIA 

    Herranz Sotoca, Javier (Universitat Politècnica de Catalunya, 2016-01-08)
    Exam
    Restricted access to the UPC academic community
  • Constant size ciphertexts in threshold attribute-based encryption 

    Herranz Sotoca, Javier; Laguillaumie, Fabien; Ràfols Salvador, Carla (Springer Verlag, 2010)
    Conference report
    Open Access
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ...
  • Distributed privacy-preserving methods for statistical disclosure control 

    Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
    Article
    Restricted access - publisher's policy
    Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ...
  • Efficient cryptosystems from 2k-th power residue symbols 

    Herranz Sotoca, Javier; Libert, Benoit; Joye, Marc; Benhamouda, Fabrice (2017-04)
    Article
    Open Access
    Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomizing the plaintext for public-key encryption and introduced the notion of semantic security. They also realized a cryptosystem ...
  • Examen final 

    Herranz Sotoca, Javier; Boza Rocho, Santiago; Olm Miras, Josep Maria; Alonso Alonso, María Teresa (Universitat Politècnica de Catalunya, 2019-01-22)
    Exam
    Restricted access to the UPC academic community
  • Examen final 

    Herranz Sotoca, Javier; Boza Rocho, Santiago; Olm Miras, Josep Maria; Alonso Alonso, María Teresa (Universitat Politècnica de Catalunya, 2018-06-06)
    Exam
    Restricted access to the UPC academic community
  • Examen MQ 

    Herranz Sotoca, Javier; Boza Rocho, Santiago; Olm Miras, Josep Maria; Alonso Alonso, María Teresa (Universitat Politècnica de Catalunya, 2018-10-29)
    Exam
    Restricted access to the UPC academic community
  • Examen MQ 

    Herranz Sotoca, Javier; Boza Rocho, Santiago; Olm Miras, Josep Maria; Alonso Alonso, María Teresa (Universitat Politècnica de Catalunya, 2018-04-06)
    Exam
    Restricted access to the UPC academic community
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2012)
    Conference report
    Open Access
    Las firmas digitales con verificaci´on distribuida protegen en cierta manera el nivel de anonimato o privacidad del firmante, ya que un subconjunto autorizado de usuarios deben colaboran para verificar la (in)validez ...
  • How to group attributes in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
    Article
    Restricted access - publisher's policy
    Microaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ...
  • Ideal homogeneous access structures constructed from graphs 

    Herranz Sotoca, Javier (2009)
    Article
    Open Access
    Starting from a new relation between graphs and secret sharing schemes introduced by Xiao, Liu and Zhang, we show a method to construct more general ideal homogeneous access structures. The method has some advantages: it ...