Now showing items 25-36 of 48

    • Secret sharing, rank inequalities, and information inequalities 

      Martín Mollevi, Sebastià; Padró Laimon, Carles; Yang, An (2016-01)
      Article
      Open Access
      Beimel and Orlov proved that all information inequalities on four or five variables, together with all information inequalities on more than five variables that are known to date, provide lower bounds on the size of the ...
    • Revisiting distance-based record linkage for privacy-preserving release of statistical datasets 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi; Rodríguez, Pablo; Tassa, Tamir (Elsevier, 2015-07-17)
      Article
      Open Access
      Statistical Disclosure Control (SDC, for short) studies the problem of privacy-preserving data publishing in cases where the data is expected to be used for statistical analysis. An original dataset T containing sensitive ...
    • Vote validatability in Mix-Net-based eVoting 

      Bibiloni, Pedro; Escala Ribas, Alex; Morillo Bosch, M. Paz (2015)
      Article
      Open Access
      One way to build secure electronic voting systems is to use Mix-Nets, which break any correlation between voters and their votes. One of the characteristics of Mix-Net-based eVoting is that ballots are usually decrypted ...
    • Secure and efficient anonymization of distributed confidential databases 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi (2014)
      Article
      Restricted access - publisher's policy
      Let us consider the following situation: t entities (e.g., hospitals) hold different databases containing different records for the same type of confidential (e.g., medical) data. They want to deliver a protected version ...
    • New results and applications for multi-secret sharing schemes 

      Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2014-12-01)
      Article
      Open Access
      In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of ...
    • On the representability of the biuniform matroid 

      Ball, Simeon Michael; Padró Laimon, Carles; Weiner, Zsuzsa; Xing, Chaoping (2013-08-22)
      Article
      Open Access
      Every biuniform matroid is representable over all sufficiently large fields. But it is not known exactly over which finite fields they are representable, and the existence of efficient methods to find a representation for ...
    • Cropping Euler factors of modular L-functions 

      González Rovira, Josep; Jiménez Urroz, Jorge; Lario Loyo, Joan Carles (2013-09)
      Article
      Open Access
      According to the Birch and Swinnerton-Dyer conjectures, if A/Q is an abelian variety, then its L-function must capture a substantial part of the properties of A. The smallest number field L where A has all its endomorphisms ...
    • More hybrid and secure protection of statistical data sets 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (IEEE Computer Society Publications, 2012-09)
      Article
      Restricted access - publisher's policy
      Different methods and paradigms to protect data sets containing sensitive statistical information have been proposed and studied. The idea is to publish a perturbed version of the data set that does not leak confidential ...
    • Kd-trees and the real disclosure risks of large statistical databases 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (Elsevier, 2011)
      Article
      Restricted access - publisher's policy
      In data privacy, record linkage can be used as an estimator of the disclosure risk of protected data. To model the worst case scenario one normally attempts to link records from the original data to the protected data. ...
    • Orders of CM elliptic curves modulo p with at most two primes 

      Iwaniec, H.; Jiménez Urroz, Jorge (2010)
      Article
      Restricted access - publisher's policy
      Nowadays the generation of cryptosystems requires two main aspects. First the security, and then the size of the keys involved in the construction and comunication process. About the former one needs a di±cult ...
    • Classifying data from protected statistical datasets 

      Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
      Article
      Open Access
      Statistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ...
    • On the disclosure risk of multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (Elsevier Science Ltd., 2008-07-22)
      Article
      Restricted access - publisher's policy
      The aim of data protection methods is to protect a microdata file both minimizing the disclosure risk and preserving the data utility. Microaggregation is one of the most popular such methods among statistical agencies. ...