Envíos recientes

  • Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems 

    Villar Santos, Jorge Luis (Springer, 2017)
    Comunicación de congreso
    Acceso abierto
    In this paper we provide new algebraic tools to study the relationship between different Matrix Diffie-Hellman (MDDH) Problems, which are recently introduced as a natural generalization of the so-called Linear Problem. ...
  • Ideal hierarchical secret sharing schemes 

    Farràs Ventura, Oriol; Padró Laimon, Carles (Springer, 2010)
    Texto en actas de congreso
    Acceso abierto
    Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal ...
  • Optimal non-perfect uniform secret sharing schemes 

    Farràs Ventura, Oriol; Hansen, Torben; Kaced, Tarik; Padró Laimon, Carles (Springer, 2014)
    Texto en actas de congreso
    Acceso abierto
    A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum ...
  • The Kernel Matrix Diffie-Hellman assumption 

    Morillo Bosch, M. Paz; Rafols Salvador, Carla; Villar Santos, Jorge Luis (Springer, 2016)
    Comunicación de congreso
    Acceso abierto
    We put forward a new family of computational assumptions, the Kernel Matrix Diffie-Hellman Assumption. Given some matrix A sampled from some distribution D, the kernel assumption says that it is hard to find “in the exponent” ...
  • Small primitive roots and malleability of RSA 

    Jiménez Urroz, Jorge; Dieulefait, Luis Victor (2012)
    Texto en actas de congreso
    Acceso abierto
    In their paper [9], P. Paillier and J. Villar make a conjectur e about the malleability of an RSA modulus. In this paper we present an ex plicit algo- rithm refuting the conjecture. Concretely we can factorize an RSA ...
  • Cifrado homomorfico de clave publica basado en Residuosidad Cuadratica 

    Herranz Sotoca, Javier; Sisternes, Juan Ramón (2012)
    Texto en actas de congreso
    Acceso abierto
    Los esquemas de cifrado de clave p´ ublica con propiedades homom´orficas tienen muchas utilidades en aplicaciones reales. Entre los esquemas con propiedades homom´orficas aditivas existentes, hay una familia (desde el ...
  • Firmas digitales con verificación distribuida en el modelo de seguridad estándar 

    Herranz Sotoca, Javier; Ruiz Rodríguez, Alexandre; Sáez Moreno, Germán (2012)
    Texto en actas de congreso
    Acceso abierto
    Las firmas digitales con verificaci´on distribuida protegen en cierta manera el nivel de anonimato o privacidad del firmante, ya que un subconjunto autorizado de usuarios deben colaboran para verificar la (in)validez ...
  • On method-specific record linkage for risk assessment 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2007)
    Texto en actas de congreso
    Acceso abierto
    Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused ...
  • Anonymous subscription schemes : a flexible fonstruction for on-line services access 

    González Vasco, Maria Isabel; Heidarvand, Somayed; Villar Santos, Jorge Luis (IEEE Press. Institute of Electrical and Electronics Engineers, 2010)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hiding the identity of the user into the e-coin, and providing an additional triggering mechanism that opens this identity in ...
  • A fair and abuse-free contract signing protocol from Boneh-Boyen signature 

    Heidarvand, Somayed; Villar Santos, Jorge Luis (Springer Verlag, 2010)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures on a given contract, in such a way that either both of them get the other party’s signature, or none of them gets anything. ...
  • A cryptographic solution for private distributed simple meeting scheduling 

    Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
    Texto en actas de congreso
    Acceso abierto
    Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
  • Attribute selection in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...

Muestra más