Browsing by Author "Herranz, Javier"

Sort by: Order: Results:

  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Elsevier, 2008)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original plaintext ...
  • Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; Libert, Benoît; De Panafieu, Elie; Ràfols, Carla (Elsevier, 2012)
    Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine- grained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), ...
  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Springer, 2007)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original ...
  • Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla (Springer, 2010)
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertext- policy ...
  • Escala, Alex; Herranz, Javier; Libert, Benoît; Ràfols, Carla (Springer, 2014)
    Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications. The notion has been recently extended to the ...
  • Daza, Vanesa; Herranz, Javier; Sáez, Germán (Institute of Electrical and Electronics Engineers (IEEE), 2008)
    In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about ...
  • Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla (Elsevier, 2011)
    Semantic security and anonymity are the two main properties that an identity-based encryption scheme can satisfy. Such properties can be de ned in either an adaptive or a selective scenario, which di er on the moment ...
  • Herranz, Javier; Laguillaumie, Fabien; Libert, Benoît; Ràfols, Carla (Springer, 2012)
    Attribute-based cryptography is a natural solution for fine- grained access control with respect to security policies. In the case of attribute-based signatures (ABS), users obtain from an authority their secret keys ...