Browsing by Author "Morillo, Paz"

Sort by: Order: Results:

  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Elsevier, 2008)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original ...
  • Galindo, David; Morillo, Paz; Ràfols, Carla (Springer, 2006)
    Identity-based public key cryptography is aimed at simplifying the management of certificates in traditional public key infrastructures by means of using the identity of a user as its public key. The user must identify ...
  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Springer, 2007)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original ...
  • Morillo, Paz; Ràfols, Carla; Villar, Jorge L. (Springer, 2016)
    We put forward a new family of computational assumptions, the Kernel Matrix Diffi-Hellman Assumption. Given some matrix A sampled from some distribution D, the kernel assumption says that it is hard to find \in the exponent" ...
  • Daza, Vanesa; Morillo, Paz; Ràfols, Carla (Elsevier, 2007)
    Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security. However, the figure of the Private Key Generator (PKG) is not adequate in the MANET setting, since it may not be reachable ...
  • Morillo, Paz; Ràfols, Carla (Springer, 2009)
    The relation between list decoding and hard-core predicates has provided a clean and easy methodology to prove the hardness of certain predicates. So far this methodology has only been used to prove that the O(log logN) ...

Search DSpace

Browse

My Account

In collaboration with Compliant to Partaking