Welcome to the UPF Digital Repository

Browsing Congressos (Departament de Tecnologies de la Informació i les Comunicacions) by Author "Ràfols, Carla"

Browsing Congressos (Departament de Tecnologies de la Informació i les Comunicacions) by Author "Ràfols, Carla"

Sort by: Order: Results:

  • Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge L. (Springer, 2013)
    We put forward a new algebraic framework to generalize and analyze Di_e-Hellman like Decisional Assumptions which allows us to argue about security and applications by considering only algebraic properties. Our D`;k-MDDH ...
  • Galindo, David; Morillo, Paz; Ràfols, Carla (Springer, 2006)
    Identity-based public key cryptography is aimed at simplifying the management of certificates in traditional public key infrastructures by means of using the identity of a user as its public key. The user must identify ...
  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Springer, 2007)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original ...
  • Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla (Springer, 2010)
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertext- policy ...
  • Escala, Alex; Herranz, Javier; Libert, Benoît; Ràfols, Carla (Springer, 2014)
    Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications. The notion has been recently extended to the identity-based ...
  • Morillo, Paz; Ràfols, Carla; Villar, Jorge L. (Springer, 2016)
    We put forward a new family of computational assumptions, the Kernel Matrix Diffi-Hellman Assumption. Given some matrix A sampled from some distribution D, the kernel assumption says that it is hard to find \in the exponent" ...
  • González, Alfonso; Ràfols, Carla (Springer, 2016)
    We construct the most efficient non-interactive Argument of Correctness of a Shuffle and Range Argument under falsifiable assumptions in asymmetric bilinear groups. Our constructions use as a common building block a novel ...
  • Herold, Gottfried; Hoffmann, Max; Klooß, Michael; Ràfols, Carla; Rupp, Andy (ACM Association for Computer Machinery, 2017)
    Bilinear groups form the algebraic setting for a multitude of important cryptographic protocols including anonymous credentials, e-cash, e-voting, e-coupon, and loyalty systems. It is typical of such crypto protocols that ...
  • Herold, Gottfried; Hesse, Julia; Hofheinz, Dennis; Ràfols, Carla; Rupp, Andy (Springer, 2014)
    At Eurocrypt 2010, Freeman presented a framework to convert cryptosystems based on composite-order groups into ones that use prime-order groups. Such a transformation is interesting not only from a conceptual point of view, ...
  • González, Alonso; Hevia, Alejandro; Ràfols, Carla (Springer, 2015)
    A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces of ^Gm, where ^G is a group equipped with a bilinear map e : G x H --> T. Although applicable ...
  • Ràfols, Carla; Silva, Javier (Springer, 2020)
    Zero-knowledge proofs of satisfiability of linear equations over a group are often used as a building block of more complex protocols. In particular, in an asymmetric bilinear group we often have two commitments in different ...
  • Herranz, Javier; Laguillaumie, Fabien; Libert, Benoît; Ràfols, Carla (Springer, 2012)
    Attribute-based cryptography is a natural solution for fine- grained access control with respect to security policies. In the case of attribute-based signatures (ABS), users obtain from an authority their secret keys as a ...
  • Daza, Vanesa; González, Alonso; Pindado, Zaira; Ràfols, Carla; Silva, Javier (Springer, 2019)
    Despite recent advances in the area of pairing-friendly Non-Interactive Zero-Knowledge proofs, there have not been many efficiency improvements in constructing arguments of satisfiability of quadratic (and larger degree) ...
  • Baghery, Karim; González, Alonso; Pindado, Zaira; Ràfols, Carla (Springer, 2020)
    This paper constructs unbounded simulation sound proofs for boolean circuit satisfiability under standard assumptions with proof size O(n+d) bilinear group elements, where d is the depth and n is the input size of the ...
  • Ràfols, Carla (Springer, 2015)
    Groth, Ostrovsky and Sahai constructed a non-interactive Zap for NP-languages by observing that the common reference string of their proof system for circuit satisfiability admits what they call correlated key generation. ...
  • Morillo, Paz; Ràfols, Carla (Springer, 2009)
    The relation between list decoding and hard-core predicates has provided a clean and easy methodology to prove the hardness of certain predicates. So far this methodology has only been used to prove that the O(log logN) ...
  • Daza, Vanesa; Ràfols, Carla; Zacharakis, Alexandros (Springer, 2020)
    We propose an improvement for the inner product argument of Bootle et al. (EUROCRYPT’16). The new argument replaces the unstructured common reference string (the commitment key) by a structured one. We give two instantiations ...

Search DSpace


Advanced Search

Browse

My Account

In collaboration with Compliant to Partaking