Welcome to the UPF Digital Repository

Departament de Tecnologies de la Informació i les Comunicacions

Departament de Tecnologies de la Informació i les Comunicacions

 

Documents de recerca, en accés obert, com ara articles de revista, llibres, comunicacions, ponències o posters a jornades i congressos, etc., del Departament de Tecnologies de la Informació i de les Comunicacions de la UPF.

Collections in this community

Recent Submissions

  • Porcaro, Lorenzo; Gómez Gutiérrez, Emilia, 1975- (2019)
    Listening to music radios is an activity that since the 20th century is part of the cultural habits for people all over the world. While in the case of analog radios DJs are in charge of selecting the music to be ...
  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Springer, 2007)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original ...
  • Daza, Vanesa; Morillo, Paz; Ràfols, Carla (Elsevier, 2007)
    Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security. However, the figure of the Private Key Generator (PKG) is not adequate in the MANET setting, since it may not be ...
  • Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla (Elsevier, 2008)
    In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original plaintext ...
  • Morillo, Paz; Ràfols, Carla (Springer, 2009)
    The relation between list decoding and hard-core predicates has provided a clean and easy methodology to prove the hardness of certain predicates. So far this methodology has only been used to prove that the O(log logN) ...
  • Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla (Springer, 2010)
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertext- policy ...
  • Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla (Elsevier, 2011)
    Semantic security and anonymity are the two main properties that an identity-based encryption scheme can satisfy. Such properties can be de ned in either an adaptive or a selective scenario, which di er on the moment ...
  • Herranz, Javier; Laguillaumie, Fabien; Libert, Benoît; Ràfols, Carla (Springer, 2012)
    Attribute-based cryptography is a natural solution for fine- grained access control with respect to security policies. In the case of attribute-based signatures (ABS), users obtain from an authority their secret keys ...
  • Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; Libert, Benoît; De Panafieu, Elie; Ràfols, Carla (Elsevier, 2012)
    Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine- grained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), ...
  • Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge (Springer, 2013)
    We put forward a new algebraic framework to generalize and analyze Di_e-Hellman like Decisional Assumptions which allows us to argue about security and applications by considering only algebraic properties. Our D`;k-MDDH ...
  • Vogl, Richard; Leimeister, Matthias; Nuanáin, Carthach Ó; Hlatky, Michael; Jordà Puig, Sergi; Knees, Peter (Audio Engineering Society, 2016)
    Drum tracks of electronic dance music pieces are a central and style-defining element. Yet,creating them can be a cumbersome task, mostly due to lack of appropriate tools and inputdevices. In this work we use a UI prototype ...
  • Gong, Rong; Serra, Xavier (2017)
    Music Information Retrieval (MIR) technologies have been proven useful in assisting western classical singing training. Jingju (also known as Beijing or Peking opera) singing is different from western singing in terms ...
  • Monte Ordoño, Julia, 1989-; Toro Soto, Juan Manuel, 1976- (Public Library of Science (PLoS), 2017)
    The extraction of abstract structures from speech (or from gestures in the case of sign languages) has been claimed to be a fundamental mechanism for language acquisition. In the present study we registered the neural ...
  • Crespo Bojorque, Paola, 1985-; Monte Ordoño, Julia, 1989-; Toro Soto, Juan Manuel, 1976- (Elsevier, 2018)
    Consonant musical intervals tend to be more readily processed than dissonant intervals. In the present study, we explore the neural basis for this difference by registering how the brain responds after changes in consonance ...
  • van der Togt, Chris; Stănişor, Liviu; Pooresmaeili, Arezoo; Albantakis, Larissa; Deco, Gustavo; Roelfsema, Pieter R. (Oxford University Press, 2016)
    How do you make a decision if you do not know the rules of the game? Models of sensory decision-making suggest that choices are slow if evidence is weak, but they may only apply if the subject knows the task rules. Here, ...
  • Schaper, Marie-Monique; Iversen, Ole Sejer; Malinverni, Laura; Parés, Narcís, 1966- (Elsevier, 2019)
    In this paper, we present the FUBImethod, a method based on six stages to co-design interactive experiences based on Full-Body Interaction. The FUBImethod aims specifically to engage children in co-design processes and to ...
  • Herold, Gottfried; Hesse, Julia; Hofheinz, Dennis; Ràfols, Carla; Rupp, Andy (Springer, 2014)
    At Eurocrypt 2010, Freeman presented a framework to convert cryptosystems based on composite-order groups into ones that use prime-order groups. Such a transformation is interesting not only from a conceptual point of ...
  • Escala, Alex; Herranz, Javier; Libert, Benoît; Ràfols, Carla (Springer, 2014)
    Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications. The notion has been recently extended to the ...
  • Ràfols, Carla (Springer, 2015)
    Groth, Ostrovsky and Sahai constructed a non-interactive Zap for NP-languages by observing that the common reference string of their proof system for circuit satisfiability admits what they call correlated key generation. ...
  • González, Alonso; Hevia, Alejandro; Ràfols, Carla (Springer, 2015)
    A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces of ^Gm, where ^G is a group equipped with a bilinear map e : G x H --> T. Although applicable ...

View more