Follow
Javier Herranz
Title
Cited by
Cited by
Year
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C Ràfols
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
3442010
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
2482012
Forking lemmas for ring signature schemes
J Herranz, G Sáez
International Conference on Cryptology in India, 266-279, 2003
2352003
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Rafols
Cryptographers’ Track at the RSA Conference, 51-67, 2012
1772012
Additively Homomorphic Encryption with d-Operand Multiplications
CA Melchor, P Gaborit, J Herranz
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1562010
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
1532006
New identity-based ring signature schemes
J Herranz, G Sáez
International Conference on Information and Communications Security, 27-39, 2004
1322004
Revocable attribute-based signatures with adaptive security in the standard model
A Escala, J Herranz, P Morillo
Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on …, 2011
1312011
Deterministic identity-based signatures for partial aggregation
J Herranz
The Computer Journal 49 (3), 322-330, 2006
1052006
Rethinking rank swapping to decrease disclosure risk
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 64 (1), 346-364, 2008
1002008
Identity-based ring signatures from RSA
J Herranz
Theoretical Computer Science 389 (1-2), 100-117, 2007
702007
On the disclosure risk of multivariate microaggregation
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 67 (3), 399-412, 2008
672008
New results on multipartite access structures
J Herranz, G Sáez
IEE Proceedings-Information Security 153 (4), 153-162, 2006
592006
New results and applications for multi-secret sharing schemes
J Herranz, A Ruiz, G Sáez
Designs, codes and cryptography 73, 841-864, 2014
542014
Cryptographic techniques for mobile ad-hoc networks
V Daza, J Herranz, P Morillo, C Rafols
Computer Networks 51 (18), 4938-4950, 2007
512007
KEM/DEM: Necessary and sufficient conditions for secure hybrid encryption
J Herranz, D Hofheinz, E Kiltz
Manuscript in preparation, 2006
462006
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
442007
Identity-based encryption with master key-dependent message security and leakage-resilience
D Galindo, J Herranz, J Villar
European Symposium on Research in Computer Security, 627-642, 2012
432012
Classifying data from protected statistical datasets
J Herranz, S Matwin, J Nin, V Torra
Computers & Security 29 (8), 875-890, 2010
432010
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
J Herranz, G Sáez
International Conference on Financial Cryptography, 286-302, 2003
432003
The system can't perform the operation now. Try again later.
Articles 1–20