Javier Herranz
Cited by
Cited by
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C RÓfols
International Workshop on Public Key Cryptography, 19-34, 2010
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
Forking lemmas for ring signature schemes
J Herranz, G Sßez
International Conference on Cryptology in India, 266-279, 2003
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Rafols
Cryptographers’ Track at the RSA Conference, 51-67, 2012
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
International Conference on the Theory and Application of Cryptology andá…, 2006
Additively Homomorphic Encryption with d-Operand Multiplications
CA Melchor, P Gaborit, J Herranz
Annual Cryptology Conference, 138-154, 2010
New identity-based ring signature schemes
J Herranz, G Sßez
International Conference on Information and Communications Security, 27-39, 2004
Revocable attribute-based signatures with adaptive security in the standard model
A Escala, J Herranz, P Morillo
International conference on cryptology in Africa, 224-241, 2011
Deterministic identity-based signatures for partial aggregation
J Herranz
The Computer Journal 49 (3), 322-330, 2006
Rethinking rank swapping to decrease disclosure risk
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 64 (1), 346-364, 2008
On the disclosure risk of multivariate microaggregation
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 67 (3), 399-412, 2008
Identity-based ring signatures from RSA
J Herranz
Theoretical Computer Science 389 (1-2), 100-117, 2007
New results on multipartite access structures
J Herranz, G Sßez
IEE Proceedings-Information Security 153 (4), 153-162, 2006
New results and applications for multi-secret sharing schemes
J Herranz, A Ruiz, G Sßez
Designs, codes and cryptography 73 (3), 841-864, 2014
Cryptographic techniques for mobile ad-hoc networks
V Daza, J Herranz, P Morillo, C RÓfols
Computer Networks 51 (18), 4938-4950, 2007
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
Identity-based encryption with master key-dependent message security and leakage-resilience
D Galindo, J Herranz, J Villar
European Symposium on Research in Computer Security, 627-642, 2012
Blind ring signatures secure under the chosen-target-CDH assumption
J Herranz, F Laguillaumie
International Conference on Information Security, 117-130, 2006
Classifying data from protected statistical datasets
J Herranz, S Matwin, J Nin, V Torra
Computers & Security 29 (8), 875-890, 2010
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
J Herranz, G Sßez
International Conference on Financial Cryptography, 286-302, 2003
The system can't perform the operation now. Try again later.
Articles 1–20