Javier Herranz
TitleCited byYear
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C RÓfols
International Workshop on Public Key Cryptography, 19-34, 2010
2352010
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
1682012
Forking lemmas for ring signature schemes
J Herranz, G Sßez
International Conference on Cryptology in India, 266-279, 2003
1572003
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C RÓfols
Cryptographers’ Track at the RSA Conference, 51-67, 2012
1202012
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
International Conference on the Theory and Application of Cryptology andá…, 2006
1192006
Additively Homomorphic Encryption with d-Operand Multiplications
CA Melchor, P Gaborit, J Herranz
Annual Cryptology Conference, 138-154, 2010
1162010
New identity-based ring signature schemes
J Herranz, G Sßez
International Conference on Information and Communications Security, 27-39, 2004
1022004
Revocable attribute-based signatures with adaptive security in the standard model
A Escala, J Herranz, P Morillo
International Conference on Cryptology in Africa, 224-241, 2011
962011
Deterministic identity-based signatures for partial aggregation
J Herranz
The Computer Journal 49 (3), 322-330, 2005
872005
Rethinking rank swapping to decrease disclosure risk
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 64 (1), 346-364, 2008
792008
On the disclosure risk of multivariate microaggregation
J Nin, J Herranz, V Torra
Data & Knowledge Engineering 67 (3), 399-412, 2008
582008
Identity-based ring signatures from RSA
J Herranz
Theoretical Computer Science 389 (1-2), 100-117, 2007
562007
New results on multipartite access structures
J Herranz, G Sßez
IEE Proceedings-Information Security 153 (4), 153-162, 2006
412006
Identity-based encryption with master key-dependent message security and leakage-resilience
D Galindo, J Herranz, J Villar
European Symposium on Research in Computer Security, 627-642, 2012
372012
New results and applications for multi-secret sharing schemes
J Herranz, A Ruiz, G Sßez
Designs, codes and cryptography 73 (3), 841-864, 2014
362014
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
342007
Cryptographic techniques for mobile ad-hoc networks
V Daza, J Herranz, P Morillo, C Rafols
Computer Networks 51 (18), 4938-4950, 2007
312007
Blind ring signatures secure under the chosen-target-CDH assumption
J Herranz, F Laguillaumie
International Conference on Information Security, 117-130, 2006
312006
Classifying data from protected statistical datasets
J Herranz, S Matwin, J Nin, V Torra
computers & security 29 (8), 875-890, 2010
302010
Revisiting fully distributed proxy signature schemes
J Herranz, G Sßez
International Conference on Cryptology in India, 356-370, 2004
302004
The system can't perform the operation now. Try again later.
Articles 1–20