
Publications

You can also
check my DBLP
entry and my Google Scholar
entry.
For each
publication in the list, I attach at the beginning either
[J] (for journal) or [C]
(for conference). At the end, I include a link to the
electronic version of the paper (when available), through
the corresponding publisher site.
2018
[C] J. Herranz and G. Sáez.
Secret sharing schemes for (k,n)consecutive access structures. Proceedings of CANS'2018, Lecture Notes in Computer Science, to appear, 2018.
[C] J. Aranda, J. Herranz and J. Nin.
Answering multiple aggregate queries under a specific privacy condition. Proceedings of COMPSAC'2018, IEEE Society Press, to appear, 2018.
2017
[J] J. Herranz.
Attributebased encryption implies identitybased encryption. IET Information Security, Volume 11, Issue 6, pp. 332337, 2017. [link]
[J] F. Benhamouda, J. Herranz, M. Joye and B. Libert.
Efficient cryptosystems from 2^{k}th power residue symbols. Journal of Cryptology, Volume 30, Issue 2, pp. 519549, 2017. [link]
2016
[J] M. Fueyo and J. Herranz.
On the efficiency of revocation in RSAbased anonymous systems. IEEE Transactions on Information Forensics & Security, Volume 11, Issue 8, pp. 17711779, 2016. [link]
[J] J. Herranz.
Attributebased versions of Schnorr and ElGamal. Applicable Algebra in Engineering,
Communication and Computing, Volume 27, Issue 1, pp. 1757, 2016. [link]
[C] A. Escala, S. Guasch, J.
Herranz and P. Morillo. Universal castasintended verifiability.
Proceedings of VOTING'16, Lecture Notes in Computer
Science, Vol. 9604, pp. 233250, 2016. [link]
2015
[J]
J. Herranz, J. Nin, P. Rodríguez and T. Tassa. Revisiting distancebased record linkage for privacypreserving release of statistical datasets. Data & Knowledge Engineering, Volume 100, Part A, pp. 7893, 2015. [link]
2014
[J]
J. Herranz and J. Nin. Secure and efficient anonymization of distributed confidential databasets. International Journal of Information Security, Volume 13, Issue 6, pp. 497512, 2014. [link]
[J]
J. Herranz, A. Ruiz and G. Sáez. New results and applications for multisecret sharing schemes. Designs, Codes and Cryptography, Volume 73, Issue 3, pp. 841864, 2014. [link]
[J]
J. Herranz. Attributebased signatures from RSA. Theoretical Computer Science, Volume 527, pp. 7382, 2014. [link]
[J]
J. Herranz, A. Ruiz and G. Sáez. Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, Volume 70, Issue 3, pp. 323345, 2014. [link]
[C] A. Escala, J.
Herranz, B. Libert and C. Ràfols. Identitybased lossy trapdoor functions: new definitions, hierarchical extensions, and implications.
Proceedings of PKC'14, Lecture Notes in Computer
Science, Vol. 8383, pp. 239256, 2014. [link]
2013
[J]
J. Herranz, A. Ruiz and G. Sáez. Sharing many secrets with computational provable security. Information Processing Letters, Volume 113, Issues 1416, pp. 572579, 2013. [link]
2012
[J]
J. Herranz, J. Nin and M. Solé. More hybrid and secure protection of statistical datasets. IEEE Transactions on Dependable and Secure Computing, Volume 9, Issue 5, pp. 727740, 2012. [link]
[J]
J. Herranz, J. Nin and M. Solé. Kdtrees
and the real disclosure risks of large statistical
databases. Information Fusion, Volume 13, Issue 4, pp. 260273, 2012. [link]
[J]
N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. De Panafieu, C. Ràfols. Attributebased encryption schemes with constantsize ciphertexts. Theoretical Computer Science, Volume 422, pp. 1538, 2012. [link]
[C]
D. Galindo, J. Herranz and J. Villar. Identitybased encryption with master keydependent message security and leakageresilience. Proceedings
of ESORICS'12,
Lecture Notes in Computer Science, Vol. 7459, pp. 627642, 2012. [link]
[C]
J. Herranz, F. Laguillaumie, B. Libert and C. Ràfols. Short
attributebased signatures for threshold predicates. Proceedings
of CTRSA'12,
Lecture Notes in Computer Science, Vol. 7178, pp. 5167, 2012. [link]
2011
[J] J.
Herranz. Restricted adaptive oblivious transfer.
Theoretical Computer Science, Volume 412, Issue 46, pp. 64986506, 2011. [link]
[J] J.
Herranz, J. Nin and M. Solé. Optimal Symbol
Alignment distance: a new distance for sequences of
symbols. IEEE Transactions on Knowledge and Data
Engineering, Volume 23, Issue 10, pp. 15411554, 2011. [link]
[J]
J. Herranz. Any 2asummable bipartite
function is weighted threshold. Discrete Applied
Mathematics, Volume 159, Issue 11, pp. 10791084, 2011. [link]
[J]
J. Herranz, F. Laguillaumie and C. Ràfols.
Relations between semantic security and anonymity in
identity based encryption. Information Processing
Letters, Volume 11, Issue 10, pp. 453460, 2011. [link]
[C]
A.
Escala, J. Herranz and P. Morillo. Revocable
attributebased signatures with adaptive security in the
standard model. Proceedings
of Africacrypt'11,
Lecture Notes in Computer Science, Vol. 6737, pp. 224241, 2011. [link]
2010
[J]
J. Herranz, S. Matwin, J. Nin and V. Torra.
Classifying data from protected statistical datasets.
Computers & Security, Volume 29, Issue 8, pp.
875890, 2010. [link]
[J] G. Di
Crescenzo, J. Herranz and G. Sáez. On server
trust in private proxy auctions. Electronic Commerce
Research Journal, special issue on 'Trust and Privacy
Aspects of Electronic Commerce', Volume 10, Issue 34, pp.
291311, 2010. [link]
[J] D.
Galindo, J. Herranz and E. Kiltz. On the generic
construction of identitybased signatures with additional
properties. Advances in Mathematics of Communications,
Volume 4, Issue 4, pp. 453483, 2010. [This is the
extended version of the paper at Asiacrypt'06.]
[link]
[J]
J. Herranz, D. Hofheinz and E. Kiltz.
Some (in)sufficient conditions for secure hybrid
encryption. Information and Computation, Volume
208, Issue 11, pp. 12431257, 2010. [link]
[J] V.
Daza, J. Herranz, P. Morillo and C. Ràfols.
Extensions of access structures and their cryptographic
applications. Applicable Algebra in Engineering,
Communication and Computing, Volume 21, Issue 4, pp.
257284, 2010. [link]
[C] C.
Aguilar, P. Gaborit and J. Herranz. Additively
homomorphic encryption with $d$operand multiplications.
Proceedings of CRYPTO'10, Lecture Notes in Computer
Science, Vol. 6223, pp. 138154, 2010. [link]
[C] J.
Herranz, A. Ruiz and G. Sáez. Fully secure
threshold unsigncryption. Proceedings of ProvSec'10,
Lecture Notes in Computer Science, Vol. 6402, pp. 261278,
2010. [link]
[C] J.
Herranz, F. Laguillaumie and C. Ràfols. Constant
size ciphertexts in threshold attributebased encryption.
Proceedings of PKC'10, Lecture Notes in Computer
Science, Vol. 6056, pp. 1934, 2010. [link]
[C] J.
Nin, J. Herranz and V. Torra. Using
classification methods to evaluate attribute disclosure
risk. Proceedings of MDAI'10, Lecture Notes in
Computer Science, Vol. 6408, pp. 277286, 2010. [link]
2009
[J]
J. Herranz. Ideal homogeneous access
structures constructed from graphs. Journal of
Universal Computer Science, Volume 15, Issue 14, pp.
28812893, 2009. [link]
[J] I.
Jiménez Calvo, J. Herranz and G. Sáez. A new
algorithm to search for small nonzero $x^3y^2$ values.
Mathematics of Computation, Volume 78, Issue 268,
pp. 24352444, 2009. [link]
[J] S.G.
Choi, J. Herranz, D. Hofheinz, J.Y. Hwang, E. Kiltz, D.H.
Lee and M. Yung. The KurosawaDesmedt key
encapsulation is not chosenciphertext secure. Information
Processing Letters, Volume 109, Issue 16, pp. 897901,
2009. [link]
[J] J.
Herranz. On the transferability of private
signatures. Information Sciences, Volume 179, Issue
11, pp. 16471656, 2009. [link]
[J] V.
Daza, J. Herranz and G. Sáez. Flaws in some
selfhealing key distribution schemes with revocation.
Information Processing Letters, Volume 109, Issue
11, pp. 523526, 2009. [link]
[C] J.
Herranz and J. Nin. Partial symbol ordering
distance. Proceedings of MDAI'09, Lecture Notes in
Computer Science, Vol. 5861, pp. 293302, 2009. [link]
[C] J.
Herranz, J. Nin and V. Torra. Distributed
privacypreserving methods for statistical disclosure
control. Proceedings of DPM'09 (satellite workshop
of ESORICS), Lecture Notes in Computer Science, Vol. 5939,
pp. 3347, 2010. [link]
2008
[J]
J. Nin, J. Herranz and V. Torra. On
the disclosure risk of multivariate microaggregation. Data
& Knowledge Engineering, Volume 67, Issue 3, pp.
399412, 2008. [link]
[J] D.
Galindo and J. Herranz. On the security of public
key cryptosystems with a double decryption mechanism.
Information Processing Letters, Volume 108, Issue
5, pp. 279283, 2008. [link]
[J] V.
Daza, J. Herranz and G. Sáez. On the
computational security of a distributed key distribution
scheme. IEEE Transactions on Computers, Volume 57,
Issue 8, pp. 10871097, 2008. [link]
[J] V.
Daza, J. Herranz, P. Morillo and C. Ràfols.
Adhoc threshold broadcast encryption with shorter
ciphertexts. Electronic Notes in Theoretical Computer
Science, Volume 192, Issue 2, pp. 315, 2008. [link]
[J] J.
Nin, J. Herranz and V. Torra. How to group
attributes in multivariate microaggregation. International
Journal of Uncertainty, Fuzziness and KnowledgeBased
Systems (IJUFKS), Volume 16, Issue 1 (suppl.), pp.
121138, 2008. [link]
[J] J.
Nin, J. Herranz and V. Torra. Rethinking rank
swapping to decrease disclosure risk. Data &
Knowledge Engineering, Volume 64, Issue 1, pp.
346364, 2008. [link]
[C] J.
Nin, J. Herranz and V. Torra. Towards a more
realistic disclosure risk assessment. Proceedings of
PSD'08, Lecture Notes in Computer Science, Vol. 5262,
pp. 152165, 2008. [link]
[C] J.
Nin, J. Herranz and V. Torra. Attribute selection
in multivariate microaggregation. Proceedings of
PAIS'08 (satellite workshop of EDBT'08), ACM
Proceedings Series, Vol. 331, pp. 5160, 2008. [link]
2007
[J]
V. Daza, J. Herranz, P. Morillo and C. Ràfols.
Cryptographic techniques for mobile adhoc networks.
Computer Networks, Volume 51, Issue 18, pp.
49384950, 2007. [link]
[J] J.
Herranz. Identitybased ring signatures from RSA.
Theoretical Computer Science, Volume 389, Issues
12, pp. 100117, 2007. [link]
[J] R.
Bhaskar, J. Herranz and F. Laguillaumie.
Aggregate designated verifier signatures and application
to secure routing. International Journal of Security
and Networks, Volume 2, Numbers 3/4, pp. 192201,
2007. [link]
[C] V.
Daza, J. Herranz, P. Morillo and C. Ràfols.
CCA2secure threshold broadcast encryption with shorter
ciphertexts. Proceedings of ProvSec'07, Lecture
Notes in Computer Science, Vol. 4784, pp. 3550, 2007.
[link]
2006
[J]
J. Herranz and G. Sáez. New results
on multipartite access structures. IET Proceedings of
Information Security, Volume 153, Number 4, pp.
153162, 2006. [link]
[J] J.
Herranz and G. Sáez. Distributed ring signatures
from general dual access structures. Designs, Codes and
Cryptography, Volume 40, Number 1, pp. 103120, 2006.
[link]
[J] J.
Herranz. Deterministic identitybased signatures
for partial aggregation. The Computer Journal,
Volume 49, Number 3, pp. 322330, 2006. [link]
[C] D.
Galindo and J. Herranz. A generic construction
for tokencontrolled public key encryption. Proceedings
of Financial Cryptography'06, Lecture Notes in
Computer Science, Vol. 4107, pp. 177190, 2006. [link]
[C] D.
Galindo, J. Herranz and E. Kiltz. On the generic
construction of identitybased signatures with additional
properties. Proceedings of Asiacrypt'06, Lecture
Notes in Computer Science, Vol. 4284, pp. 178193, 2006.
[link]
[C] J.
Herranz and F. Laguillaumie. Blind ring
signatures secure under the chosen target CDH Assumption.
Proceedings of ISC'06, Lecture Notes in Computer
Science, Vol. 4176, pp. 117130, 2006. [link]
[C] R.
Bhaskar, J. Herranz and F. Laguillaumie.
Efficient authentication for reactive routing protocols.
Proceedings of SNDS'06 (workshop of AINA 2006),
IEEE Computer Society, Vol. II, pp. 5761, 2006. [link]
2005
J.
Herranz. Some digital signature schemes with
collective signers. PhD. thesis, Universitat Politècnica
de Catalunya, Barcelona. April, 2005. [link]
2004
[J]
V. Daza, J. Herranz and G. Sáez.
Protocols useful on the Internet from distributed
signature schemes. International Journal of Information
Security, Volume 3, Issue 2, pp. 6169, 2004. [link]
[C] J.
Herranz and G. Sáez. Ring signatures for adhoc
general access structures. Proceedings of ESAS'04,
Lecture Notes in Computer Science, Vol. 3313, pp. 5465,
2005. [link]
[C] J.
Herranz and G. Sáez. Revisiting fully
distributed proxy signature schemes. Proceedings of
Indocrypt'04, Lecture Notes in Computer Science, Vol.
3348, pp. 356370, 2004. [link]
[C] J.
Herranz and G. Sáez. New identitybased ring
signature schemes. Proceedings of ICICS'04, Lecture
Notes in Computer Science, Vol. 3269, pp. 2739, 2004.
[link]
[C] J.
Herranz and J. Villar. An unbalanced protocol for
group key exchange. Proceedings of TrustBus'04,
Lecture Notes in Computer Science, Vol. 3184, pp. 172180,
2004. [link]
[C] G. Di
Crescenzo, J. Herranz and G. Sáez. Reducing
server trust in private proxy auctions. Proceedings of
TrustBus'04, Lecture Notes in Computer Science, Vol.
3184, pp. 8089, 2004. [link]
[C] J.
Herranz. A formal proof of security of Zhang and
KimÂŽs IDbased ring signature scheme. Proceedings of
WOSIS'04, INSTICC Press, pp. 6372, 2004.
2003
[C]
J. Herranz and G. Sáez. Forking
lemmas for ring signature schemes. Proceedings of
Indocrypt'03, Lecture Notes in Computer Science, Vol.
2904, pp. 266279, 2003. [link]
[C] J.
Herranz, C. Padró and G. Sáez. Distributed RSA
signature schemes for general access structures.
Proceedings of ISC'03, Lecture Notes in Computer
Science, Vol. 2851, pp. 123137, 2003. [link]
[C] V.
Daza, J. Herranz and G. Sáez. Some protocols
useful on the Internet from threshold signature schemes.
Proceedings of TrustBus'03 (DEXA workshop), 2003.
[link]
[C] V.
Daza, J. Herranz and G. Sáez. Constructing
general dynamic group key distribution schemes with
decentralized user join. Proceedings of ACISP 2003,
Lecture Notes in Computer Science, Vol. 2727, pp. 464475,
2003. [link]
[C] J.
Herranz and G. Sáez. Verifiable secret sharing
for general access structures, with application to fully
distributed proxy signatures. Proceedings of Financial
Cryptography'03, Lecture Notes in Computer Science,
Vol. 2742, pp. 286302, 2003. [link]
2002
[C]
V. Daza, J. Herranz, C. Padró and G. Sáez.
A distributed and computationally secure key distribution
scheme. Proceedings of ISC'02, Lecture Notes in
Computer Science, Vol. 2433, pp. 342356, 2002. [link]



Last Updated: April 18, 2011


