WebPage of Javier Herranz

Main Papers Contact  
Publications

You can also check my DBLP entry and my Google Scholar entry.

For each publication in the list, I attach at the beginning either [J] (for journal) or [C] (for conference). At the end, I include a link to the electronic version of the paper (when available), through the corresponding publisher site.


2017

[J] J. Herranz. Attribute-based encryption implies identity-based encryption. IET Information Security, Volume 11, Issue 6, pp. 332-337, 2017. [link]
[J] F. Benhamouda, J. Herranz, M. Joye and B. Libert. Efficient cryptosystems from 2k-th power residue symbols. Journal of Cryptology, Volume 30, Issue 2, pp. 519-549, 2017. [link]

2016

[J] M. Fueyo and J. Herranz. On the efficiency of revocation in RSA-based anonymous systems. IEEE Transactions on Information Forensics & Security, Volume 11, Issue 8, pp. 1771-1779, 2016. [link]
[J] J. Herranz. Attribute-based versions of Schnorr and ElGamal. Applicable Algebra in Engineering, Communication and Computing, Volume 27, Issue 1, pp. 17-57, 2016. [link]
[C] A. Escala, S. Guasch, J. Herranz and P. Morillo. Universal cast-as-intended verifiability. Proceedings of VOTING'16, Lecture Notes in Computer Science, Vol. 9604, pp. 233-250, 2016. [link]

2015

[J] J. Herranz, J. Nin, P. Rodríguez and T. Tassa. Revisiting distance-based record linkage for privacy-preserving release of statistical datasets. Data & Knowledge Engineering, Volume 100, Part A, pp. 78-93, 2015. [link]

2014

[J] J. Herranz and J. Nin. Secure and efficient anonymization of distributed confidential databasets. International Journal of Information Security, Volume 13, Issue 6, pp. 497-512, 2014. [link]
[J] J. Herranz, A. Ruiz and G. Sáez. New results and applications for multi-secret sharing schemes. Designs, Codes and Cryptography, Volume 73, Issue 3, pp. 841-864, 2014. [link]
[J] J. Herranz. Attribute-based signatures from RSA. Theoretical Computer Science, Volume 527, pp. 73-82, 2014. [link]
[J] J. Herranz, A. Ruiz and G. Sáez. Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, Volume 70, Issue 3, pp. 323-345, 2014. [link]
[C] A. Escala, J. Herranz, B. Libert and C. Ràfols. Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications. Proceedings of PKC'14, Lecture Notes in Computer Science, Vol. 8383, pp. 239-256, 2014. [link]

2013

[J] J. Herranz, A. Ruiz and G. Sáez. Sharing many secrets with computational provable security. Information Processing Letters, Volume 113, Issues 14-16, pp. 572-579, 2013. [link]

2012

[J] J. Herranz, J. Nin and M. Solé. More hybrid and secure protection of statistical datasets. IEEE Transactions on Dependable and Secure Computing, Volume 9, Issue 5, pp. 727-740, 2012. [link]
[J] J. Herranz, J. Nin and M. Solé. Kd-trees and the real disclosure risks of large statistical databases. Information Fusion, Volume 13, Issue 4, pp. 260-273, 2012. [link]
[J] N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. De Panafieu, C. Ràfols. Attribute-based encryption schemes with constant-size ciphertexts. Theoretical Computer Science, Volume 422, pp. 15-38, 2012. [link]
[C] D. Galindo, J. Herranz and J. Villar. Identity-based encryption with master key-dependent message security and leakage-resilience. Proceedings of ESORICS'12, Lecture Notes in Computer Science, Vol. 7459, pp. 627-642, 2012. [link]
[C] J. Herranz, F. Laguillaumie, B. Libert and C. Ràfols. Short attribute-based signatures for threshold predicates. Proceedings of CT-RSA'12, Lecture Notes in Computer Science, Vol. 7178, pp. 51-67, 2012. [link]

2011

[J] J. Herranz. Restricted adaptive oblivious transfer. Theoretical Computer Science, Volume 412, Issue 46, pp. 6498-6506, 2011. [link]
[J] J. Herranz, J. Nin and M. Solé. Optimal Symbol Alignment distance: a new distance for sequences of symbols. IEEE Transactions on Knowledge and Data Engineering, Volume 23, Issue 10, pp. 1541-1554, 2011. [link]
[J] J. Herranz. Any 2-asummable bipartite function is weighted threshold. Discrete Applied Mathematics, Volume 159, Issue 11, pp. 1079-1084, 2011. [link]
[J] J. Herranz, F. Laguillaumie and C. Ràfols. Relations between semantic security and anonymity in identity based encryption. Information Processing Letters, Volume 11, Issue 10, pp. 453-460, 2011. [link]
[C] A. Escala, J. Herranz and P. Morillo. Revocable attribute-based signatures with adaptive security in the standard model. Proceedings of Africacrypt'11, Lecture Notes in Computer Science, Vol. 6737, pp. 224-241, 2011. [link]

2010

[J] J. Herranz, S. Matwin, J. Nin and V. Torra. Classifying data from protected statistical datasets. Computers & Security, Volume 29, Issue 8, pp. 875-890, 2010. [link]

[J] G. Di Crescenzo, J. Herranz and G. Sáez. On server trust in private proxy auctions. Electronic Commerce Research Journal, special issue on 'Trust and Privacy Aspects of Electronic Commerce', Volume 10, Issue 3-4, pp. 291-311, 2010. [link]

[J] D. Galindo, J. Herranz and E. Kiltz. On the generic construction of identity-based signatures with additional properties. Advances in Mathematics of Communications, Volume 4, Issue 4, pp. 453-483, 2010. [This is the extended version of the paper at Asiacrypt'06.] [link]

[J] J. Herranz, D. Hofheinz and E. Kiltz. Some (in)sufficient conditions for secure hybrid encryption. Information and Computation, Volume 208, Issue 11, pp. 1243-1257, 2010. [link]

[J] V. Daza, J. Herranz, P. Morillo and C. Ràfols. Extensions of access structures and their cryptographic applications. Applicable Algebra in Engineering, Communication and Computing, Volume 21, Issue 4, pp. 257-284, 2010. [link]

[C] C. Aguilar, P. Gaborit and J. Herranz. Additively homomorphic encryption with $d$-operand multiplications. Proceedings of CRYPTO'10, Lecture Notes in Computer Science, Vol. 6223, pp. 138-154, 2010. [link]

[C] J. Herranz, A. Ruiz and G. Sáez. Fully secure threshold unsigncryption. Proceedings of ProvSec'10, Lecture Notes in Computer Science, Vol. 6402, pp. 261-278, 2010. [link]

[C] J. Herranz, F. Laguillaumie and C. Ràfols. Constant size ciphertexts in threshold attribute-based encryption. Proceedings of PKC'10, Lecture Notes in Computer Science, Vol. 6056, pp. 19-34, 2010. [link]

[C] J. Nin, J. Herranz and V. Torra. Using classification methods to evaluate attribute disclosure risk. Proceedings of MDAI'10, Lecture Notes in Computer Science, Vol. 6408, pp. 277-286, 2010. [link]


2009

[J] J. Herranz. Ideal homogeneous access structures constructed from graphs. Journal of Universal Computer Science, Volume 15, Issue 14, pp. 2881-2893, 2009. [link]

[J] I. Jiménez Calvo, J. Herranz and G. Sáez. A new algorithm to search for small nonzero $|x^3-y^2|$ values. Mathematics of Computation, Volume 78, Issue 268, pp. 2435-2444, 2009. [link]

[J] S.G. Choi, J. Herranz, D. Hofheinz, J.Y. Hwang, E. Kiltz, D.H. Lee and M. Yung. The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Information Processing Letters, Volume 109, Issue 16, pp. 897-901, 2009. [link]

[J] J. Herranz. On the transferability of private signatures. Information Sciences, Volume 179, Issue 11, pp. 1647-1656, 2009. [link]

[J] V. Daza, J. Herranz and G. Sáez. Flaws in some self-healing key distribution schemes with revocation. Information Processing Letters, Volume 109, Issue 11, pp. 523-526, 2009. [link]

[C] J. Herranz and J. Nin. Partial symbol ordering distance. Proceedings of MDAI'09, Lecture Notes in Computer Science, Vol. 5861, pp. 293-302, 2009. [link]

[C] J. Herranz, J. Nin and V. Torra. Distributed privacy-preserving methods for statistical disclosure control. Proceedings of DPM'09 (satellite workshop of ESORICS), Lecture Notes in Computer Science, Vol. 5939, pp. 33-47, 2010. [link]


2008

[J] J. Nin, J. Herranz and V. Torra. On the disclosure risk of multivariate microaggregation. Data & Knowledge Engineering, Volume 67, Issue 3, pp. 399-412, 2008. [link]

[J] D. Galindo and J. Herranz. On the security of public key cryptosystems with a double decryption mechanism. Information Processing Letters, Volume 108, Issue 5, pp. 279-283, 2008. [link]

[J] V. Daza, J. Herranz and G. Sáez. On the computational security of a distributed key distribution scheme. IEEE Transactions on Computers, Volume 57, Issue 8, pp. 1087-1097, 2008. [link]

[J] V. Daza, J. Herranz, P. Morillo and C. Ràfols. Ad-hoc threshold broadcast encryption with shorter ciphertexts. Electronic Notes in Theoretical Computer Science, Volume 192, Issue 2, pp. 3-15, 2008. [link]

[J] J. Nin, J. Herranz and V. Torra. How to group attributes in multivariate microaggregation. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), Volume 16, Issue 1 (suppl.), pp. 121-138, 2008. [link]

[J] J. Nin, J. Herranz and V. Torra. Rethinking rank swapping to decrease disclosure risk. Data & Knowledge Engineering, Volume 64, Issue 1, pp. 346-364, 2008. [link]

[C] J. Nin, J. Herranz and V. Torra. Towards a more realistic disclosure risk assessment. Proceedings of PSD'08, Lecture Notes in Computer Science, Vol. 5262, pp. 152-165, 2008. [link]

[C] J. Nin, J. Herranz and V. Torra. Attribute selection in multivariate microaggregation. Proceedings of PAIS'08 (satellite workshop of EDBT'08), ACM Proceedings Series, Vol. 331, pp. 51-60, 2008. [link]


2007

[J] V. Daza, J. Herranz, P. Morillo and C. Ràfols. Cryptographic techniques for mobile ad-hoc networks. Computer Networks, Volume 51, Issue 18, pp. 4938-4950, 2007. [link]

[J] J. Herranz. Identity-based ring signatures from RSA. Theoretical Computer Science, Volume 389, Issues 1-2, pp. 100-117, 2007. [link]

[J] R. Bhaskar, J. Herranz and F. Laguillaumie. Aggregate designated verifier signatures and application to secure routing. International Journal of Security and Networks, Volume 2, Numbers 3/4, pp. 192-201, 2007. [link]

[C] V. Daza, J. Herranz, P. Morillo and C. Ràfols. CCA2-secure threshold broadcast encryption with shorter ciphertexts. Proceedings of ProvSec'07, Lecture Notes in Computer Science, Vol. 4784, pp. 35-50, 2007. [link]


2006

[J] J. Herranz and G. Sáez. New results on multipartite access structures. IET Proceedings of Information Security, Volume 153, Number 4, pp. 153-162, 2006. [link]

[J] J. Herranz and G. Sáez. Distributed ring signatures from general dual access structures. Designs, Codes and Cryptography, Volume 40, Number 1, pp. 103-120, 2006. [link]

[J] J. Herranz. Deterministic identity-based signatures for partial aggregation. The Computer Journal, Volume 49, Number 3, pp. 322-330, 2006. [link]

[C] D. Galindo and J. Herranz. A generic construction for token-controlled public key encryption. Proceedings of Financial Cryptography'06, Lecture Notes in Computer Science, Vol. 4107, pp. 177-190, 2006. [link]

[C] D. Galindo, J. Herranz and E. Kiltz. On the generic construction of identity-based signatures with additional properties. Proceedings of Asiacrypt'06, Lecture Notes in Computer Science, Vol. 4284, pp. 178-193, 2006. [link]

[C] J. Herranz and F. Laguillaumie. Blind ring signatures secure under the chosen target CDH Assumption. Proceedings of ISC'06, Lecture Notes in Computer Science, Vol. 4176, pp. 117-130, 2006. [link]

[C] R. Bhaskar, J. Herranz and F. Laguillaumie. Efficient authentication for reactive routing protocols. Proceedings of SNDS'06 (workshop of AINA 2006), IEEE Computer Society, Vol. II, pp. 57-61, 2006. [link]


2005

J. Herranz. Some digital signature schemes with collective signers. PhD. thesis, Universitat Politècnica de Catalunya, Barcelona. April, 2005. [link]


2004

[J] V. Daza, J. Herranz and G. Sáez. Protocols useful on the Internet from distributed signature schemes. International Journal of Information Security, Volume 3, Issue 2, pp. 61-69, 2004. [link]

[C] J. Herranz and G. Sáez. Ring signatures for ad-hoc general access structures. Proceedings of ESAS'04, Lecture Notes in Computer Science, Vol. 3313, pp. 54-65, 2005. [link]

[C] J. Herranz and G. Sáez. Revisiting fully distributed proxy signature schemes. Proceedings of Indocrypt'04, Lecture Notes in Computer Science, Vol. 3348, pp. 356-370, 2004. [link]

[C] J. Herranz and G. Sáez. New identity-based ring signature schemes. Proceedings of ICICS'04, Lecture Notes in Computer Science, Vol. 3269, pp. 27-39, 2004. [link]

[C] J. Herranz and J. Villar. An unbalanced protocol for group key exchange. Proceedings of TrustBus'04, Lecture Notes in Computer Science, Vol. 3184, pp. 172-180, 2004. [link]

[C] G. Di Crescenzo, J. Herranz and G. Sáez. Reducing server trust in private proxy auctions. Proceedings of TrustBus'04, Lecture Notes in Computer Science, Vol. 3184, pp. 80-89, 2004. [link]

[C] J. Herranz. A formal proof of security of Zhang and KimÂŽs ID-based ring signature scheme. Proceedings of WOSIS'04, INSTICC Press, pp. 63-72, 2004.


2003

[C] J. Herranz and G. Sáez. Forking lemmas for ring signature schemes. Proceedings of Indocrypt'03, Lecture Notes in Computer Science, Vol. 2904, pp. 266-279, 2003. [link]

[C] J. Herranz, C. Padró and G. Sáez. Distributed RSA signature schemes for general access structures. Proceedings of ISC'03, Lecture Notes in Computer Science, Vol. 2851, pp. 123-137, 2003. [link]

[C] V. Daza, J. Herranz and G. Sáez. Some protocols useful on the Internet from threshold signature schemes. Proceedings of TrustBus'03 (DEXA workshop), 2003. [link]

[C] V. Daza, J. Herranz and G. Sáez. Constructing general dynamic group key distribution schemes with decentralized user join. Proceedings of ACISP 2003, Lecture Notes in Computer Science, Vol. 2727, pp. 464-475, 2003. [link]

[C] J. Herranz and G. Sáez. Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures. Proceedings of Financial Cryptography'03, Lecture Notes in Computer Science, Vol. 2742, pp. 286-302, 2003. [link]


2002

[C] V. Daza, J. Herranz, C. Padró and G. Sáez. A distributed and computationally secure key distribution scheme. Proceedings of ISC'02, Lecture Notes in Computer Science, Vol. 2433, pp. 342-356, 2002. [link]
Top
Last Updated: April 18, 2011