Folgen
Carla Ràfols
Carla Ràfols
Bestätigte E-Mail-Adresse bei upf.edu
Titel
Zitiert von
Zitiert von
Jahr
An algebraic framework for Diffie-Hellman assumptions
A Escala, G Herold, E Kiltz, C Rafols, J Villar
Advances in Cryptology–CRYPTO 2013, 129-147, 2013
431*2013
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C Ràfols
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
3472010
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
2492012
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Rafols
Cryptographers’ Track at the RSA Conference, 51-67, 2012
1782012
Improved certificate-based encryption in the standard model
D Galindo, P Morillo, C Ràfols
Journal of Systems and Software 81 (7), 1218-1226, 2008
742008
The kernel matrix Diffie-Hellman assumption
P Morillo, C Ràfols, JL Villar
International Conference on the Theory and Application of Cryptology and …, 2016
692016
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
D Galindo, P Morillo, C Ràfols
Public Key Infrastructure: Third European PKI Workshop: Theory and Practice …, 2006
692006
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
442007
Updateable inner product argument with logarithmic verifier and applications
V Daza, C Ràfols, A Zacharakis
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
382020
QA-NIZK arguments in asymmetric groups: new tools and new constructions
A González, A Hevia, C Ràfols
International Conference on the Theory and Application of Cryptology and …, 2015
382015
Polynomial spaces: A new framework for composite-to-prime-order transformations
G Herold, J Hesse, D Hofheinz, C Rafols, A Rupp
CRYPTO 1, 261-279, 2014
382014
Stretching Groth-Sahai: NIZK proofs of partial satisfiability
C Ràfols
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
372015
Extensions of access structures and their cryptographic applications
V Daza, J Herranz, P Morillo, C Ràfols
Applicable Algebra in Engineering, Communication and Computing 21 (4), 257-284, 2010
362010
An algebraic framework for universal and updatable SNARKs
C Ràfols, A Zapico
Annual International Cryptology Conference, 774-804, 2021
342021
Simulation extractable versions of Groth’s zk-SNARK revisited
K Baghery, Z Pindado, C Ràfols
International Conference on Cryptology and Network Security, 453-461, 2020
332020
Baloo: nearly optimal lookup arguments
A Zapico, A Gabizon, D Khovratovich, M Maller, C Rafols
Cryptology ePrint Archive, 2022
302022
New techniques for non-interactive shuffle and range arguments
A González, C Ràfols
International Conference on Applied Cryptography and Network Security, 427-444, 2016
282016
Shorter quadratic QA-NIZK proofs
V Daza, A González, Z Pindado, C Ràfols, J Silva
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
272019
Matrix computational assumptions in multilinear groups
P Morillo, C Ràfols, JL Villar
Cryptology ePrint Archive, 2015
232015
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications
A Faonio, D Fiore, J Herranz, C Ràfols
International Conference on the Theory and Application of Cryptology and …, 2019
222019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20