Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Carla Ràfols
@article{DBLP:journals/ijisec/AmineBPR24, author = {Oussama Amine and Karim Baghery and Zaira Pindado and Carla R{\`{a}}fols}, title = {Simulation extractable versions of Groth's zk-SNARK revisited}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {431--445}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00750-7}, doi = {10.1007/S10207-023-00750-7}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AmineBPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithGRS23, author = {Steven D. Galbraith and Rosario Gennaro and Carla R{\`{a}}fols and Ron Steinfeld}, title = {Guest editorial: Special issue on Mathematics of Zero-Knowledge}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3331--3332}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01260-2}, doi = {10.1007/S10623-023-01260-2}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithGRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/RafolsZ23, author = {Carla R{\`{a}}fols and Alexandros Zacharakis}, editor = {Abdelrahaman Aly and Mehdi Tibouchi}, title = {Folding Schemes with Selective Verification}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference on Cryptology and Information Security in Latin America, {LATINCRYPT} 2023, Quito, Ecuador, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14168}, pages = {229--248}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44469-2\_12}, doi = {10.1007/978-3-031-44469-2\_12}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/RafolsZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BagheryGPR22, author = {Karim Baghery and Alonso Gonz{\'{a}}lez and Zaira Pindado and Carla R{\`{a}}fols}, title = {Signatures of knowledge for Boolean circuits under standard assumptions}, journal = {Theor. Comput. Sci.}, volume = {916}, pages = {86--110}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2022.03.006}, doi = {10.1016/J.TCS.2022.03.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BagheryGPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CampanelliNRZZ22, author = {Matteo Campanelli and Anca Nitulescu and Carla R{\`{a}}fols and Alexandros Zacharakis and Arantxa Zapico}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Linear-Map Vector Commitments and Their Practical Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {189--219}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_7}, doi = {10.1007/978-3-031-22972-5\_7}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CampanelliNRZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CampanelliNRZZ22, author = {Matteo Campanelli and Anca Nitulescu and Carla R{\`{a}}fols and Alexandros Zacharakis and Arantxa Zapico}, title = {Linear-map Vector Commitments and their Practical Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2022}, url = {https://eprint.iacr.org/2022/705}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CampanelliNRZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZapicoGKMR22, author = {Arantxa Zapico and Ariel Gabizon and Dmitry Khovratovich and Mary Maller and Carla R{\`{a}}fols}, title = {Baloo: Nearly Optimal Lookup Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1565}, year = {2022}, url = {https://eprint.iacr.org/2022/1565}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZapicoGKMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RafolsZ22, author = {Carla R{\`{a}}fols and Alexandros Zacharakis}, title = {Folding Schemes with Selective Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1576}, year = {2022}, url = {https://eprint.iacr.org/2022/1576}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RafolsZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RafolsZ21, author = {Carla R{\`{a}}fols and Arantxa Zapico}, editor = {Tal Malkin and Chris Peikert}, title = {An Algebraic Framework for Universal and Updatable SNARKs}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {774--804}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_27}, doi = {10.1007/978-3-030-84242-0\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RafolsZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/latincrypt/2021, editor = {Patrick Longa and Carla R{\`{a}}fols}, title = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogot{\'{a}}, Colombia, October 6-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12912}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88238-9}, doi = {10.1007/978-3-030-88238-9}, isbn = {978-3-030-88237-2}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RafolsZ21, author = {Carla R{\`{a}}fols and Arantxa Zapico}, title = {An Algebraic Framework for Universal and Updatable SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {590}, year = {2021}, url = {https://eprint.iacr.org/2021/590}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RafolsZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Rafols020, author = {Carla R{\`{a}}fols and Javier Silva}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {{QA-NIZK} Arguments of Same Opening for Bilateral Commitments}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_1}, doi = {10.1007/978-3-030-51938-4\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Rafols020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BagheryGPR20, author = {Karim Baghery and Alonso Gonz{\'{a}}lez and Zaira Pindado and Carla R{\`{a}}fols}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {Signatures of Knowledge for Boolean Circuits Under Standard Assumptions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {24--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_2}, doi = {10.1007/978-3-030-51938-4\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BagheryGPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BagheryPR20, author = {Karim Baghery and Zaira Pindado and Carla R{\`{a}}fols}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Simulation Extractable Versions of Groth's zk-SNARK Revisited}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {453--461}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_22}, doi = {10.1007/978-3-030-65411-5\_22}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/BagheryPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DazaRZ20, author = {Vanesa Daza and Carla R{\`{a}}fols and Alexandros Zacharakis}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Updateable Inner Product Argument with Logarithmic Verifier and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {527--557}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_18}, doi = {10.1007/978-3-030-45374-9\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DazaRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RafolsS20, author = {Carla R{\`{a}}fols and Javier Silva}, title = {{QA-NIZK} Arguments of Same Opening for Bilateral Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2020}, url = {https://eprint.iacr.org/2020/569}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RafolsS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheryGPR20a, author = {Karim Baghery and Alonso Gonz{\'{a}}lez and Zaira Pindado and Carla R{\`{a}}fols}, title = {Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2020}, url = {https://eprint.iacr.org/2020/1189}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BagheryGPR20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheryPR20, author = {Karim Baghery and Zaira Pindado and Carla R{\`{a}}fols}, title = {Simulation Extractable Versions of Groth's zk-SNARK Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1306}, year = {2020}, url = {https://eprint.iacr.org/2020/1306}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BagheryPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaRZ20, author = {Vanesa Daza and Carla R{\`{a}}fols and Alexandros Zacharakis}, title = {Updateable Inner Product Argument with Logarithmic Verifier and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1333}, year = {2020}, url = {https://eprint.iacr.org/2020/1333}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DazaRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/KhaliliDR19, author = {Mojtaba Khalili and Mohammad Dakhilalian and Carla R{\`{a}}fols}, title = {Short tightly secure signatures for signing a vector of group elements: {A} new approach}, journal = {Theor. Comput. Sci.}, volume = {795}, pages = {225--239}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2019.07.001}, doi = {10.1016/J.TCS.2019.07.001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/KhaliliDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FaonioFHR19, author = {Antonio Faonio and Dario Fiore and Javier Herranz and Carla R{\`{a}}fols}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {159--190}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_6}, doi = {10.1007/978-3-030-34618-8\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FaonioFHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GonzalezR19, author = {Alonso Gonz{\'{a}}lez and Carla R{\`{a}}fols}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Shorter Pairing-Based Arguments Under Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {728--757}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_25}, doi = {10.1007/978-3-030-34618-8\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GonzalezR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DazaGPRS19, author = {Vanesa Daza and Alonso Gonz{\'{a}}lez and Zaira Pindado and Carla R{\`{a}}fols and Javier Silva}, editor = {Dongdai Lin and Kazue Sako}, title = {Shorter Quadratic {QA-NIZK} Proofs}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {314--343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_11}, doi = {10.1007/978-3-030-17253-4\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DazaGPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaGPRS19, author = {Vanesa Daza and Alonso Gonz{\'{a}}lez and Zaira Pindado and Carla R{\`{a}}fols and Javier Silva}, title = {Shorter Quadratic {QA-NIZK} Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2019}, url = {https://eprint.iacr.org/2019/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaGPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GonzalezR19, author = {Alonso Gonz{\'{a}}lez and Carla R{\`{a}}fols}, title = {Sublinear Pairing-based Arguments with Updatable {CRS} and Weaker Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2019}, url = {https://eprint.iacr.org/2019/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GonzalezR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioFHR19, author = {Antonio Faonio and Dario Fiore and Javier Herranz and Carla R{\`{a}}fols}, title = {Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2019}, url = {https://eprint.iacr.org/2019/955}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaonioFHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Domingo-FerrerB18, author = {Josep Domingo{-}Ferrer and Alberto Blanco{-}Justicia and Carla R{\`{a}}fols}, title = {Dynamic group size accreditation and group discounts preserving anonymity}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {243--260}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0368-y}, doi = {10.1007/S10207-017-0368-Y}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Domingo-FerrerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/EscalaHKRV17, author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla R{\`{a}}fols and Jorge Luis Villar}, title = {An Algebraic Framework for Diffie-Hellman Assumptions}, journal = {J. Cryptol.}, volume = {30}, number = {1}, pages = {242--288}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9220-6}, doi = {10.1007/S00145-015-9220-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/EscalaHKRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeroldHKRR17, author = {Gottfried Herold and Max Hoffmann and Michael Kloo{\ss} and Carla R{\`{a}}fols and Andy Rupp}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1547--1564}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134068}, doi = {10.1145/3133956.3134068}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeroldHKRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herold0KRR17, author = {Gottfried Herold and Max Hoffmann and Michael Kloo{\ss} and Carla R{\`{a}}fols and Andy Rupp}, title = {New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {802}, year = {2017}, url = {http://eprint.iacr.org/2017/802}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herold0KRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GonzalezR16, author = {Alonso Gonz{\'{a}}lez and Carla R{\`{a}}fols}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {New Techniques for Non-interactive Shuffle and Range Arguments}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {427--444}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_23}, doi = {10.1007/978-3-319-39555-5\_23}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/GonzalezR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MorilloRV16, author = {Paz Morillo and Carla R{\`{a}}fols and Jorge Luis Villar}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {The Kernel Matrix Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {729--758}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_27}, doi = {10.1007/978-3-662-53887-6\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MorilloRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GonzalezHR15, author = {Alonso Gonz{\'{a}}lez and Alejandro Hevia and Carla R{\`{a}}fols}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {{QA-NIZK} Arguments in Asymmetric Groups: New Tools and New Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {605--629}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_25}, doi = {10.1007/978-3-662-48797-6\_25}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GonzalezHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Rafols15, author = {Carla R{\`{a}}fols}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Stretching Groth-Sahai: {NIZK} Proofs of Partial Satisfiability}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {247--276}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_10}, doi = {10.1007/978-3-662-46497-7\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Rafols15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rafols15, author = {Carla R{\`{a}}fols}, title = {Stretching Groth-Sahai: {NIZK} Proofs of Partial Satisfiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2015}, url = {http://eprint.iacr.org/2015/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rafols15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorilloRV15, author = {Paz Morillo and Carla R{\`{a}}fols and Jorge L. Villar}, title = {Matrix Computational Assumptions in Multilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2015}, url = {http://eprint.iacr.org/2015/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorilloRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GonzalezHR15, author = {Alonso Gonz{\'{a}}lez and Alejandro Hevia and Carla R{\`{a}}fols}, title = {{QA-NIZK} Arguments in Asymmetric Groups: New Tools and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2015}, url = {http://eprint.iacr.org/2015/910}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GonzalezHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HeroldHHRR14, author = {Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla R{\`{a}}fols and Andy Rupp}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order Transformations}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {261--279}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_15}, doi = {10.1007/978-3-662-44371-2\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HeroldHHRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/EscalaHLR14, author = {Alex Escala and Javier Herranz and Beno{\^{\i}}t Libert and Carla R{\`{a}}fols}, editor = {Hugo Krawczyk}, title = {Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {239--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_14}, doi = {10.1007/978-3-642-54631-0\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/EscalaHLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeroldHHRR14, author = {Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla R{\`{a}}fols and Andy Rupp}, title = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2014}, url = {http://eprint.iacr.org/2014/445}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeroldHHRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EscalaHKRV13, author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla R{\`{a}}fols and Jorge L. Villar}, editor = {Ran Canetti and Juan A. Garay}, title = {An Algebraic Framework for Diffie-Hellman Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {129--147}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_8}, doi = {10.1007/978-3-642-40084-1\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EscalaHKRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EscalaHKRV13, author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla R{\`{a}}fols and Jorge L. Villar}, title = {An Algebraic Framework for Diffie-Hellman Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2013}, url = {http://eprint.iacr.org/2013/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EscalaHKRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AttrapadungHLLPR12, author = {Nuttapong Attrapadung and Javier Herranz and Fabien Laguillaumie and Beno{\^{\i}}t Libert and Elie de Panafieu and Carla R{\`{a}}fols}, title = {Attribute-based encryption schemes with constant-size ciphertexts}, journal = {Theor. Comput. Sci.}, volume = {422}, pages = {15--38}, year = {2012}, url = {https://doi.org/10.1016/j.tcs.2011.12.004}, doi = {10.1016/J.TCS.2011.12.004}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AttrapadungHLLPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HerranzLLR12, author = {Javier Herranz and Fabien Laguillaumie and Beno{\^{\i}}t Libert and Carla R{\`{a}}fols}, editor = {Orr Dunkelman}, title = {Short Attribute-Based Signatures for Threshold Predicates}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {51--67}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_4}, doi = {10.1007/978-3-642-27954-6\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HerranzLLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-5856, author = {Alex Escala and Javier Herranz and Beno{\^{\i}}t Libert and Carla R{\`{a}}fols}, title = {Hierarchical Identity-Based Lossy Trapdoor Functions}, journal = {CoRR}, volume = {abs/1202.5856}, year = {2012}, url = {http://arxiv.org/abs/1202.5856}, eprinttype = {arXiv}, eprint = {1202.5856}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-5856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EscalaHLR12, author = {Alex Escala and Javier Herranz and Beno{\^{\i}}t Libert and Carla R{\`{a}}fols}, title = {Hierarchical Identity-Based (Lossy) Trapdoor Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2012}, url = {http://eprint.iacr.org/2012/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EscalaHLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HerranzLR11, author = {Javier Herranz and Fabien Laguillaumie and Carla R{\`{a}}fols}, title = {Relations between semantic security and anonymity in identity-based encryption}, journal = {Inf. Process. Lett.}, volume = {111}, number = {10}, pages = {453--460}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.02.002}, doi = {10.1016/J.IPL.2011.02.002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/HerranzLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/DazaHMR10, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Extensions of access structures and their cryptographic applications}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {21}, number = {4}, pages = {257--284}, year = {2010}, url = {https://doi.org/10.1007/s00200-010-0125-1}, doi = {10.1007/S00200-010-0125-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/DazaHMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HerranzLR10, author = {Javier Herranz and Fabien Laguillaumie and Carla R{\`{a}}fols}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Constant Size Ciphertexts in Threshold Attribute-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {19--34}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_2}, doi = {10.1007/978-3-642-13013-7\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HerranzLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MorilloR09, author = {Paz Morillo and Carla R{\`{a}}fols}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {The Security of All Bits Using List Decoding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {15--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_2}, doi = {10.1007/978-3-642-00468-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MorilloR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/GalindoMR08, author = {David Galindo and Paz Morillo and Carla R{\`{a}}fols}, title = {Improved certificate-based encryption in the standard model}, journal = {J. Syst. Softw.}, volume = {81}, number = {7}, pages = {1218--1226}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.09.009}, doi = {10.1016/J.JSS.2007.09.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/GalindoMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHMR08, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Extended Access Structures and Their Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2008}, url = {http://eprint.iacr.org/2008/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Cryptographic techniques for mobile ad-hoc networks}, journal = {Comput. Networks}, volume = {51}, number = {18}, pages = {4938--4950}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.08.002}, doi = {10.1016/J.COMNET.2007.08.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {35--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_3}, doi = {10.1007/978-3-540-75670-5\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DazaHMR08, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, editor = {Giovanni Di Crescenzo and Refik Molva}, title = {Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts}, booktitle = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {192}, number = {2}, pages = {3--15}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2008.05.002}, doi = {10.1016/J.ENTCS.2008.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/DazaHMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2007}, url = {http://eprint.iacr.org/2007/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GalindoMR06, author = {David Galindo and Paz Morillo and Carla R{\`{a}}fols}, editor = {Andrea S. Atzeni and Antonio Lioy}, title = {Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes}, booktitle = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4043}, pages = {81--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774716\_7}, doi = {10.1007/11774716\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/GalindoMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DazaMR07, author = {Vanesa Daza and Paz Morillo and Carla R{\`{a}}fols}, editor = {Giovanni Di Crescenzo and Luigi V. Mancini}, title = {On Dynamic Distribution of Private Keys over MANETs}, booktitle = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {1}, pages = {33--41}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.008}, doi = {10.1016/J.ENTCS.2006.11.008}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/DazaMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorilloR06, author = {Paz Morillo and Carla R{\`{a}}fols}, title = {Certificate-Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2006}, url = {http://eprint.iacr.org/2006/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorilloR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.