BibTeX records: Carla Ràfols

download as .bib file

@article{DBLP:journals/ijisec/AmineBPR24,
  author       = {Oussama Amine and
                  Karim Baghery and
                  Zaira Pindado and
                  Carla R{\`{a}}fols},
  title        = {Simulation extractable versions of Groth's zk-SNARK revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {431--445},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00750-7},
  doi          = {10.1007/S10207-023-00750-7},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AmineBPR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithGRS23,
  author       = {Steven D. Galbraith and
                  Rosario Gennaro and
                  Carla R{\`{a}}fols and
                  Ron Steinfeld},
  title        = {Guest editorial: Special issue on Mathematics of Zero-Knowledge},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3331--3332},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01260-2},
  doi          = {10.1007/S10623-023-01260-2},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithGRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/RafolsZ23,
  author       = {Carla R{\`{a}}fols and
                  Alexandros Zacharakis},
  editor       = {Abdelrahaman Aly and
                  Mehdi Tibouchi},
  title        = {Folding Schemes with Selective Verification},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference
                  on Cryptology and Information Security in Latin America, {LATINCRYPT}
                  2023, Quito, Ecuador, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14168},
  pages        = {229--248},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44469-2\_12},
  doi          = {10.1007/978-3-031-44469-2\_12},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/RafolsZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BagheryGPR22,
  author       = {Karim Baghery and
                  Alonso Gonz{\'{a}}lez and
                  Zaira Pindado and
                  Carla R{\`{a}}fols},
  title        = {Signatures of knowledge for Boolean circuits under standard assumptions},
  journal      = {Theor. Comput. Sci.},
  volume       = {916},
  pages        = {86--110},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2022.03.006},
  doi          = {10.1016/J.TCS.2022.03.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BagheryGPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CampanelliNRZZ22,
  author       = {Matteo Campanelli and
                  Anca Nitulescu and
                  Carla R{\`{a}}fols and
                  Alexandros Zacharakis and
                  Arantxa Zapico},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Linear-Map Vector Commitments and Their Practical Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {189--219},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_7},
  doi          = {10.1007/978-3-031-22972-5\_7},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CampanelliNRZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CampanelliNRZZ22,
  author       = {Matteo Campanelli and
                  Anca Nitulescu and
                  Carla R{\`{a}}fols and
                  Alexandros Zacharakis and
                  Arantxa Zapico},
  title        = {Linear-map Vector Commitments and their Practical Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/705},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CampanelliNRZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZapicoGKMR22,
  author       = {Arantxa Zapico and
                  Ariel Gabizon and
                  Dmitry Khovratovich and
                  Mary Maller and
                  Carla R{\`{a}}fols},
  title        = {Baloo: Nearly Optimal Lookup Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1565},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1565},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZapicoGKMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RafolsZ22,
  author       = {Carla R{\`{a}}fols and
                  Alexandros Zacharakis},
  title        = {Folding Schemes with Selective Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1576},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1576},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RafolsZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RafolsZ21,
  author       = {Carla R{\`{a}}fols and
                  Arantxa Zapico},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {An Algebraic Framework for Universal and Updatable SNARKs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {774--804},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_27},
  doi          = {10.1007/978-3-030-84242-0\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RafolsZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2021,
  editor       = {Patrick Longa and
                  Carla R{\`{a}}fols},
  title        = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference
                  on Cryptology and Information Security in Latin America, Bogot{\'{a}},
                  Colombia, October 6-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12912},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88238-9},
  doi          = {10.1007/978-3-030-88238-9},
  isbn         = {978-3-030-88237-2},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RafolsZ21,
  author       = {Carla R{\`{a}}fols and
                  Arantxa Zapico},
  title        = {An Algebraic Framework for Universal and Updatable SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {590},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/590},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RafolsZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Rafols020,
  author       = {Carla R{\`{a}}fols and
                  Javier Silva},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {{QA-NIZK} Arguments of Same Opening for Bilateral Commitments},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_1},
  doi          = {10.1007/978-3-030-51938-4\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Rafols020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BagheryGPR20,
  author       = {Karim Baghery and
                  Alonso Gonz{\'{a}}lez and
                  Zaira Pindado and
                  Carla R{\`{a}}fols},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {Signatures of Knowledge for Boolean Circuits Under Standard Assumptions},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_2},
  doi          = {10.1007/978-3-030-51938-4\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BagheryGPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BagheryPR20,
  author       = {Karim Baghery and
                  Zaira Pindado and
                  Carla R{\`{a}}fols},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Simulation Extractable Versions of Groth's zk-SNARK Revisited},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {453--461},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_22},
  doi          = {10.1007/978-3-030-65411-5\_22},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BagheryPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DazaRZ20,
  author       = {Vanesa Daza and
                  Carla R{\`{a}}fols and
                  Alexandros Zacharakis},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Updateable Inner Product Argument with Logarithmic Verifier and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {527--557},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_18},
  doi          = {10.1007/978-3-030-45374-9\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DazaRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RafolsS20,
  author       = {Carla R{\`{a}}fols and
                  Javier Silva},
  title        = {{QA-NIZK} Arguments of Same Opening for Bilateral Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/569},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RafolsS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheryGPR20a,
  author       = {Karim Baghery and
                  Alonso Gonz{\'{a}}lez and
                  Zaira Pindado and
                  Carla R{\`{a}}fols},
  title        = {Signatures of Knowledge for Boolean Circuits under Standard Assumptions
                  (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1189},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheryGPR20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheryPR20,
  author       = {Karim Baghery and
                  Zaira Pindado and
                  Carla R{\`{a}}fols},
  title        = {Simulation Extractable Versions of Groth's zk-SNARK Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1306},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1306},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheryPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaRZ20,
  author       = {Vanesa Daza and
                  Carla R{\`{a}}fols and
                  Alexandros Zacharakis},
  title        = {Updateable Inner Product Argument with Logarithmic Verifier and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1333},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1333},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KhaliliDR19,
  author       = {Mojtaba Khalili and
                  Mohammad Dakhilalian and
                  Carla R{\`{a}}fols},
  title        = {Short tightly secure signatures for signing a vector of group elements:
                  {A} new approach},
  journal      = {Theor. Comput. Sci.},
  volume       = {795},
  pages        = {225--239},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2019.07.001},
  doi          = {10.1016/J.TCS.2019.07.001},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/KhaliliDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FaonioFHR19,
  author       = {Antonio Faonio and
                  Dario Fiore and
                  Javier Herranz and
                  Carla R{\`{a}}fols},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption
                  and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {159--190},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_6},
  doi          = {10.1007/978-3-030-34618-8\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FaonioFHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GonzalezR19,
  author       = {Alonso Gonz{\'{a}}lez and
                  Carla R{\`{a}}fols},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Shorter Pairing-Based Arguments Under Standard Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {728--757},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_25},
  doi          = {10.1007/978-3-030-34618-8\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GonzalezR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DazaGPRS19,
  author       = {Vanesa Daza and
                  Alonso Gonz{\'{a}}lez and
                  Zaira Pindado and
                  Carla R{\`{a}}fols and
                  Javier Silva},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Shorter Quadratic {QA-NIZK} Proofs},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {314--343},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_11},
  doi          = {10.1007/978-3-030-17253-4\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DazaGPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaGPRS19,
  author       = {Vanesa Daza and
                  Alonso Gonz{\'{a}}lez and
                  Zaira Pindado and
                  Carla R{\`{a}}fols and
                  Javier Silva},
  title        = {Shorter Quadratic {QA-NIZK} Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaGPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GonzalezR19,
  author       = {Alonso Gonz{\'{a}}lez and
                  Carla R{\`{a}}fols},
  title        = {Sublinear Pairing-based Arguments with Updatable {CRS} and Weaker
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GonzalezR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioFHR19,
  author       = {Antonio Faonio and
                  Dario Fiore and
                  Javier Herranz and
                  Carla R{\`{a}}fols},
  title        = {Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption
                  and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/955},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioFHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Domingo-FerrerB18,
  author       = {Josep Domingo{-}Ferrer and
                  Alberto Blanco{-}Justicia and
                  Carla R{\`{a}}fols},
  title        = {Dynamic group size accreditation and group discounts preserving anonymity},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {243--260},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0368-y},
  doi          = {10.1007/S10207-017-0368-Y},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Domingo-FerrerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/EscalaHKRV17,
  author       = {Alex Escala and
                  Gottfried Herold and
                  Eike Kiltz and
                  Carla R{\`{a}}fols and
                  Jorge Luis Villar},
  title        = {An Algebraic Framework for Diffie-Hellman Assumptions},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {1},
  pages        = {242--288},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9220-6},
  doi          = {10.1007/S00145-015-9220-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/EscalaHKRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeroldHKRR17,
  author       = {Gottfried Herold and
                  Max Hoffmann and
                  Michael Kloo{\ss} and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {New Techniques for Structural Batch Verification in Bilinear Groups
                  with Applications to Groth-Sahai Proofs},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1547--1564},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134068},
  doi          = {10.1145/3133956.3134068},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeroldHKRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herold0KRR17,
  author       = {Gottfried Herold and
                  Max Hoffmann and
                  Michael Kloo{\ss} and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  title        = {New Techniques for Structural Batch Verification in Bilinear Groups
                  with Applications to Groth-Sahai Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {802},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/802},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herold0KRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GonzalezR16,
  author       = {Alonso Gonz{\'{a}}lez and
                  Carla R{\`{a}}fols},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {New Techniques for Non-interactive Shuffle and Range Arguments},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_23},
  doi          = {10.1007/978-3-319-39555-5\_23},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GonzalezR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MorilloRV16,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols and
                  Jorge Luis Villar},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {The Kernel Matrix Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {729--758},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_27},
  doi          = {10.1007/978-3-662-53887-6\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MorilloRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GonzalezHR15,
  author       = {Alonso Gonz{\'{a}}lez and
                  Alejandro Hevia and
                  Carla R{\`{a}}fols},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {{QA-NIZK} Arguments in Asymmetric Groups: New Tools and New Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {605--629},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_25},
  doi          = {10.1007/978-3-662-48797-6\_25},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GonzalezHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Rafols15,
  author       = {Carla R{\`{a}}fols},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Stretching Groth-Sahai: {NIZK} Proofs of Partial Satisfiability},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {247--276},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_10},
  doi          = {10.1007/978-3-662-46497-7\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Rafols15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rafols15,
  author       = {Carla R{\`{a}}fols},
  title        = {Stretching Groth-Sahai: {NIZK} Proofs of Partial Satisfiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rafols15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorilloRV15,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols and
                  Jorge L. Villar},
  title        = {Matrix Computational Assumptions in Multilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorilloRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GonzalezHR15,
  author       = {Alonso Gonz{\'{a}}lez and
                  Alejandro Hevia and
                  Carla R{\`{a}}fols},
  title        = {{QA-NIZK} Arguments in Asymmetric Groups: New Tools and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {910},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/910},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GonzalezHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeroldHHRR14,
  author       = {Gottfried Herold and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order
                  Transformations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_15},
  doi          = {10.1007/978-3-662-44371-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeroldHHRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/EscalaHLR14,
  author       = {Alex Escala and
                  Javier Herranz and
                  Beno{\^{\i}}t Libert and
                  Carla R{\`{a}}fols},
  editor       = {Hugo Krawczyk},
  title        = {Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical
                  Extensions, and Implications},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {239--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_14},
  doi          = {10.1007/978-3-642-54631-0\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/EscalaHLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeroldHHRR14,
  author       = {Gottfried Herold and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  title        = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order
                  Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/445},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeroldHHRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EscalaHKRV13,
  author       = {Alex Escala and
                  Gottfried Herold and
                  Eike Kiltz and
                  Carla R{\`{a}}fols and
                  Jorge L. Villar},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {An Algebraic Framework for Diffie-Hellman Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {129--147},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_8},
  doi          = {10.1007/978-3-642-40084-1\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EscalaHKRV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EscalaHKRV13,
  author       = {Alex Escala and
                  Gottfried Herold and
                  Eike Kiltz and
                  Carla R{\`{a}}fols and
                  Jorge L. Villar},
  title        = {An Algebraic Framework for Diffie-Hellman Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EscalaHKRV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AttrapadungHLLPR12,
  author       = {Nuttapong Attrapadung and
                  Javier Herranz and
                  Fabien Laguillaumie and
                  Beno{\^{\i}}t Libert and
                  Elie de Panafieu and
                  Carla R{\`{a}}fols},
  title        = {Attribute-based encryption schemes with constant-size ciphertexts},
  journal      = {Theor. Comput. Sci.},
  volume       = {422},
  pages        = {15--38},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.tcs.2011.12.004},
  doi          = {10.1016/J.TCS.2011.12.004},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AttrapadungHLLPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HerranzLLR12,
  author       = {Javier Herranz and
                  Fabien Laguillaumie and
                  Beno{\^{\i}}t Libert and
                  Carla R{\`{a}}fols},
  editor       = {Orr Dunkelman},
  title        = {Short Attribute-Based Signatures for Threshold Predicates},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_4},
  doi          = {10.1007/978-3-642-27954-6\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HerranzLLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-5856,
  author       = {Alex Escala and
                  Javier Herranz and
                  Beno{\^{\i}}t Libert and
                  Carla R{\`{a}}fols},
  title        = {Hierarchical Identity-Based Lossy Trapdoor Functions},
  journal      = {CoRR},
  volume       = {abs/1202.5856},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.5856},
  eprinttype    = {arXiv},
  eprint       = {1202.5856},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-5856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EscalaHLR12,
  author       = {Alex Escala and
                  Javier Herranz and
                  Beno{\^{\i}}t Libert and
                  Carla R{\`{a}}fols},
  title        = {Hierarchical Identity-Based (Lossy) Trapdoor Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EscalaHLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HerranzLR11,
  author       = {Javier Herranz and
                  Fabien Laguillaumie and
                  Carla R{\`{a}}fols},
  title        = {Relations between semantic security and anonymity in identity-based
                  encryption},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {10},
  pages        = {453--460},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.02.002},
  doi          = {10.1016/J.IPL.2011.02.002},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/HerranzLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/DazaHMR10,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Extensions of access structures and their cryptographic applications},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {257--284},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00200-010-0125-1},
  doi          = {10.1007/S00200-010-0125-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/DazaHMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HerranzLR10,
  author       = {Javier Herranz and
                  Fabien Laguillaumie and
                  Carla R{\`{a}}fols},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Constant Size Ciphertexts in Threshold Attribute-Based Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_2},
  doi          = {10.1007/978-3-642-13013-7\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HerranzLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MorilloR09,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {The Security of All Bits Using List Decoding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_2},
  doi          = {10.1007/978-3-642-00468-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MorilloR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/GalindoMR08,
  author       = {David Galindo and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Improved certificate-based encryption in the standard model},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {7},
  pages        = {1218--1226},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.09.009},
  doi          = {10.1016/J.JSS.2007.09.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/GalindoMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHMR08,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Extended Access Structures and Their Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Cryptographic techniques for mobile ad-hoc networks},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {18},
  pages        = {4938--4950},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.08.002},
  doi          = {10.1016/J.COMNET.2007.08.002},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_3},
  doi          = {10.1007/978-3-540-75670-5\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DazaHMR08,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Giovanni Di Crescenzo and
                  Refik Molva},
  title        = {Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts},
  booktitle    = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {192},
  number       = {2},
  pages        = {3--15},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2008.05.002},
  doi          = {10.1016/J.ENTCS.2008.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/DazaHMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GalindoMR06,
  author       = {David Galindo and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {Breaking Yum and Lee Generic Constructions of Certificate-Less and
                  Certificate-Based Encryption Schemes},
  booktitle    = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4043},
  pages        = {81--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774716\_7},
  doi          = {10.1007/11774716\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/GalindoMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DazaMR07,
  author       = {Vanesa Daza and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Giovanni Di Crescenzo and
                  Luigi V. Mancini},
  title        = {On Dynamic Distribution of Private Keys over MANETs},
  booktitle    = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2006, Venice, Italy, July 16, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {1},
  pages        = {33--41},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.008},
  doi          = {10.1016/J.ENTCS.2006.11.008},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/DazaMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorilloR06,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Certificate-Based Encryption Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorilloR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics