#### Filter Results:

- Full text PDF available (20)

#### Publication Year

1987

2017

- This year (0)
- Last 5 years (7)
- Last 10 years (14)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Alex Escala, Javier Herranz, Paz Morillo
- IACR Cryptology ePrint Archive
- 2011

An attribute-based signature with respect to a signing policy, chosen ad-hoc by the signer, convinces the verifier that the signer holds a subset of attributes satisfying that signing policy.â€¦ (More)

- Paz Morillo, Carla RÃ fols, Jorge Luis Villar
- IACR Cryptology ePrint Archive
- 2015

We put forward a new family of computational assumptions, the Kernel Matrix DiffieHellman Assumption. Given some matrix A sampled from some distribution D, the kernel assumption says that it is hardâ€¦ (More)

- Paz Morillo, Carla RÃ fols
- Public Key Cryptography
- 2009

The relation between list decoding and hard-core predicates has provided a clean and easy methodology to prove the hardness of certain predicates. So far this methodology has only been used to proveâ€¦ (More)

- Paz Morillo, Carla RÃ fols, Jorge Luis Villar
- ASIACRYPT
- 2016

We put forward a new family of computational assumptions, the Kernel Matrix Diffie-Hellman Assumption. Given some matrix A sampled from some distribution D, the kernel assumption says that it is hardâ€¦ (More)

- Vanesa Daza, Javier Herranz, Paz Morillo, Carla RÃ fols
- IACR Cryptology ePrint Archive
- 2007

In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a wayâ€¦ (More)

- Vanesa Daza, Javier Herranz, Paz Morillo, Carla RÃ fols
- Electr. Notes Theor. Comput. Sci.
- 2008

In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a wayâ€¦ (More)

- David Galindo, SebastiÃ MartÃn MollevÃ, Paz Morillo, Jorge Luis Villar
- Public Key Cryptography
- 2003

We propose a practical scheme based on factoring and semantically secure (IND-CPA) in the standard model. The scheme is obtained from a modification of the so called RSA-Paillier [5] scheme. Thisâ€¦ (More)

- David Galindo, Paz Morillo, Carla RÃ fols
- Journal of Systems and Software
- 2008

- David Galindo, SebastiÃ MartÃn MollevÃ, Paz Morillo, Jorge Luis Villar
- IACR Cryptology ePrint Archive
- 2002

We propose an elliptic curve scheme over the ring Zn2 , which is efficient and semantically secure in the standard model. There appears to be no previous elliptic curve cryptosystem based onâ€¦ (More)

- Paz Morillo, Carles PadrÃ³, GermÃ¡n SÃ¡ez, Jorge Luis Villar
- Inf. Process. Lett.
- 1999