Carla Rāfols
Carla Rāfols
Verified email at upf.edu
TitleCited byYear
Constant size ciphertexts in threshold attribute-based encryption
J Herranz, F Laguillaumie, C Rāfols
International Workshop on Public Key Cryptography, 19-34, 2010
2442010
An algebraic framework for Diffie-Hellman assumptions
A Escala, G Herold, E Kiltz, C Rafols, J Villar
Advances in Cryptology–CRYPTO 2013, 129-147, 2013
201*2013
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
1872012
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Rāfols
Cryptographers’ Track at the RSA Conference, 51-67, 2012
1272012
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
D Galindo, P Morillo, C Rāfols
European Public Key Infrastructure Workshop, 81-91, 2006
612006
Improved certificate-based encryption in the standard model
D Galindo, P Morillo, C Rāfols
Journal of Systems and Software 81 (7), 1218-1226, 2008
582008
Cryptographic techniques for mobile ad-hoc networks
V Daza, J Herranz, P Morillo, C Rafols
Computer Networks 51 (18), 4938-4950, 2007
362007
CCA2-secure threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rafols
International Conference on Provable Security, 35-50, 2007
342007
Polynomial spaces: A new framework for composite-to-prime-order transformations
G Herold, J Hesse, D Hofheinz, C Rafols, A Rupp
CRYPTO 1, 261-279, 2014
312014
Extensions of access structures and their cryptographic applications
V Daza, J Herranz, P Morillo, C Rāfols
Applicable Algebra in Engineering, Communication and Computing 21 (4), 257-284, 2010
292010
The kernel matrix Diffie-Hellman assumption
P Morillo, C Rāfols, JL Villar
International Conference on the Theory and Application of Cryptology and …, 2016
282016
On dynamic distribution of private keys over manets
V Daza, P Morillo, C Rāfols
Electronic Notes in Theoretical Computer Science 171 (1), 33-41, 2007
192007
QA-NIZK arguments in asymmetric groups: new tools and new constructions
A González, A Hevia, C Rāfols
International Conference on the Theory and Application of Cryptology and …, 2015
182015
Stretching groth-sahai: NIZK proofs of partial satisfiability
C Rāfols
Theory of Cryptography Conference, 247-276, 2015
162015
Matrix Computational Assumptions in Multilinear Groups.
P Morillo, C Rāfols, JL Villar
IACR Cryptology ePrint Archive 2015, 353, 2015
162015
The security of all bits using list decoding
P Morillo, C Rāfols
International Workshop on Public Key Cryptography, 15-33, 2009
152009
Ad-hoc threshold broadcast encryption with shorter ciphertexts
V Daza, J Herranz, P Morillo, C Rāfols
Electronic Notes in Theoretical Computer Science 192 (2), 3-15, 2008
152008
New techniques for non-interactive shuffle and range arguments
A González, C Rāfols
International Conference on Applied Cryptography and Network Security, 427-444, 2016
122016
Shorter quadratic QA-NIZK proofs
V Daza, A González, Z Pindado, C Rāfols, J Silva
IACR International Workshop on Public Key Cryptography, 314-343, 2019
102019
Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications
A Escala, J Herranz, B Libert, C Rāfols
International Workshop on Public Key Cryptography, 239-256, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20