Publications
DBLP - Google Scholar - ResearchGate
Book chapter
Design and Analysis of Semantically Secure Public Key Encryption Schemes. PhD Thesis, Universitat Politecnica de Catalunya (2004). Advisor: Sebastia Martin.
Constructions with ruler and compass on the lemniscate (in catalan). Master Thesis, Universitat Politecnica de Catalunya (1999). Advisor: J.C. Lario.
DBLP - Google Scholar - ResearchGate
Book chapter
- with E. R. Verheul. Pseudonymized Data Sharing. In J. Nin and J. Herranz (eds.), Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems, Advanced Information and Knowledge Processing, Springer. 157-179 (2010) DOI
- with Karen Yeung. Why Do Public Blockchains Need Formal and Effective Internal Governance Mechanisms? European Journal of Risk Regulation, Cambridge University Press. Volume 10 Issue 2 pp. 359-375 (2019) link
- with Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala and Srinivas Vivek. Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, Springer. Volume 6 Issue 3 pp. 229-238 (2016) Open Access
- with Sidi Mohamed El Yousfi Alaoui, Ozgur Dagdelen, Pascal Veron and Pierre-Louis Cayrel. Extended Security Arguments for Signature Schemes. Designs, Codes and Cryptography, Elsevier. Volume 78, Issue 2: 441-461 (2016)
- Compact Hierarchical Identity-Based Encryption based on a Harder Decisional Problem. International Journal of Computer Mathematics 92(3): 463-472 (2015)
- with Srinivas Vivek. Limits of a Conjecture on a Leakage-Resilient Cryptosystem. Information Processing Letters, Elsevier. Volume 114, Issue 4 (2014) 192-196 DOI
- A note on an IND-CCA2 secure Paillier-based cryptosystem. Information Processing Letters, Elsevier. Volume 113, Issues 22-24 (2013) 913-194 DOI
- with R. Roman, and J. Lopez. On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks. Wireless Communications and Mobile Computing, John Wiley & Sons. Volume 12, Issue 1 (2012) 133 - 143 DOI
- with J. Herranz and E. Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. Advances in Mathematics of Communications, American Institute of Mathematical Sciences. Volume 4, Number 4 (2010) 453 - 483
- with E. Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Theoretical Computer Science, Elsevier. Volume 410 Numbers 47-49 (2009) 5093-5111
- with J. Herranz. On the security of public key cryptosystems with a double decryption mechanism. Information Processing Letters, Elsevier. Volume 108 Issue 5 (2008) 279-283
- with P. Morillo and C. Rafols. Improved Certificate-Based Encryption in the Standard Model. Journal of Systems and Software, Elsevier. Vol 81/7 (2008) 1218-1226
- with S. Martin, P. Morillo and J. L. Villar. Fujisaki-Okamoto Hybrid Encryption Revisited. International Journal of Information Security, Springer. Volume 4, Number 4 (2005) 228 - 241. (pdf)
- with Rujia Li, Qin Wang, Feng Liu and Qi Wang. An Accountable Decryption System Based on Privacy-Preserving Smart Contracts. 23rd Information Security Conference, ISC 2020, LNCS volume --, pp. -- Springer (2020)
- with Rujia Li and Qi Wang. Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts. Data Privacy Management, Cryptocurrencies and Blockchain Technology, ESORICS 2019, LNCS volume 11737, pp. 355-371. Springer (2019)
- with Mihai Ordean and Mark D. Ryan. CAOS : Concurrent-Access Obfuscated Store. In 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06 (2019)
- with Véronique Cortier, Mathieu Turuani. A formal analysis of the Neuchâtel e-voting protocol. In Proceedings of 3rd IEEE European Symposium on Security and Privacy 2018, EuroS&P 2018, London, UK, April 2018.
- with Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer. BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme. In Proceedings of 23rd ACM ACM SIGSAC Conference on Computer and Communications Security 2016, ACM CCS 2016, Hofburg Palace, Vienna, Austria October 24-28, 2016.
- with Véronique Cortier, Ralf Küsters, Johannes Müller, and Tomasz Truderung. SoK: Verifiability Notions for E-Voting Protocols. In Proceedings of 37th IEEE Symposium on Security and Privacy, IEEE S&P 2016, San José at the Fairmont, USA, May 21-24 2016.
- with David Bernhard, Veronique Cortier, Olivier Pereira and Bogdan Warinschi. SoK: A comprehensive analysis of game-based ballot privacy definitions. In Proceedings of 36th IEEE Symposium on Security and Privacy, IEEE S&P 2015, San José at the Fairmont, USA, May 18-20 2015.
- with Sandra Guasch and Jordi Puiggalí. 2015 Neuchatel's Cast-as-Intended Verification Mechanism. In Proceedings of 5th International Conference on E-voting and Identity, VoteID 2015, Bern, Switzerland, 2-4 September 2015.
- with Johann Grossschädl, Zhe Liu, Praveen K. Vadnal and Srinivas Vivek. Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. In Proceedings of 3rd Security Proofs for Embedded Systems Workshop, PROOFS 2014, Busan, South-Korea, September 26 2014.
- with Veronique Cortier, Stephane Glondu and Malika Izabachene. Election Verifiability for Helios Under Weaker Trust Assumptions. In Proceedings of 17th European Symposium on Research in Computer Security, ESORICS 2014, Wroclaw, Poland, September 7-11 2014. Lecture Notes in Computer Science 8713 (2014) 327-344
- with Srinivas Vivek. A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. In Proceedings of 14th IMA International Conference on Cryptography and Coding, IMA CC 2013, December 17-19, 2013, Oxford, UK. Lecture Notes in Computer Science 8308 (2013) 173-192
- with Veronique Cortier, Stephane Glondu and Malika Izabachene. Distributed ElGamal a la Pedersen - Application to Helios. In Proceedings of the 12th annual ACM workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany (2013) 131-142
- with Srinivas Vivek. A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. In Proceedings of 19th Conference on Selected Areas in Cryptography, SAC 2012, Windsor, Canada, August 16-17, 2012. Lecture Notes in Computer Science 7707 (2013) 50-65
- with J. Herranz and J. L. Villar. Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. In Proceedings of 17th European Symposium on Research in Computer Security, ESORICS 2012, Pisa, Italy, September 10-12, 2012. Lecture Notes in Computer Science 7459 (2012) 627-642
- with Sidi Mohamed El Yousfi Alaoui, Ozgur Dagdelen, Pascal Veron and Pierre-Louis Cayrel. Extended Security Arguments for Signature Schemes. In Proceedings of 5th African International Conference on Cryptology, AfricaCrypt 2012, Ifrane, Morocco, July 10-12, 2012. Lecture Notes in Computer Science 7374 (2012) 19-34
- with J-H. Hoepman. Non-interactive Distributed Encryption: A New Primitive for Revocable Privacy. In Proceedings of the 10th annual ACM workshop on Privacy in the Electronic Society, WPES 2011, Chicago, IL, USA (2011) 81-92
- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman. In Proceedings of 4th International Conference on Pairing-based Cryptography, Pairing 2010, Yamanaka Hot Spring, Ishikawa, Japan, December 13-15, 2010. Lecture Notes in Computer Science 6487 (2010) 367-376
- with Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schroeder. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. In Proceedings of 3rd African International Conference on Cryptology, AfricaCrypt 2010, Stellenbosch, South Africa, May 3-6, 2010. Lecture Notes in Computer Science 6055 (2010) 333-350
- with F. D. Garcia. A Schnorr-like Lightweight Identity-Based Signature Scheme. In Proceedings of 2nd African International Conference on Cryptology, AfricaCrypt 2009, Gammarth, Tunisia, June 21-25, 2009. Lecture Notes in Computer Science 5580 (2009) 135-148
- Breaking and Repairing Damgard et al. Public Key Encryption Scheme with Non-interactive Opening. In Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Lecture Notes in Computer Science 5473 (2009) 389-398
- with R. Roman, and J. Lopez. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In Proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, Hong Kong, China. Lecture Notes in Computer Science 5339 (2008) 120-132
- with J. Baek, W. Susilo and J. Zhou. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). In Proceedings of the Sixth Conference on Security and Cryptography for Networks, SCN 2008, Amalfi, Italy. Lecture Notes in Computer Science 5229 (2008) 358-374
- with F. D. Garcia and P. van Rossum. Computational Soundness of Non-Malleable Commitments. In Proceedings of the 4th Information Security Practice and Experience Conference, ISPEC 2008, Sydney, Australia. Lecture Notes in Computer Science 4991 (2008) 361-376
- with J. Herranz and E. Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. In Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2006, Shanghai, China. Lecture Notes in Computer Science 4284 (2006) 178–193.
- with R. Corin and J-H. Hoepman. Securing data accountability in decentralized systems. In Proceedings of 1st International Workshop on Information Security, IS'06 (in conjunction with OTM Workshops 2006). Montpellier, France, 2006. Lecture Notes in Computer Science 4277 (2006) 626-635.
- with E. Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In Proceedings of 5th Conference on Security and Cryptography for Networks, SCN 2006. Maiori, Italy, 2006. Lecture Notes in Computer Science 4116 (2006) 173-185.
- with J. Herranz. A Generic Construction for Token-Controlled Public Key Encryption. In Proceedings of 10th Financial Cryptography and Data Security Conference, FC 2006. Anguilla, British West Indies, 2006. Lecture Notes in Computer Science 4107 (2006) 177–190.
- with E. Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In Proceedings of 11th Australasian Conference on Information Security and Privacy, ACISP 2006. Melbourne, Australia, 2006. Lecture Notes in Computer Science 4058 (2006) 336-347.
- with P. Morillo and C. Rafols. Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In Proceedings of Third European PKI Workshop: theory and practice, EuroPKI 2006. Torino, Italy, 2006. Lecture Notes in Computer Science 4043 (2006) 81-91.
- A Separation between Selective and Full-identity Security Notions for Identity-based Encryption. The 2006 International Conference on Computational Science and its Applications, ICCSA 2006. Glasgow, United Kingdom. Lecture Notes in Computer Science 3982 (2006) 318-326.
- with N. Attrapadung, Y. Cui, G. Hanaoka, I. Hasuo, H. Imai, K. Matsuura, P. Yang and R. Zhang. Relations among notions of security for identity based encryption schemes. In Proceedings of 7th Latin American Theoretical Informatics Symposium, LATIN 2006. Valdivia, Chile, 2006. Lecture Notes in Computer Science 3887 (2006) 130-141.
- Boneh-Franklin Identity Based Encryption Revisited. In Proceedings of 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005. Lisboa, Portugal 2005. Lecture Notes in Computer Science 3580 (2005) 791-802. (pdf)
- with S. Martin, T. Takagi and J. L. Villar. A provably secure elliptic curve scheme with fast encryption. In Proceedings of INDOCRYPT 2004, Chennai, India. Lecture Notes in Computer Science 3348 (2004) 245-259. (pdf)
- with S. Martin, P. Morillo and J. L. Villar. Easy Verifiable Primitives and Practical Public Key Cryptosystems In Proceedings of Information Security Conference 2003, ISC 2003. Bristol, United Kingdom 2003. Lecture Notes in Computer Science 2851 (2003) 69-83. (pdf)
- with S. Martin, P. Morillo and J. L. Villar. A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. In Proceedings of Public Key Cryptography PKC 2003. Miami, USA 2003. Lecture Notes in Computer Science 2567 (2003) 279-291. (pdf)
- with S. Martin, P. Morillo and J. L. Villar. An IND-CPA cryptosystem from Demytko's primitive. In Proceedings of 2003 IEEE Information Theory Workshop (2003) 167-170. IEEE press. (pdf)
- with S. Martin and J. L. Villar. The security of PSEC-KEM versus ECIES-KEM. Full version. In Proceedings of 26th Symposium on Information Theory in the BeNeLux, Brussels, Belgium (2005) 17-27. (pdf)
- with J. L. Villar. An instantiation of the Cramer-Shoup encryption paradigm using bilinear map groups. In Proceedings of Workshop on Mathematical Problems and Techniques in Cryptology, Bellaterra, Spain (2005). (pdf)
- with S. Martin, P. Morillo and J. L. Villar. An efficient semantically secure elliptic curve cryptosystem based on KMOV. In Proceedings of International Workshop on Coding and Cryptography WCC 2003, pp. 213-221. (pdf)
Design and Analysis of Semantically Secure Public Key Encryption Schemes. PhD Thesis, Universitat Politecnica de Catalunya (2004). Advisor: Sebastia Martin.
Constructions with ruler and compass on the lemniscate (in catalan). Master Thesis, Universitat Politecnica de Catalunya (1999). Advisor: J.C. Lario.
Last updated: 21 April, 2023.