Alex Escala
Polytechnic University of Catalonia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Alex Escala.
international conference on progress in cryptology | 2011
Alex Escala; Javier Herranz; Paz Morillo
An attribute-based signature with respect to a signing policy, chosen ad-hoc by the signer, convinces the verifier that the signer holds a subset of attributes satisfying that signing policy. The verifier must obtain no other information about the identity of the signer or the attributes he holds. This primitive has many applications in real scenarios requiring both authentication and anonymity/privacy properties. We propose in this paper the first attribute-based signature scheme satisfying at the same time the following properties: (1) it admits general signing policies, (2) it is proved secure against fully adaptive adversaries, in the standard model, and (3) the number of elements in a signature depends only on the size of the signing policy. Furthermore, our scheme enjoys the additional property of revocability: an external judge can break the anonymity of a signature, when necessary. This property may be very interesting in real applications where authorities are unwilling to allow full anonymity of users.
public key cryptography | 2014
Alex Escala; Jens Groth
Groth-Sahai proofs are efficient non-interactive zero-knowledge proofs that have found widespread use in pairing-based cryptography. We propose efficiency improvements of Groth-Sahai proofs in the SXDH setting, which is the one that yields the most efficient non-interactive zero-knowledge proofs. We replace some of the commitments with ElGamal encryptions, which reduces the provers computation and for some types of equations reduces the proof size.Groth-Sahai proofs are zero-knowledge when no public elements are paired to each other. We observe that they are also zero-knowledge when base elements for the groups are paired to public constants.The provers computation can be reduced by letting her pick her own common reference string. By giving a proof she has picked a valid common reference string this does not compromise soundness.We define a type-based commit-and-prove scheme, which allows commitments to be reused in many different proofs.
Journal of Cryptology | 2017
Alex Escala; Gottfried Herold; Eike Kiltz; Carla Ràfols; Jorge L. Villar
We put forward a new algebraic framework to generalize and analyze Diffie–Hellman like decisional assumptions which allows us to argue about security and applications by considering only algebraic properties. Our
financial cryptography | 2016
Alex Escala; Sandra Guasch; Javier Herranz; Paz Morillo
Lecture Notes in Computer Science | 2015
Pedro Bibiloni; Alex Escala; Paz Morillo
\mathcal {D}_{\ell ,k}\text{- }\textsf {MDDH}
international cryptology conference | 2013
Alex Escala; Gottfried Herold; Eike Kiltz; Carla Ràfols; Jorge L. Villar
public key cryptography | 2014
Alex Escala; Javier Herranz; Benoît Libert; Carla Rífols
Dℓ,k-MDDH Assumption states that it is hard to decide whether a vector in
international conference on security and cryptography | 2014
Jordi Cucurull; Sandra Guasch; Alex Escala; Guillermo Navarro-Arribas; Víctor Acín
IACR Cryptology ePrint Archive | 2012
Alex Escala; Javier Herranz; Benoît Libert; Carla Ràfols
\mathbb {G}^\ell
IACR Cryptology ePrint Archive | 2013
Alex Escala; Jens Groth