Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Juan Antonio López-Ramos is active.

Publication


Featured researches published by Juan Antonio López-Ramos.


Journal of Computational and Applied Mathematics | 2012

A suite of algorithms for key distribution and authentication in centralized secure multicast environments

J. A. M. Naranjo; N. Antequera; Leocadio G. Casado; Juan Antonio López-Ramos

The Extended Euclidean algorithm provides a fast solution to the problem of finding the greatest common divisor of two numbers. In this paper, we present three applications of the algorithm to the security and privacy field. The first one allows one to privately distribute a secret to a set of recipients with only one multicast communication. It can be used for rekeying purposes in a Secure Multicast scenario. The second one is an authentication mechanism to be used in environments in which a public-key infrastructure is not available. Finally, the third application of the Extended Euclidean algorithm is a zero-knowledge proof that reduces the number of messages between the two parts involved, with the aid of a central server.


workshop in information security theory and practice | 2009

Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

J. A. M. Naranjo; Juan Antonio López-Ramos; Leocadio G. Casado

Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.


Journal of Discrete Mathematical Sciences and Cryptography | 2017

Managing key multicasting through orthogonal systems

José Antonio Álvarez-Bermejo; Juan Antonio López-Ramos; Joachim Rosenthal; Davide Schipani

Abstract In this paper we propose a new protocol for Group Key Management. The protocol is based on the use of orthogonal systems in vector spaces. The main advantage in comparison to other existing multicast key management protocols consists in small communications overheads, i.e. length and number of messages to be sent, as well as key storage, especially with respect to a comparable security level. This makes the protocol especially attractive when the number of legitimate receivers is large.


Journal of Information Science and Engineering | 2011

Group Oriented Renewal of Secrets and Its Application to Secure Multicast

J. A. M. Naranjo; Leocadio G. Casado; Juan Antonio López-Ramos

This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. The method is centralized, secure, efficient, scalable to a reasonable size and compatible with any multicast topology configuration underneath. It can be used to achieve privacy in a centralized multicast overlay. Additionally, the method can be used to renew an asymmetric key pair when a cryptosystem based on discrete logarithm is used. Knowledge of the public key is then restricted to the group it is communicated to. Security and scalability are discussed, and a comparison with other well-known alternatives is shown.


Journal of Algebra and Its Applications | 2017

Group key management based on semigroup actions

Juan Antonio López-Ramos; Joachim Rosenthal; Davide Schipani; Reto Schnyder

In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level and communication overheads of previous existing protocols. Security against passive attacks is considered and depends on the hardness of the semigroup action problem in any particular scenario.


conference on design of circuits and integrated systems | 2015

Hardware implementation of a new ECC key distribution protocol for securing Wireless Sensor Networks

L. Parrilla; Diego P. Morales; J.A. Lopez-Villanueva; Juan Antonio López-Ramos; José Antonio Álvarez-Bermejo

Security in Wireless Sensor Networks (WSNs) is a major challenge for extending its applications. In this paper, a new protocol for key distribution in WSNs is proposed. The method, based on Elliptic Curve Cryptography, and named ECGDH-1, performs a double round key distribution, sharing a group key among the different nodes. For accelerating the scalar-point operations to be performed in each node, a hardware coprocessor with low power consumption, and 8-bit interface for sensor motes is proposed. The cryptographic processor, named ECCB163sens_bus8 allows completing a scalar-point multiplication in 240us operating at 8MHz, while consuming only 0.028mJ by operation when implemented in a Spartan 6 device.


Journal of Computational and Applied Mathematics | 2011

Determining all indecomposable codes over some Hopf algebras

J. Cuadra; J.M. García-Rubira; Juan Antonio López-Ramos

We determine all indecomposable codes over a class of Hopf algebras named Taft Algebras. We calculate dual codes and tensor products of these indecomposable codes and give applications of them.


Advances in Mathematics of Communications | 2017

An active attack on a distributed Group Key Exchange system

Mohamed Baouch; Juan Antonio López-Ramos; Blas Torrecillas; Reto Schnyder

In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.


The Journal of Supercomputing | 2014

A decentralized protocol for mobile control access

J. A. Alvarez Bermejo; M. A. Lodroman; Juan Antonio López-Ramos

In this paper we use the Diffie–Hellman key exchange protocol to introduce a decentralized key agreement protocol based on elliptic curves. We do not use any public key infrastructure, which makes it suitable for light devices with low computational and storage capabilities. Thus mobile devices can directly authorize other mobile devices to exchange keys in order to get access to a service or system, in a secure and efficient manner.


The Journal of Supercomputing | 2013

A scalable server for key distribution and its application to accounting

José Antonio Álvarez-Bermejo; N. Antequera; R. García-Rubio; Juan Antonio López-Ramos

Media distribution over the Internet is a fact. Finding a way to protect content streaming is a hot topic. This paper presents both a new and efficient key multicasting protocol based on the use of orthogonal systems in vector spaces, and its scalable implementation by means of a platform independent server. The protocol outstands in exchanging a small number of tiny messages which helps the server to scale when facing a huge number of legitimate users.

Collaboration


Dive into the Juan Antonio López-Ramos's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Antonio G. García

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge