Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paz Morillo is active.

Publication


Featured researches published by Paz Morillo.


international conference on progress in cryptology | 2011

Revocable attribute-based signatures with adaptive security in the standard model

Alex Escala; Javier Herranz; Paz Morillo

An attribute-based signature with respect to a signing policy, chosen ad-hoc by the signer, convinces the verifier that the signer holds a subset of attributes satisfying that signing policy. The verifier must obtain no other information about the identity of the signer or the attributes he holds. This primitive has many applications in real scenarios requiring both authentication and anonymity/privacy properties. We propose in this paper the first attribute-based signature scheme satisfying at the same time the following properties: (1) it admits general signing policies, (2) it is proved secure against fully adaptive adversaries, in the standard model, and (3) the number of elements in a signature depends only on the size of the signing policy. Furthermore, our scheme enjoys the additional property of revocability: an external judge can break the anonymity of a signature, when necessary. This property may be very interesting in real applications where authorities are unwilling to allow full anonymity of users.


european public key infrastructure workshop | 2006

Breaking yum and lee generic constructions of certificate-less and certificate-based encryption schemes

David Galindo; Paz Morillo; Carla Ràfols

Identity-based public key cryptography is aimed at simplifying the management of certificates in traditional public key infrastructures by means of using the identity of a user as its public key. The user must identify itself to a trusted authority in order to obtain the secret key corresponding to its identity. The main drawback of this special form of public key cryptography is that it is key escrowed. Certificate-based and certificate-less cryptography have been recently proposed as intermediate paradigms between traditional and identity-based cryptography, seeking to simplify the management of certificates while avoiding the key escrow property of identity-based cryptography. In this work we cryptanalyse the certificate-based and certificate-less encryption schemes presented by Yum and Lee at EuroPKI 2004 and ICCSA 2004 conferences.


Information Processing Letters | 1999

Weighted threshold secret sharing schemes

Paz Morillo; Carles Padró; Germán Sáez; Jorge L. Villar

In a secret sharing scheme, each participant receives a share of a secret in such a way that only authorized subsets can reconstruct the secret. The information rate of a secret sharing scheme is the ratio between the size of the secret and the size of the shares given to the participants. In a weighted threshold scheme each participant has his or her own weight. A subset of participants is authorized to reconstruct the secret if the sum of their weights is greater than or equal to the threshold. This paper deals with weighted threshold schemes, mainly the properties related to the information rate. A complete characterization of the access structures of weighted threshold schemes when all the minimal authorized subsets have at most two elements is presented. Lower bounds for the optimal information rate of these access structures are given.


Journal of Systems and Software | 2008

Improved certificate-based encryption in the standard model

David Galindo; Paz Morillo; Carla Rífols

Certificate-based encryption has been recently proposed as a means to simplify the certificate management inherent to traditional public key encryption. In this paper, we present an efficient certificate-based encryption scheme which is fully secure in the standard model. Our construction is more efficient (in terms of computational cost and ciphertext size) than any of the previous constructions known without random oracles.


Computer Networks | 2007

Cryptographic techniques for mobile ad-hoc networks

Vanesa Daza; Javier Herranz; Paz Morillo; Carla Rífols

In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.


Discrete Applied Mathematics | 2003

Linear broadcast encryption schemes

Carles Padró; Ignacio Gracia; Sebastià Martín; Paz Morillo

A new family of broadcast encryption schemes, which will be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and provides a general framework to the study of broadcast encryption schemes. We present a method to construct, for a general specification structure, LBESs with a good trade-off between the amount of secret information stored by every user and the length of the broadcast message. In this way, we are able to find schemes that fit in situations that have not been considered before.


Designs, Codes and Cryptography | 2002

Linear Key Predistribution Schemes

Carles Padró; Ignacio Gracia; Sebastià Martín Molleví; Paz Morillo

In a key predistribution scheme, some secret information is distributed among a set of users. For a given family of privileged groups, this secret information must enable every user in a privileged group to compute a common key associated with that group. Besides, this common key must remain unknown to some specified coalitions of users outside the privileged group. We present in this paper a new model, based on linear algebraic techniques, for the design of key predistribution schemes that unifies all previous proposals. This new model provides a common mathematical formulation and a better understanding of key predistribution schemes. Two new families of key predistribution schemes that are obtained by using this model are presented. Those families provide, for some specification structures, schemes that have better information rates than the ones given in previous proposals or fit in situations that have not been considered before.


Applicable Algebra in Engineering, Communication and Computing | 2010

Extensions of access structures and their cryptographic applications

Vanesa Daza; Javier Herranz; Paz Morillo; Carla Ràfols

In secret sharing schemes a secret is distributed among a set of users


Discrete Mathematics | 1996

Diameter vulnerability of iterated line digraphs

Carles Padró; Paz Morillo


public key cryptography | 2009

The Security of All Bits Using List Decoding

Paz Morillo; Carla Ràfols

{\mathcal{P}}

Collaboration


Dive into the Paz Morillo's collaboration.

Top Co-Authors

Avatar

Jorge L. Villar

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

David Galindo

University of Luxembourg

View shared research outputs
Top Co-Authors

Avatar

Carla Ràfols

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Carles Padró

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Javier Herranz

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Vanesa Daza

Pompeu Fabra University

View shared research outputs
Top Co-Authors

Avatar

Sebastià Martín Molleví

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Sebastià Martín

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Alex Escala

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Miguel Angel Fiol

Polytechnic University of Catalonia

View shared research outputs
Researchain Logo
Decentralizing Knowledge