Carla Ràfols

Orcid: 0000-0002-7035-9049

According to our database1, Carla Ràfols authored at least 41 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Simulation extractable versions of Groth's zk-SNARK revisited.
Int. J. Inf. Sec., February, 2024

2023
Guest editorial: Special issue on Mathematics of Zero-Knowledge.
Des. Codes Cryptogr., November, 2023

2022
Signatures of knowledge for Boolean circuits under standard assumptions.
Theor. Comput. Sci., 2022

Baloo: Nearly Optimal Lookup Arguments.
IACR Cryptol. ePrint Arch., 2022

Folding Schemes with Selective Verification.
IACR Cryptol. ePrint Arch., 2022

Linear-map Vector Commitments and their Practical Applications.
IACR Cryptol. ePrint Arch., 2022

2021
An Algebraic Framework for Universal and Updatable SNARKs.
IACR Cryptol. ePrint Arch., 2021

2020
QA-NIZK Arguments of Same Opening for Bilateral Commitments.
IACR Cryptol. ePrint Arch., 2020

Updateable Inner Product Argument with Logarithmic Verifier and Applications.
IACR Cryptol. ePrint Arch., 2020

Simulation Extractable Versions of Groth's zk-SNARK Revisited.
IACR Cryptol. ePrint Arch., 2020

Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version).
IACR Cryptol. ePrint Arch., 2020

2019
Short tightly secure signatures for signing a vector of group elements: A new approach.
Theor. Comput. Sci., 2019

Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2019

Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications.
IACR Cryptol. ePrint Arch., 2019

Shorter Quadratic QA-NIZK Proofs.
IACR Cryptol. ePrint Arch., 2019

Shorter Pairing-Based Arguments Under Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Dynamic group size accreditation and group discounts preserving anonymity.
Int. J. Inf. Sec., 2018

2017
An Algebraic Framework for Diffie-Hellman Assumptions.
J. Cryptol., 2017

New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
IACR Cryptol. ePrint Arch., 2017

2016
The Kernel Matrix Diffie-Hellman Assumption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

New Techniques for Non-interactive Shuffle and Range Arguments.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability.
IACR Cryptol. ePrint Arch., 2015

Matrix Computational Assumptions in Multilinear Groups.
IACR Cryptol. ePrint Arch., 2015

QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions.
IACR Cryptol. ePrint Arch., 2015

2014
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.
IACR Cryptol. ePrint Arch., 2014

Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2012
Attribute-based encryption schemes with constant-size ciphertexts.
Theor. Comput. Sci., 2012

Hierarchical Identity-Based (Lossy) Trapdoor Functions.
IACR Cryptol. ePrint Arch., 2012

Short Attribute-Based Signatures for Threshold Predicates.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Relations between semantic security and anonymity in identity-based encryption.
Inf. Process. Lett., 2011

2010
Extensions of access structures and their cryptographic applications.
Appl. Algebra Eng. Commun. Comput., 2010

Constant Size Ciphertexts in Threshold Attribute-Based Encryption.
Proceedings of the Public Key Cryptography, 2010

2009
The Security of All Bits Using List Decoding.
Proceedings of the Public Key Cryptography, 2009

2008
Improved certificate-based encryption in the standard model.
J. Syst. Softw., 2008

Extended Access Structures and Their Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2008

2007
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.
IACR Cryptol. ePrint Arch., 2007

Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts.
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007

Cryptographic techniques for mobile ad-hoc networks.
Comput. Networks, 2007

2006
Certificate-Based Encryption Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006

On Dynamic Distribution of Private Keys over MANETs.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes.
Proceedings of the Public Key Infrastructure, 2006


  Loading...