Germán Sáez

According to our database1, Germán Sáez authored at least 39 papers between 1999 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Secret Sharing Schemes for (k, n)-Consecutive Access Structures.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2014
New results and applications for multi-secret sharing schemes.
Des. Codes Cryptogr., 2014

Signcryption schemes with threshold unsigncryption, and applications.
Des. Codes Cryptogr., 2014

2013
Sharing many secrets with computational provable security.
Inf. Process. Lett., 2013

2010
On server trust in private proxy auctions.
Electron. Commer. Res., 2010

Fully Secure Threshold Unsigncryption.
Proceedings of the Provable Security - 4th International Conference, 2010

2009
A new algorithm to search for small nonzero |x<sup>3</sup>-y<sup>2</sup>| values.
Math. Comput., 2009

Flaws in some self-healing key distribution schemes with revocation.
Inf. Process. Lett., 2009

2008
On the Computational Security of a Distributed Key Distribution Scheme.
IEEE Trans. Computers, 2008

2006
New Results on Multipartite Access Structures.
IACR Cryptol. ePrint Arch., 2006

Distributed Ring Signatures from General Dual Access Structures.
Des. Codes Cryptogr., 2006

2005
On Threshold Self-healing Key Distribution Schemes.
Proceedings of the Cryptography and Coding, 2005

Self-healing Key Distribution Schemes with Sponsorization.
Proceedings of the Communications and Multimedia Security, 2005

2004
Correction to "Secret Sharing Schemes With Bipartite Access Structure".
IEEE Trans. Inf. Theory, 2004

Protocols useful on the Internet from distributed signature schemes.
Int. J. Inf. Sec., 2004

New Distributed Ring Signatures for General Families of Signing Subsets.
IACR Cryptol. ePrint Arch., 2004

Distributed Ring Signatures for Identity-Based Scenarios.
IACR Cryptol. ePrint Arch., 2004

Reducing Server Trust in Private Proxy Auctions.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

New Identity-Based Ring Signature Schemes.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Ring Signature Schemes for General Ad-Hoc Access Structures.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

2003
A provably secure ID-based ring signature scheme.
IACR Cryptol. ePrint Arch., 2003

Revisiting fully distributed proxy signature schemes.
IACR Cryptol. ePrint Arch., 2003

Forking Lemmas in the Ring Signatures' Scenario.
IACR Cryptol. ePrint Arch., 2003

Generation of Key Predistribution Schemes Using Secret Sharing Schemes.
Discret. Appl. Math., 2003

Distributed RSA Signature Schemes for General Access Structures.
Proceedings of the Information Security, 6th International Conference, 2003

Forking Lemmas for Ring Signature Schemes.
Proceedings of the Progress in Cryptology, 2003

Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.
Proceedings of the Financial Cryptography, 2003

Some Protocols Useful on the Internet from Threshold Signature Schemes.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure.
Inf. Process. Lett., 2002

Fully Distributed Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2002

Some Applications of Threshold Signature Schemes to Distributed Protocols.
IACR Cryptol. ePrint Arch., 2002

A Distributed and Computationally Secure Key Distribution Scheme.
IACR Cryptol. ePrint Arch., 2002

Secret Sharing Schemes with Detection of Cheaters for a General Access Structure.
Des. Codes Cryptogr., 2002

Taking cube roots in <sup>Zm</sup>.
Appl. Math. Lett., 2002

2001
Approximate Power Roots in Z<sub>m</sub>.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Secret sharing schemes with bipartite access structure.
IEEE Trans. Inf. Theory, 2000

1999
Weighted Threshold Secret Sharing Schemes.
Inf. Process. Lett., 1999

Detection of Cheaters in Vector Space Secret Sharing Schemes.
Des. Codes Cryptogr., 1999


  Loading...