Forking lemmas for ring signature schemes J Herranz, G Sáez International Conference on Cryptology in India, 266-279, 2003 | 235 | 2003 |
Secret sharing schemes with bipartite access structure C Padró, G Sáez IEEE Transactions on Information Theory 46 (7), 2596-2604, 2000 | 139 | 2000 |
New identity-based ring signature schemes J Herranz, G Sáez International Conference on Information and Communications Security, 27-39, 2004 | 132 | 2004 |
Weighted threshold secret sharing schemes P Morillo, C Padró, G Sáez, JL Villar Information processing letters 70 (5), 211-216, 1999 | 97 | 1999 |
Secret sharing schemes with detection of cheaters for a general access structure S Cabello, C Padró, G Sáez Designs, Codes and Cryptography 25, 175-188, 2002 | 68 | 2002 |
Detection of cheaters in vector space secret sharing schemes C Padro, G Sáez, JL Villar Designs, Codes and cryptography 16, 75-85, 1999 | 64 | 1999 |
New results on multipartite access structures J Herranz, G Sáez IEE Proceedings-Information Security 153 (4), 153-162, 2006 | 59 | 2006 |
Generation of key predistribution schemes using secret sharing schemes G Sáez Discrete Applied Mathematics 128 (1), 239-249, 2003 | 55 | 2003 |
New results and applications for multi-secret sharing schemes J Herranz, A Ruiz, G Sáez Designs, codes and cryptography 73, 841-864, 2014 | 54 | 2014 |
On threshold self-healing key distribution schemes G Sáez Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005 | 51 | 2005 |
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures J Herranz, G Sáez International Conference on Financial Cryptography, 286-302, 2003 | 43 | 2003 |
Revisiting fully distributed proxy signature schemes J Herranz, G Sáez International Conference on Cryptology in India, 356-370, 2004 | 36 | 2004 |
Secret sharing Schemes with Detection of Cheaters for a General Access Structure [J] C Sergio, P Carles, S Germán Designs, Codes and Cryptography 25 (2), 175-188, 2002 | 27 | 2002 |
A provably secure ID-based ring signature scheme J Herranz, G Sáez Cryptology ePrint Archive, 2003 | 26 | 2003 |
Self-healing key distribution schemes with sponsorization G Sáez Communications and Multimedia Security: 9th IFIP TC-6 TC-11International …, 2005 | 24 | 2005 |
A Distributed and Computationally Secure Key Distribution Scheme* V Daza, J Herranz, C Padró, G S'aez International Conference on Information Security, 342-356, 2002 | 22 | 2002 |
Sharing many secrets with computational provable security J Herranz, A Ruiz, G Sáez Information Processing Letters 113 (14-16), 572-579, 2013 | 20 | 2013 |
Ring signature schemes for general ad-hoc access structures J Herranz, G Sáez European Workshop on Security in Ad-hoc and Sensor Networks, 54-65, 2004 | 20 | 2004 |
Constructing general dynamic group key distribution schemes with decentralized user join V Daza, J Herranz, G Sáez Australasian Conference on Information Security and Privacy, 464-475, 2003 | 20 | 2003 |
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure C Padró, G Sáez Information Processing Letters 83 (6), 345-351, 2002 | 20 | 2002 |