Isaac Agudo

ORCID: 0000-0002-2911-2300
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Access Control and Trust
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Complexity and Algorithms in Graphs
  • Service-Oriented Architecture and Web Services
  • Advanced Authentication Protocols Security
  • Chaos-based Image/Signal Encryption
  • User Authentication and Security Systems
  • Distributed systems and fault tolerance
  • Information and Cyber Security
  • Peer-to-Peer Network Technologies
  • Logic, Reasoning, and Knowledge
  • Privacy, Security, and Data Protection
  • Data Privacy and Cybersecurity
  • Mobile Agent-Based Network Management
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Comparative constitutional jurisprudence studies
  • Safety Systems Engineering in Autonomy
  • Digital and Cyber Forensics
  • Open Source Software Innovations
  • Bluetooth and Wireless Communication Technologies

Universidad de Málaga
2013-2023

Secure Multi-party Computation (SMPC) is a family of protocols which allow some parties to compute function on their private inputs, obtaining the output at end and nothing more. In this work, we focus particular SMPC problem named Private Set Intersection (PSI). The challenge in PSI how two or more can intersection input sets, while elements that are not remain private. This has attracted attention many researchers because its wide variety applications, contributing proliferation different...

10.1016/j.cosrev.2023.100567 article EN cc-by-nc-nd Computer Science Review 2023-05-27

10.1007/s10207-014-0230-4 article EN International Journal of Information Security 2014-03-05

The use of alternative foundations for constructing more secure and efficient cryptographic schemes is a topic worth exploring. In the case proxy re-encryption, vast majority are based on number theoretic problems such as discrete logarithm. this paper we present NTRUReEncrypt, new bidirectional multihop re-encryption scheme NTRU, widely known lattice-based cryptosystem. We provide two versions our scheme: first one conventional NTRU encryption and, although it lacks security proof, remains...

10.1145/2714576.2714585 article EN 2015-04-03

The inclusion of identity management in the cloud computing landscape represents a new business opportunity for providing what has been called Identity Management as Service (IDaaS). Nevertheless, IDaaS introduces same kind problems regarding privacy and data confidentiality other services; on top that, nature outsourced information (users' identity) is critical. Traditionally, services (including IDaaS) rely only SLAs security policies to protect data, but these measures have proven...

10.1109/cloudcom.2012.6427551 article EN 2012-12-01

New mobility paradigms have appeared in recent years, and everything suggests that some more are coming. This fact makes apparent the necessity of modernizing road infrastructure, signalling elements traffic management systems. Many initiatives emerged around term Intelligent Transport System (ITS) order to define new scenarios requirements for this kind applications. We even two main competing technologies implementing Vehicular communication protocols (V2X), C-V2X 802.11p, but neither them...

10.1109/tvt.2020.3046640 article EN IEEE Transactions on Vehicular Technology 2020-12-22

Over the last decade, Cloud Computing paradigm has emerged as a panacea for many problems in traditional IT infrastructures. Much been said about potential of context Smart Grid, but unfortunately it is still relegated to second layer when comes critical systems. Although advantages outsourcing these kinds applications cloud clear, data confidentiality and operational privacy stand mayor drawbacks. In this paper, we describe some security mechanisms, specifically, cryptographic schemes, that...

10.1109/cloudcom.2011.79 article EN 2011-11-01

10.1016/j.csi.2013.12.012 article EN Computer Standards & Interfaces 2014-01-03

Proxy Re-Encryption (PRE) is a type of Public-Key Encryption (PKE) that provides an additional re-encryption functionality. Although PRE inherently more complex than PKE, attack models for have not been developed further those inherited from PKE. In this paper we address gap and define parametric family PRE, based on the availability both decryption oracles during security game. This enables definition set intermediate notions ranges "plain" IND-CPA to "full" IND-CCA. We analyze some...

10.1109/csf.2015.27 article EN 2015-07-01

10.1016/j.camwa.2010.02.009 article EN publisher-specific-oa Computers & Mathematics with Applications 2010-03-15

Abstract Several generic methods exist for achieving chosen‐ciphertext attack (CCA)‐secure public‐key encryption schemes from weakly secure cryptosystems, such as the Fujisaki–Okamoto and REACT transformations. In context of proxy re‐encryption (PRE), it would be desirable to count on analogous constructions that allow PRE achieve better security notions. this paper, we study adaptation these transformations find both negative positive results. On one hand, show why is not possible directly...

10.1002/sec.1434 article EN Security and Communication Networks 2016-02-19

Assurance has been a major topic for critical systems. is usually associated with safety conditions but also an important role checking security requirements. Security best assured if it addressed holistically, systematically, and from the very beginning in software's development process. We propose to integrate assurance system by letting different stages of life-cycle be mapped structure case.

10.1145/1731740.1731763 article EN Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing 2009-06-18

Among Big Data technologies, Hadoop stands out for its capacity to store and process large-scale datasets. However, although was not designed with security in mind, it is widely used by plenty of organizations, some which have strong data protection requirements. Traditional access control solutions are enough, cryptographic must be put place protect sensitive information. In this paper, we describe a cryptographically-enforced system Hadoop, based on proxy re-encryption. Our proposed...

10.1109/cloudcom.2014.50 article EN 2014-12-01
Coming Soon ...