David Galindo
Postdoctoral Researcher
Software Engineering
Computer Science Department
University of Malaga
Contact Data
Address:
Email:
Research
Design and analysis of provably secure cryptographic protocols.
Program Committee
Main papers
The copyrights for journal and conference proceedings papers generally
belong to the publisher.
- with J. Baek, W. Susilo and J. Zhou. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
In Proceedings of the Sixth Conference on Security and Cryptography for Networks, SCN 2008, Amalfi, Italy. Lecture Notes in Computer Science, Springer. To appear.
- with J. Herranz. On the security of public key cryptosystems with a double decryption mechanism.
Information Processing Letters, Elsevier. To appear. (2008)
- with F. D. Garcia and P. van Rossum. Computational Soundness of Non-Malleable Commitments.
In Proceedings of the 4th Information Security Practice and Experience Conference, ISPEC 2008, Sydney, Australia. Lecture Notes in Computer Science 4991 (2008) 361-376
- with P. Morillo and C. Rafols. Improved Certificate-Based Encryption in the Standard
Model.
Journal of Systems and Software, Vol 81/7 pp 1218-1226 (2008), Elsevier.
- with J. Herranz and E. Kiltz. On the
Generic Construction of Identity-Based Signatures with Additional
Properties.
In Proceedings of the 11th International Conference on the Theory and
Application of Cryptology and Information Security, ASIACRYPT 2006,
Shanghai, China. Lecture Notes in Computer Science 4284 (2006) 178–193.
- with R. Corin and J-H. Hoepman. Securing data accountability in decentralized systems.
In Proceedings of 1st International Workshop on Information Security,
IS'06 (in conjunction with OTM Workshops 2006). Montpellier, France,
2006. Lecture Notes in Computer Science 4277 (2006) 626-635.
- with E. Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles.
In Proceedings of 5th Conference on Security and Cryptography for
Networks, SCN 2006. Maiori, Italy, 2006. Lecture Notes in Computer
Science 4116 (2006) 173-185.
- with J. Herranz. A Generic Construction for
Token-Controlled Public Key Encryption. In Proceedings
of 10th Financial Cryptography and Data Security Conference, FC 2006. Anguilla, British West Indies, 2006. Lecture
Notes in Computer Science 4107 (2006) 177–190.
- with E. Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles.
In Proceedings of 11th Australasian Conference on Information Security
and Privacy, ACISP 2006. Melbourne, Australia, 2006. Lecture Notes in
Computer Science 4058 (2006) 336-347.
- with P. Morillo and C. Rafols. Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes.
In Proceedings of Third European PKI Workshop: theory and practice,
EuroPKI 2006. Torino, Italy, 2006. Lecture Notes in Computer Science
4043 (2006) 81-91.
- A Separation between Selective and Full-identity Security Notions for Identity-based Encryption.
The 2006 International Conference on Computational Science and its
Applications, ICCSA 2006. Glasgow, United Kingdom. Lecture Notes in
Computer Science 3982 (2006) 318-326.
- with N. Attrapadung, Y. Cui, G. Hanaoka, I. Hasuo, H. Imai, K. Matsuura, P. Yang and R. Zhang. Relations among notions of security for identity based encryption schemes. In Proceedings
of 7th Latin American Theoretical Informatics Symposium, LATIN 2006. Valdivia, Chile, 2006. Lecture
Notes in Computer Science 3887 (2006) 130-141.
- with S. Martín, P. Morillo and J. L. Villar. Fujisaki-Okamoto
Hybrid Encryption Revisited. International
Journal of Information Security, Springer. Volume 4, Number 4 (2005) 228 - 241. (pdf)
- Boneh-Franklin Identity Based Encryption Revisited. In Proceedings
of 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005. Lisboa, Portugal 2005. Lecture
Notes in Computer Science 3580 (2005) 791-802. (pdf)
- with S. Martín and J. L. Villar. The security of PSEC-KEM versus ECIES-KEM. Full version. In Proceedings of 26th Symposium on Information Theory in the BeNeLux, Brussels, Belgium (2005) 17-27. (pdf)
- with J. L. Villar. An instantiation of the Cramer-Shoup
encryption paradigm using bilinear map groups. In Proceedings of Workshop on
Mathematical Problems and Techniques in Cryptology, Bellaterra, Spain (2005). (pdf)
- with S. Martín, T.
Takagi and J. L. Villar. A provably
secure elliptic curve scheme with fast encryption. In Proceedings
of INDOCRYPT 2004, Chennai, India.
Lecture Notes in Computer Science 3348 (2004) 245-259.
(pdf)
- with S. Martín, P. Morillo and J. L. Villar. Easy Verifiable Primitives and Practical Public Key Cryptosystems In Proceedings
of Information Security Conference 2003, ISC 2003. Bristol, United
Kingdom 2003. Lecture
Notes in Computer Science 2851 (2003) 69-83. (pdf)
- with S. Martín, P. Morillo and J. L. Villar. An IND-CPA cryptosystem
from Demytko's primitive. In Proceedings of
2003 IEEE Information Theory
Workshop (2003) 167-170. IEEE press. (pdf)
- with S. Martín, P. Morillo and J. L. Villar. An efficient semantically
secure elliptic curve cryptosystem based on KMOV. In Proceedings of
International Workshop on Coding and Cryptography WCC 2003, pp. 213-221. (pdf)
- with S. Martín, P. Morillo and J. L. Villar. A Practical Public
Key Cryptosystem from Paillier and Rabin Schemes. In Proceedings of
Public Key Cryptography PKC 2003. Miami, USA 2003. Lecture
Notes in Computer Science 2567 (2003) 279-291. (pdf)
Preprints
Theses
Design and
Analysis of Semantically Secure Public Key Encryption Schemes. PhD Thesis,
Universitat Politècnica de Catalunya (2004). Advisor: Sebastià
Martín.
Constructions with ruler and compass on the lemniscate (in catalan). Master Thesis,
Universitat Politècnica de Catalunya (1999). Advisor: J.C. Lario.
Previous research positions
(2007) Postdoc at Crypto Team,
Computer Science Department,
Ecole Normale Superieure.
(2004-2006) Postdoc at Security of Systems,
Institute for Computing and Information Sciences,
Radboud University
Nijmegen.
(2001-2004) PhD
student and junior researcher at Research
Group on Mathematics Applied to Cryptography, Department of Applied Mathematics IV, Universitat Politècnica de Catalunya.
Others
Last updated: June 3, 2008.