David Galindo 


Postdoctoral Researcher
Software Engineering

Computer Science Department

University of Malaga

Contact Data

Address:

Email:




Research

Design and analysis of provably secure cryptographic protocols.

Program Committee

Main papers

The copyrights for journal and conference proceedings papers generally belong to the publisher.
  1.  with J. Baek, W. Susilo and J. Zhou. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). In Proceedings of the Sixth Conference on Security and Cryptography for Networks, SCN 2008, Amalfi, Italy. Lecture Notes in Computer Science, Springer. To appear.
  2.  with J. Herranz. On the security of public key cryptosystems with a double decryption mechanism. Information Processing Letters, Elsevier. To appear. (2008)
  3.  with F. D. Garcia and P. van Rossum. Computational Soundness of Non-Malleable Commitments. In Proceedings of the 4th Information Security Practice and Experience Conference, ISPEC 2008, Sydney, Australia. Lecture Notes in Computer Science 4991 (2008) 361-376
  4.  with P. Morillo and C. Rafols. Improved Certificate-Based Encryption in the Standard Model. Journal of Systems and Software, Vol 81/7 pp 1218-1226 (2008), Elsevier.
  5.  with J. Herranz and E. Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. In Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2006, Shanghai, China. Lecture Notes in Computer Science 4284 (2006) 178–193.
  6.  with R. Corin and J-H. Hoepman. Securing data accountability in decentralized systems. In Proceedings of 1st International Workshop on Information Security, IS'06 (in conjunction with OTM Workshops 2006). Montpellier, France, 2006. Lecture Notes in Computer Science 4277 (2006) 626-635.
  7.  with E. Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In Proceedings of 5th Conference on Security and Cryptography for Networks, SCN 2006. Maiori, Italy, 2006. Lecture Notes in Computer Science 4116 (2006) 173-185.
  8.  with J. Herranz. A Generic Construction for Token-Controlled Public Key Encryption. In Proceedings of 10th Financial Cryptography and Data Security Conference, FC 2006. Anguilla, British West Indies, 2006. Lecture Notes in Computer Science 4107 (2006) 177–190.
  9.  with E. Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In Proceedings of 11th Australasian Conference on Information Security and Privacy, ACISP 2006. Melbourne, Australia, 2006. Lecture Notes in Computer Science 4058 (2006) 336-347.
  10.  with P. Morillo and C. Rafols. Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In Proceedings of Third European PKI Workshop: theory and practice, EuroPKI 2006. Torino, Italy, 2006. Lecture Notes in Computer Science 4043 (2006) 81-91.
  11.  A Separation between Selective and Full-identity Security Notions for Identity-based Encryption. The 2006 International Conference on Computational Science and its Applications, ICCSA 2006. Glasgow, United Kingdom. Lecture Notes in Computer Science 3982 (2006) 318-326.
  12.  with N. Attrapadung, Y. Cui, G. Hanaoka, I. Hasuo, H. Imai, K. Matsuura, P. Yang and R. Zhang. Relations among notions of security for identity based encryption schemes. In Proceedings of 7th Latin American Theoretical Informatics Symposium, LATIN 2006. Valdivia, Chile, 2006. Lecture Notes in Computer Science 3887 (2006) 130-141.
  13.  with S. Martín, P. Morillo and J. L. Villar. Fujisaki-Okamoto Hybrid Encryption Revisited. International Journal of Information Security, Springer. Volume 4, Number 4 (2005) 228 - 241. (pdf)
  14.   Boneh-Franklin Identity Based Encryption Revisited. In Proceedings of 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005. Lisboa, Portugal 2005. Lecture Notes in Computer Science 3580 (2005) 791-802. (pdf)
  15.  with S. Martín and J. L. Villar. The security of PSEC-KEM versus ECIES-KEM. Full version. In Proceedings of 26th Symposium on Information Theory in the BeNeLux, Brussels, Belgium (2005) 17-27. (pdf)
  16.  with J. L. Villar. An instantiation of the Cramer-Shoup encryption paradigm using bilinear map groups. In Proceedings of Workshop on Mathematical Problems and Techniques in Cryptology, Bellaterra, Spain (2005). (pdf)
  17.  with S. Martín, T. Takagi and J. L. Villar. A provably secure elliptic curve scheme with fast encryption. In Proceedings of INDOCRYPT 2004, Chennai, India. Lecture Notes in Computer Science 3348 (2004) 245-259. (pdf)
  18.  with S. Martín, P. Morillo and J. L. Villar. Easy Verifiable Primitives and Practical Public Key Cryptosystems In Proceedings of Information Security Conference 2003,  ISC 2003. Bristol, United Kingdom 2003. Lecture Notes in Computer Science 2851 (2003) 69-83. (pdf)
  19.  with S. Martín, P. Morillo and J. L. Villar. An IND-CPA cryptosystem from Demytko's primitive. In Proceedings of 2003 IEEE Information Theory Workshop (2003) 167-170. IEEE press. (pdf)
  20.  with S. Martín, P. Morillo and J. L. Villar. An efficient semantically secure elliptic curve cryptosystem based on KMOV. In Proceedings of International Workshop on Coding and Cryptography WCC 2003, pp. 213-221. (pdf)
  21.  with S. Martín, P. Morillo and J. L. Villar. A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. In Proceedings of Public Key Cryptography PKC 2003. Miami, USA 2003. Lecture Notes in Computer Science 2567 (2003) 279-291. (pdf)

Preprints
Theses

Design and Analysis of Semantically Secure Public Key Encryption Schemes. PhD Thesis, Universitat Politècnica de Catalunya (2004). Advisor: Sebastià Martín.
Constructions with ruler and compass on the lemniscate (in catalan). Master Thesis, Universitat Politècnica de Catalunya (1999). Advisor: J.C. Lario.

Previous research positions

(2007) Postdoc at Crypto Team, Computer Science Department, Ecole Normale Superieure.
(2004-2006) Postdoc at Security of Systems, Institute for Computing and Information Sciences, Radboud University Nijmegen.
(2001-2004) PhD student and junior researcher at  Research Group on Mathematics Applied to Cryptography, Department of Applied Mathematics IV, Universitat Politècnica de Catalunya.



Others

Last updated:  June 3, 2008.