Ida Tucker

Orcid: 0000-0003-4895-5896

According to our database1, Ida Tucker authored at least 15 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Concrete Treatment of Signal Handshake's Deniability: Efficient Post-Quantum Deniable Ring Signature.
IACR Cryptol. ePrint Arch., 2025

2024
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

2023
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security.
Theor. Comput. Sci., 2023

2022
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency.
Theor. Comput. Sci., 2022

Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$.
IACR Cryptol. ePrint Arch., 2022

Ring Signatures with User-Controlled Linkability.
Proceedings of the Computer Security - ESORICS 2022, 2022

Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Threshold Linearly Homomorphic Encryption on bfZ/2<sup>kbfZ</sup>.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Hardware security without secure hardware: How to decrypt with a password and a server.
Theor. Comput. Sci., 2021

Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security.
IACR Cryptol. ePrint Arch., 2021

2020
Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups. (Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe).
PhD thesis, 2020

Bandwidth-Efficient Threshold EC-DSA.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018


  Loading...