Two-party ECDSA from hash proof systems and efficient instantiations G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
85 2019 Bandwidth-efficient threshold EC-DSA G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
84 2020 Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2018
52 2018 Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Theoretical Computer Science 939, 78-104, 2023
18 2023 Additive-homomorphic functional commitments and applications to homomorphic signatures D Catalano, D Fiore, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
11 2022 Threshold Linearly Homomorphic Encryption on G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
9 2022 Ring signatures with user-controlled linkability D Fiore, L Garms, D Kolonelos, C Soriente, I Tucker
European Symposium on Research in Computer Security, 405-426, 2022
3 2022 Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups I Tucker
Université de Lyon, 2020
3 2020 Efficient zero-knowledge proofs on signed data with applications to verifiable computation on data streams D Fiore, I Tucker
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
1 2022 Hardware security without secure hardware: How to decrypt with a password and a server O Blazy, L Brouilhet, C Chevalier, P Towa, I Tucker, D Vergnaud
Theoretical Computer Science 895, 178-211, 2021
1 2021 Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe I Tucker
Lyon, 2020
1 2020 A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency G Castagnos, F Laguillaumie, I Tucker
Theoretical Computer Science 914, 84-113, 2022
2022