Segui
ida tucker
Titolo
Citata da
Citata da
Anno
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
872020
Two-party ECDSA from hash proof systems and efficient instantiations
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
872019
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2018
572018
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Theoretical Computer Science 939, 78-104, 2023
192023
Additive-homomorphic functional commitments and applications to homomorphic signatures
D Catalano, D Fiore, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
142022
Threshold Linearly Homomorphic Encryption on 
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
122022
Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups
I Tucker
Université de Lyon, 2020
42020
Ring signatures with user-controlled linkability
D Fiore, L Garms, D Kolonelos, C Soriente, I Tucker
European Symposium on Research in Computer Security, 405-426, 2022
32022
Efficient zero-knowledge proofs on signed data with applications to verifiable computation on data streams
D Fiore, I Tucker
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
22022
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency
G Castagnos, F Laguillaumie, I Tucker
Theoretical Computer Science 914, 84-113, 2022
12022
Hardware security without secure hardware: How to decrypt with a password and a server
O Blazy, L Brouilhet, C Chevalier, P Towa, I Tucker, D Vergnaud
Theoretical Computer Science 895, 178-211, 2021
12021
Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe
I Tucker
Lyon, 2020
12020
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
L Braun, G Castagnos, I Damgård, F Laguillaumie, K Melissaris, C Orlandi, ...
Cryptology ePrint Archive, 2024
2024
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–13