or Ida Tucker
  1. About Me

    I am a Senior Cryptography Researcher at PQShield. I work on the construction of post-quantum protocols, which aim to be efficient enough for practical adoption.

    Prior to this, I was a Cryptography Engineer at Zondax AG working on embedded software allowing to provide ledger support for privacy preserving blockchain protocols; a Cryptography Engineer at Indra, looking into the use of advanced cryptography for a European Defense project; and a Post Doctoral researcher at the IMDEA Software Institute in Madrid under the direction of Dario Fiore, where I worked on the construction of provably secure advanced cryptographic primitives.

    I did my PhD at the LIP laboratory, ENS de Lyon, between October 2017 and October 2020, under the direction of Guilhem Castagnos and Fabien Laguillaumie. During my PhD, I worked on enriching the CL framework, a class group based framework allowing for the design of cryptographic protocols. I also designed advanced cryptosystems from this framework, such as functional encryption schemes computing the inner product functionality, and threshold signature protocols for the ECDSA signing algorithm.

  2. Publications

    International Journals

    1. A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency. G. Castagnos, F. Laguillaumie and I. Tucker. In Theor. Comput. Sci. 2022. [share link]

    2. Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server . O. Blazy, L. Brouilhet, C. Chevalier, P. Towa, I. Tucker, and D. Vergnaud. In Theor. Comput. Sci. 2021. [share link] [open access]

    International Conferences

    1. Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures. S. Katsumata, G. Niot, I. Tucker and T. Wiggers In USENIX Security 2025. [open access]

    2. An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. L. Braun, G. Castagnos, I. Damgård, F. Laguillaumie, K. Melissaris, C. Orlandi and I. Tucker. In Security and Cryptography for Networks. SCN 2024. [open access]

    3. Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures. D. Catalano, D. Fiore and I. Tucker. In Proc. of Asiacrypt 2022.

    4. Threshold Linearly Homomorphic Encryption on Z/2^kZ. G. Castagnos, F. Laguillaumie and I. Tucker. In Proc. of Asiacrypt 2022. [open access]

    5. Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. D. Fiore and I. Tucker. In ACM CCS 2022.

    6. Ring Signatures with User-Controlled Linkability. D. Fiore, L. Garms, D. Kolonelos, C. Soriente and I. Tucker. In Computer Security – ESORICS 2022. [share link]

    7. Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p. G. Castagnos, F. Laguillaumie and I. Tucker. In Proc. of Asiacrypt 2018. Copyright IACR [open access]

    8. Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations. D. Catalano, G. Castagnos, F. Laguillaumie, F. Savasta and I. Tucker. In Proc. of CRYPTO 2019. Copyright IACR [open access]

    9. Bandwidth-efficient threshold EC-DSA. D. Catalano, G. Castagnos, F. Laguillaumie, F. Savasta and I. Tucker. In Proc. of PKC 2020. Copyright IACR [open access]

  3. Teaching

    2019-2020

    2018-2019

    2017-2018

    2016-2017

pic