IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 May 2018
Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier
As our main result, we present a linear correlation in the keystream of full MORUS, which can be used to distinguish its output from random and to recover some plaintext bits in the broadcast setting.For MORUS-1280, the correlation is $2^{-76}$, which can be exploited after around $2^{152}$ encryptions, less than would be expected for a 256-bit secure cipher. For MORUS-640, the same attack results in a correlation of $2^{-73}$, which does not violate the security claims of the cipher.
To identify this correlation, we make use of rotational symmetries in MORUS using linear masks that are invariant by word-rotations of the state.This motivates us to introduce single-word versions of MORUS called MiniMORUS, which simplifies the analysis. The attack has been implemented and verified on MiniMORUS, where it yields a correlation of $2^{-16}$.
We also study reduced versions of the initialization and finalization of MORUS, aiming to evaluate the security margin of these components.We show a forgery attack when finalization is reduced from 10 steps to 3, and a key-recovery attack in the nonce-misuse setting when initialization is reduced from 16 steps to 10.These additional results do not threaten the full MORUS, but studying all aspects of the design is useful to understand its strengths and weaknesses.
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
Benjamin Fuller, Lowen Peng
Noisy sources are measured from physical phenomena many of which best modeled by continuous metric spaces. To build continuous-source fuzzy extractors, prior work assumes that the system designer has a good model of the high (fuzzy) entropy distribution (Verbitskiy et al., IEEE TIFS 2010). However, it is impossible to build an accurate model of a high entropy distribution with oracle access to the distribution.
We show that model inaccuracy is a major hurdle to constructing a continuous-source fuzzy extractors. Namely, there exists a family of continuous distributions $\mathcal{W}$ such that each element $W\in\mathcal{W}$ has fuzzy min-entropy but no fuzzy extractor can produce a three bit key for an average element of $\mathcal{W}$. Our family is built from random $p$-ary lattices.
We also show a stronger negative result for secure sketches, which are used to construct most fuzzy extractors. Our results are for the Euclidean metric and are information-theoretic in nature. To the best of our knowledge all continuous-source fuzzy extractors argue information-theoretic security.
Fuller, Reyzin, and Smith showed negative results for a discrete metric space equipped with the Hamming metric (Asiacrypt 2016). The geometry of Euclidean space necessitates new techniques.
Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
We propose RapidChain, the first sharding-based public blockchain protocol that is resilient to Byzantine faults from up to a $1/3$ fraction of its participants, and achieves complete sharding of the communication, computation, and storage overhead of processing transactions without assuming any trusted setup. We introduce an optimal intra-committee consensus algorithm that can achieve very high throughputs via block pipelining, a novel gossiping protocol for large blocks, and a provably-secure reconfiguration mechanism to ensure robustness. Using an efficient cross-shard transaction verification technique, RapidChain avoids gossiping transactions to the entire network. Our empirical evaluations suggest that RapidChain can process (and confirm) more than 7,300 tx/sec with an expected confirmation latency of roughly 8.7 seconds in a network of 4,000 nodes with an overwhelming time-to-failure of more than 4,500 years.
Paulo Barreto, Glaucio Oliveira, Waldyr Benits
Ian McQuoid, Trevor Swope, Mike Rosulek
Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
Another fundamental area in cryptography is secure multi-party computation (MPC), which has been extensively studied for several decades. In this work, we initiate a formal study of the relationship between functional encryption (FE) combiners and secure multi-party computation (MPC). In particular, we show implications in both directions between these primitives. As a consequence of these implications, we obtain the following main results.
1) A two round semi-honest MPC protocol in the plain model secure against up to (n-1) corruptions with communication complexity proportional only to the depth of the circuit being computed assuming LWE. Prior two round protocols that achieved this communication complexity required a common reference string.
2) A functional encryption combiner based on pseudorandom generators (PRGs) in NC^1. Such PRGs can be instantiated from assumptions such as DDH and LWE. Previous constructions of FE combiners were known only from the learning with errors assumption. Using this result, we build a universal construction of functional encryption: an explicit construction of functional encryption based only on the assumptions that functional encryption exists and PRGs in NC^1.
Elise Barelli, Alain Couvreur
Serdar Boztas
Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
Cecilia Boschini, Jan Camenisch, Gregory Neven
Panjin Kim, Kyung Chul Jeong, Daewan Han
Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
In this paper, we provide a much tighter proof for the GPV-IBE in the QROM in the single-challenge setting. We also show that a slight variant of the GPV-IBE has an almost tight reduction in the multi-challenge setting both in the ROM and QROM, where the reduction loss is independent of the number of challenge ciphertext. Our proof departs from the traditional partitioning technique and resembles the approach used in the public key encryption scheme of Cramer and Shoup (CRYPTO, 1998). Our proof strategy allows the reduction algorithm to program the random oracle the same way for all identities and naturally fits the QROM setting where an adversary may query a superposition of all identities in one random oracle query. Notably, our proofs are much simpler than the one by Zhandry and conceptually much easier to follow for cryptographers not familiar with quantum computation. Although at a high level, the techniques used for the single and multi-challenge setting are similar, the technical details are quite different. For the multi-challenge setting, we rely on the Katz-Wang technique (CCS, 2003) to overcome some obstacles regarding the leftover hash lemma.
David W. Archer, Dan Bogdanov, Y. Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
Bart Mennink
Shoichi Hirose, Junji Shikata
Xiaofeng Xie, Tian Tian
Hua Dong, Li Yang
20 May 2018
Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast
The Centre for Secure Information Technologies (CSIT) is the UK national Innovation and Knowledge Centre for cyber security. With a remit to conduct world leading research into applied cryptography, network security and security analytics (Big Data) the centre also has responsibility to commercialise that research and support the growth of the cyber security industry in the UK
You will lead projects and initiatives that turn fundamental concepts into reliable maintainable code that is usable and extensible by the cryptographic community.
CSIT employs a team of 15 experienced product developers in both software and hardware systems to further develop these ideas into well-engineered prototypes and technology demonstrators.
The CSIT engineering function sits between in-house research teams and the R&D labs of our industrial partners such as BAE Systems, Thales, Infosys, Allstate, Direct Line Group, Seagate, First Derivatives etc.
CSIT hosts the UK Research Institute in Secure Hardware and Embedded systems (RISE) (www.ukrise.org).
In return you for your commitment you will be working on emerging technology and at the forefront of this innovation. QUB provides a strong commitment to professional development and opportunities for part time study and post-graduate research are available.
Closing date for applications: 13 June 2018
Contact: Gavin McWilliams, Director of Engineering, CSIT, QUB (Email: g.mcwilliams (at) qub.ac.uk)
More information: http://www.ecit.qub.ac.uk/Jobs/