IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
26 May 2018
Mriganka Mandal, Ratna Dutta
Gilad Asharov, Gil Segev, Ido Shahaf
We establish tight bounds on the tradeoff between the space overhead, locality and read efficiency of SSE schemes within two general frameworks that capture the memory access pattern underlying all existing schemes. First, we introduce the ``pad-and-split'' framework, refining that of Cash and Tessaro while still capturing the same existing schemes. Within our framework we significantly strengthen their lower bound, proving that any scheme with locality $L$ must use space $\Omega ( N \log N / \log L )$ for databases of size $N$. This is a tight lower bound, matching the tradeoff provided by the scheme of Demertzis and Papamanthou (SIGMOD '17) which is captured by our pad-and-split framework.
Then, within the ``statistical-independence'' framework of Asharov et al. we show that their lower bound is essentially tight: We construct a scheme whose tradeoff matches their lower bound within an additive $O(\log \log \log N)$ factor in its read efficiency, once again improving upon the existing schemes. Our scheme offers optimal space and locality, and nearly-optimal read efficiency that depends on the frequency of the queried keywords: For a keyword that is associated with $n = N^{1 - \epsilon(n)}$ document identifiers, the read efficiency is $\omega(1) \cdot \epsilon(n)^{-1}+ O(\log\log\log N)$ when retrieving its identifiers (where the $\omega(1)$ term may be arbitrarily small, and $\omega(1) \cdot \epsilon(n)^{-1}$ is the lower bound proved by Asharov et al.). In particular, for any keyword that is associated with at most $N^{1 - 1/o(\log \log \log N)}$ document identifiers (i.e., for any keyword that is not exceptionally common), we provide read efficiency $O(\log \log \log N)$ when retrieving its identifiers.
Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
We devise an information-theoretic technique that converts any correct, but not necessarily private, two-party protocol that assumes reliable channels, into a protocol which is both correct and private against semi-honest adversaries, assuming BSC channels alone. Our results also apply to other types of noisy-channels such as the elastic-channel.
Our construction combines tools from the cryptographic literature with tools from the literature on interactive coding, and achieves, to our knowledge, the best known communication overhead. Specifically, if $f$ is given as a circuit of size $s$, our scheme communicates $O(s + \kappa)$ bits for $\kappa$ a security parameter. This improves the state of the art (Ishai et al., CRYPTO' 11) where the communication is $O(s) + \text{poly}(\kappa \cdot \text{depth}(s))$.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
In this paper, we continue to study the symmetric ciphers against quantum attackers. First, we convert the classical advanced slide attacks (introduced by Biryukov and Wagner) to a quantum one, that gains an exponential speed-up of the time complexity. Thus, we could break 2/4K-Feistel and 2/4K-DES in polynomial time. Second, we give a new quantum key-recovery attack on full-round GOST, a Russian standard, with $2^{112}$ Grover iterations, which is faster than a quantum brute force search attack by a factor $2^{16}$.
Gideon Samid
Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye
Singapore, Singapore, 17 November 2018
Submission deadline: 7 August 2018
Notification: 4 September 2018
Buenos Aires, Argentina, 30 July - 3 August 2018
25 May 2018
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
Old Dominion University
The incumbent is expected to participate in the cybersecurity research lab at VMASC led by Dr. Sachin Shetty
Responsibilities include conducting fundamental research in Blockchain for IoT security and publishing in leading conferences and journals, participation in proposal development, and some supervision of graduate students. This position is ideally suited for a recent Ph.D. graduate who plans to pursue a future research career. A completed Ph.D. degree in ECE or CS is required by the time of the appointment. Solid background in network security, distributed systems, protocols and algorithms, is highly desirable.
Closing date for applications: 30 July 2018
Contact: Sachin Shetty, Ph.D.
Associate Professor
Virginia Modeling, Analysis and Simulation Center
Center for Cybersecurity Education and Research
Dept. of Modeling, Simulation and Visualization Engineering
Old Dominion University
1030 University Blvd
Suffolk, VA 23435
Email- sshetty (at) odu.edu
Web: https://www.odu.edu/~sshetty
More information: http://www.lions.odu.edu/~sshetty/PostDoc_ODU_2018.htm
Norwegian University of Science and Technology (NTNU)
The applicants should have a master’s degree in mathematics, computer science, communications technology or related areas with an average grade of B or better. Candidates completing their MSc degree in the Spring 2018 are encouraged to apply.
Knowledge in cryptography and strong programming skills is desirable.
Closing date for applications: 10 June 2018
Contact: For further information about the position, please contact Professor Danilo Gligoroski, danilog (at) ntnu.no
More information: https://www.jobbnorge.no/en/available-jobs/job/153395/
24 May 2018
Barcelona, Spain, 6 September - 7 September 2018
Submission deadline: 16 June 2018
Notification: 16 July 2018
San Francisco, USA, 4 March - 8 March 2019
Submission deadline: 14 September 2018
Notification: 19 November 2018
23 May 2018
University of Surrey, Surrey Centre for Cyber Security, UK
Successful applicants will have core skills in key management and network authentication standards (e.g. IPSEC) and wireless communications. Experience in tunnelling techniques is advantageous (e.g. L2TP or GRE). A PhD and/or industrial experience would be desirable since the project is research oriented and in collaboration with industry. A graduate with an appropriate background would also be considered.
The successful applicant will be working under supervision of Dr Helen Treharne and Dr Mark Manulis and will benefit from the environment provided by the Surrey Centre for Cyber Security, an Academic Centre of Excellence in Cyber Security Research recognized by the British Government.
Salary: 31604 GBP – 34520 GBP depending on qualifications
Expected start date: 1 August 2018
Applicants should submit their applications through the University portal via: https://jobs.surrey.ac.uk/vacancy.aspx?ref=038718
Closing date for applications: 20 June 2018
Contact: Dr. Mark Manulis --- m.manulis (at) surrey.ac.uk
More information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=038718
Norwegian University of Science and Technology (NTNU)
We are entering the era of the Internet of Things (IoT). The IoT connects not only classical computing and communication devices, but all kinds of other gadgets that we use in our everyday lives. For IoT, security concerns go beyond traditional privacy or denial of service; also the immediate physical security of humans is at stake, and the cost of security failures becomes much more severe. Moreover, the IoT will be comprised of heterogeneous and lightweight devices, many of which may be unable to perform the complex computations required by modern security protocols.
The constrained IoT environment poses novel challenges for cryptographic protocol design and analysis. The PhD fellow will study protocols implementing either traditional trusted third party trust mechanism and/or newer (but less well-understood) notions of distributed trust. In both cases the protocols will rely on quantum-safe primitives. Of particular interest is the construction of security proofs for such light-weight protocols, requiring tight proofs as well as high assurance (e.g. automatic verification of security proofs).
Closing date for applications: 18 June 2018
Contact: Professor Kristian Gjøsteen (kristian.gjosteen (at) ntnu.no)
More information: https://www.jobbnorge.no/ledige-stillinger/stilling/153293/
Norwegian University of Science and Technology
Traditional voting has some significant limitations. From a security viewpoint, it has relied heavily on trust in the election officials, which in turn restricts independent verifiability and high assurance regarding confidentiality of votes. In addition, traditional voting has problems regarding errors in counting, accessibility, and timeliness.
Although cryptographic voting systems have been proposed almost 30 years ago, and deployed in many countries more recently, there remain major obstacles to their widespread adoption. As we have seen in recent years, voting systems sometimes fail and they are susceptible to a range of attacks, even in established democracies.
This project will investigate the security of voting systems and increase our assurance in state-of-the-art voting systems. In particular, the project will study user confidence in cryptographic voting systems, security proofs for such systems, as well as options for long-term security (including post-quantum security).
Security proofs will be a particular focus for one PhD fellow, while long-term security will be a particular focus for the other PhD fellow.
Closing date for applications: 18 June 2018
Contact: Professor Kristian Gjøsteen (kristian.gjosteen (at) ntnu.no), or Professor Colin Boyd (colin.boyd (at) ntnu.no).
More information: https://www.jobbnorge.no/ledige-stillinger/stilling/153300/
Norwegian University of Science and Technology
Traditional voting has some significant limitations. From a security viewpoint, it has relied heavily on trust in the election officials, which in turn restricts independent verifiability and high assurance regarding confidentiality of votes. In addition, traditional voting has problems regarding errors in counting, accessibility, and timeliness.
Although cryptographic voting systems have been proposed almost 30 years ago, and deployed in many countries more recently, there remain major obstacles to their widespread adoption. As we have seen in recent years, voting systems sometimes fail and they are susceptible to a range of attacks, even in established democracies.
This project will investigate the security of voting systems and increase our assurance in state-of-the-art voting systems. In particular, the project will study user confidence in cryptographic voting systems, security proofs for such systems, as well as options for long-term security (including post-quantum security).
Closing date for applications: 18 June 2018
Contact: Professor Kristian Gjøsteen (kristian.gjosteen (at) ntnu.no) or Professor Colin Boyd (colin.boyd (at) ntnu.no).
More information: https://www.jobbnorge.no/ledige-stillinger/stilling/153320/
University of Surrey, Surrey Centre for Cyber Security & Surrey Space Centre, UK
The project is funded by the NCC Group and aims to develop understanding of security risks and requirements associated with the use of commercial off-the-shelf components (incl. operating systems and software) in satellites and ground control systems, identify weaknesses and vulnerabilities in existing single and multi-satellite architectures and communication protocols, and propose mitigating countermeasures. An appropriate test-bed facility will be developed as part of this project.
Successful applicants are expected to be familiar with:
• Linux-based OS systems, incl. kernel programming
• System- / network-level attacks (e.g. buffer overflows, command injection), penetration testing
• Programming languages: C/C++, Assembly, or Python
We particularly welcome applications from ongoing students who are projected to complete their degree in 2018.
This PhD studentship includes a tax-free PhD stipend of GBP 20,000 per year for 3.5 years of PhD studies. This stipend is significantly higher than an average PhD stipend in the UK. Additional funding is available to support conference travel, etc.
Closing and starting dates: This is a “rolling advert” with a nominal closing date. Applications are welcome at any time and the timing of the selection process will be dependent on the applications received. Planned start date is October 2018.
Applications should be sent via https://jobs.surrey.ac.uk/Vacancy.aspx?id=4966
Closing date for applications: 30 September 2018
Contact: Informal inquiries can be directed to Dr Mark Manulis (m.manulis (at) surrey.ac.uk)
More information: https://jobs.surrey.ac.uk/Vacancy.aspx?id=4966