IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
04 June 2018
Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
Gil Segev, Ido Shahaf
This unsettling state of affairs was recently changed by Chenette et al. (FSE '16), who rigorously relaxed the above ``best-possible'' notion and constructed a scheme satisfying it based on any pseudorandom function. In addition to revealing the ordering of any two encrypted plaintexts, ciphertexts in their scheme reveal only the position of the most significant bit on which the plaintexts differ. A significant drawback of their scheme, however, is its substantial ciphertext expansion: Encrypting plaintexts of length $m$ bits results in ciphertexts of length $m \cdot \ell$ bits, where $\ell$ determines the level of security (e.g., $\ell = 80$ in practice).
In this work we prove a lower bound on the ciphertext expansion of any order-preserving encryption scheme satisfying the ``limited-leakage'' notion of Chenette et al. with respect to non-uniform polynomial-time adversaries, matching the ciphertext expansion of their scheme up to lower-order terms. This improves a recent result of Cash and Zhang (ePrint '17), who proved such a lower bound for schemes satisfying this notion with respect to computationally-unbounded adversaries (capturing, for example, schemes whose security can be proved in the random-oracle model without relying on cryptographic assumptions). Our lower bound applies, in particular, to schemes whose security is proved in the standard model.
Mridul Nandi
In this paper, we show that the Bernstein bound is tight by describing two attacks (one in the ``chosen-plaintext model" and other in the ``known-plaintext model") which recover the hash-key (hence forges) with probability at least $\frac{1}{2}$ based on $\sqrt{n} \times 2^{n/2}$ message-tag pairs. We also extend the forgery adversary to the Galois Counter Mode (or GCM). More precisely, we recover the hash-key of GCM with probability at least $\frac{1}{2}$ based on only $\sqrt{\frac{n}{\ell}} \times 2^{n/2}$ encryption queries, where $\ell$ is the number of blocks present in encryption queries.
02 June 2018
Abertay University (Dundee Scotland)
The University now seeks to appoint two Lecturers in Computing and Cybersecurity within the Division of Cybersecurity, part of the School of Design and Informatics.
The School of Design and Informatics is the home of Abertay’s undergraduate and postgraduate degree programmes in games, digital arts, cybersecurity and applied computer science. Abertay was the first university to offer degrees in Computer Games Technology and Ethical Hacking, and the School continues to be recognised as an international leader in its fields. The School has long-established professional links with Dundee’s thriving computer games community and the UK\'s cybersecurity community.
The Division of Cybersecurity is Abertay\'s centre for teaching and research in applied computing and cybersecurity, with particular interests in ethical hacking, digital forensics, IoT and secure software development. Reporting to the Head of Division, you will provide high-quality, research-informed teaching across all of our degree programmes, with a particular focus on specialist content within our Ethical Hacking and Computing degrees, and conduct internationally-recognised research that contributes to Abertay\'s strategic interests within the cybersecurity industries and wider digital sector.
The Lecturer in Computing and Cybersecurity will demonstrate relevant knowledge and practical ability in one or more of the following areas:, IoT, secure software development, Big Data for cybersecurity or AI for cybersecurity, ethical hacking or network security.
If you believe you have the skills and experience for this exciting and challenging role, please submit your application through our online recruitment system.
Closing date for applications: 29 June 2018
More information: https://www.jobs.ac.uk/job/BKB796/lecturer-in-computing-and-cybersecurity/
EMSEC team, IRISA, Rennes, France
- security proofs for lattice-based schemes,
- building and implementing lattice-based constructions,
- fully homomorphic encryption
The research will take place in the Embedded Security and Cryptography (EMSEC) team, within the IRISA computer science institute located in Rennes, France.
We are looking for candidates with a PhD in cryptography and with publications in cryptographic conferences.
To apply please send your detailed CV (with publication list), a motivation letter, and contact informations of at least two people who can provide reference letters.
The duration of the position is 2 years, it has flexible starting date (ideally between September and December). Review of applications will start immediately until the position is filled.
Closing date for applications: 31 August 2018
Contact: Adeline Roux-Langlois, adeline.roux-langlois (at) irisa.fr and Pierre-Alain Fouque, pierre-alain.fouque (at) irisa.fr
EPFL / Ecole Polytéchnique Fédérale de Lausanne
The Post-Doctoral Researcher will work closely with Prof. Ford, PhD and undergraduate students, senior researchers, and software engineers within the DEDIS lab, along with multiple external research and development partners from industry and academia. Some participation in teaching activities is also expected. Research activities will include notably the design, implementation, and experimental validation of state-of-the-art decentralized systems, including playing a core role in the ongoing design and development of DEDIS’s next-generation blockchain architecture and software infrastructure.
Closing date for applications: 31 July 2018
Contact: dedis (at) epfl.ch
More information: https://recruiting.epfl.ch/Vacancies/568/Description/2
30 May 2018
University of Luxembourg
The Ph.D. students and post-docs will be members of the Security and Trust (SnT) research center from the university of Luxembourg (>200 researchers in all aspects of IT security). We offer a competitive salary (about 34,000 euro/year gross for Ph.D, and 60,000 euro/year gros for post-doc). The duration of the position is 3 years (+ 1 year extension) for Ph.D., and 2.5 years for post-doc.
Profile:
For Ph.D. position: MSc degree or equivalent in Computer Science or in Mathematics.
For post-doc position: a PhD in cryptography, with publications in competitive cryptographic conferences
Candidates should submit the following documents:
- Motivation letter indicating your research interests.
- Curriculum vitae (including your contact address, work experience, publications)
- For Ph.D. position: transcripts of B.Sc. and M.Sc. grades
- For post-doc position: a short description of your PhD work (max 1 page).
- Contact information for 3 referees
Closing date for applications: 15 July 2018
Contact: Jean-Sebastien Coron - jean-sebastien.coron at uni dot lu
More information: http://www.crypto-uni.lu/vacancies.html
28 May 2018
Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
Our application of hardware modules is motivated by the fact that modules with very limited functionality can be implemented securely as fixed-function circuits and (formally) verified for correctness. They can therefore not be hacked remotely.
In comparison to the hardware tokens proposed by Katz at EUROCRYPT `07, our hardware modules are based on substantially weaker assumptions. Our hardware modules may be physically tampered. Hence, they cannot be passed to another (possibly malicious) party but only used and trusted by their owner. In particular, our remotely unhackable hardware modules do not constitute a setup for Universal Composability (UC).
Based on architectures with very few and very simple hardware modules, we are able to construct protocols that provide security against remote hacking if the hack occurs after a protocol party received its (first) input. More specifically, an adversary can neither learn nor change the inputs and outputs of a remotely hacked party in our constructions unless he has control over that party before it has received its (first) input (or controls all parties). In our constructions we assume erasing parties. However, we also show that this assumption can be substantially weakened.
Since the advantages provided by unhackable hardware modules cannot be adequately captured in existing composable security frameworks, we have conceived a new security framework based on the UC framework. We call our framework Fortified UC.
Onur G\"unl\"u, Tasnad Kernetzky, Onurcan I\c{s}can, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
Dana Dachman-Soled, Mukul Kulkarni
In this work, we ask if it is possible to construct CNMC from weaker assumptions. We answer this question by presenting lower as well as upper bounds. Specifically, we show that it is impossible to construct 2-split-state CNMC, with no CRS, for one-bit messages from any falsifiable assumption, thus establishing the lower bound. We additionally provide an upper bound by constructing 2-split-state CNMC for one-bit messages, assuming only the existence of a family of injective one way functions.
We also present a construction of 4-split-state CNMC for multi-bit messages in CRS model from the same assumptions. Additionally, we present definitions of the following new primitives: (1) One-to-one commitments, and (2) Continuous Non-Malleable Randomness Encoders, which may be of independent interest.
Cryptography, Security, and Privacy (CrySP), University of Waterloo
Applicants must hold a PhD in a related field, and should have a proven research record, as demonstrated by publications in top security and privacy or database venues (such as Oakland, CCS, SIGMOD, VLDB) and/or top venues specific to data security (such as DBSEC).
The start date of the position is negotiable. The position may be for one or two years.
Applicants should submit a CV, a research plan, two or three selected papers, and the names and contact information of three references. For further information about the position, or to apply, please send email to Florian Kerschbaum with \"Postdoctoral position\" in the subject line. Applications may be considered as they arrive.
Closing date for applications: 1 September 2018
Contact: Florian Kerschbaum with \"Postdoctoral position\" in the subject line. Applications may be considered as they arrive.
Cryptography, Security, and Privacy Research Group
David R. Cheriton School of Computer Science
University of Waterloo
Waterloo, Ontario, Canada N2L 3G1
Tel: 519-888-4567 x36163
Fax: 519-885-1208
More information: https://crysp.uwaterloo.ca/prospective/postdoc/
Cryptography, Security, and Privacy (CrySP), University of Waterloo
Applicants must hold a PhD in a related field, and should have a proven research record, as demonstrated by publications in top security and privacy venues (such as Oakland, CCS, USENIX Security, and NDSS) and/or top venues specific to privacy-enhancing technologies (such as PETS/PoPETs).
The start date of the position is negotiable. The position may be for one or two years.
Applicants should submit a CV, a research plan, two or three selected papers, and the names and contact information of three references.
Closing date for applications: 1 September 2018
Contact: Ian Goldberg with \"Postdoctoral position\" in the subject line. Applications may be considered as they arrive.
Cryptography, Security, and Privacy Research Group
David R. Cheriton School of Computer Science
University of Waterloo
Waterloo, Ontario, Canada N2L 3G1
Tel: 519-888-4567 x36163
Fax: 519-885-1208
More information: https://crysp.uwaterloo.ca/prospective/postdoc/
27 May 2018
Atsushi Takayasu, Noboru Kunihiro
26 May 2018
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz
Ben Fisch, Shashwat Silas
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
Weiqing You, Xiaoming Chen, Wenxi Li
James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
In this work, we demonstrate that all known zeroizing attacks on GGH15 implicitly construct algebraic relations between the results of zero-testing and the encoded plaintext elements. We then propose a ``GGH15 zeroizing model" as a new general framework which greatly generalizes known attacks.
Our second contribution is to describe a new GGH15 variant, which we formally analyze in our GGH15 zeroizing model. We then construct a new iO candidate using our multilinear map, which we prove secure in the GGH15 zeroizing model. This implies resistance to all known zeroizing strategies. The proof relies on the Branching Program Un-Annihilatability (BPUA) Assumption of Garg et al. [TCC 16-B] (which is implied by PRFs in NC^1 secure against P/Poly) and the complexity-theoretic p-Bounded Speedup Hypothesis of Miles et al. [ePrint 14] (a strengthening of the Exponential Time Hypothesis).