IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 June 2018
Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
We also show that this result cannot be extended to primitives such as signature schemes and identification protocols: assuming the existence of one-way functions, such primitives can be made resilient to (\nicefrac{1}{\poly(n)})-tampering attacks where $n$ is the security~parameter.
weeve GmbH, Berlin, Germany
Smart Contracting and Blockchain applications (e.g. Ethereum, Hyperledger, Cardano),
Blockchain-enabled mechanism design and applications (e.g. graded token-curated registries),
Radically new voting schemes beyond “the richer get richer” (e.g. quadratic voting, token-curated voting),
Scalable consensus protocols ,
Cryptographic algorithms (e.g. NIZKs, SNARGs, STARKs) & privacy-enhancing/GDPR-friendly protocols (e.g. MPC,)
System Security (e.g. ARM Trustzone, Intel SGX)
We solicit applications at various entry levels, from junior to senior, covering the complete spectrum from full-time research to development. We also appreciate and support research internships of PhDs and PostDocs. We offer a competitive salary, an academic environment, and access to Berlin’s vibrant blockchain ecosystem. Weeve leaves much freedom for pursuing one’s own ideas and supports this with condensing research ideas into a PhD and disseminating those to the blockchain community (meetups, conferences, etc.).
Closing date for applications: 31 July 2018
Contact: For technical inquiries, please contact Prof. Dr. Sebastian Gajek: (sebastian.gajek (at) weeve.network)
For recruitment queries, contact NBT Tech Recruiter: Ayca (ayca.kuzuimamlar (at) nbt.ag).
More information: https://weeve.network
University of Versailles, France
The position is available immediately for one year, and is renewable, based on mutual interest and availability of funding. The starting date can be arranged as convenient.
The candidates are expected to:
- have completed their PhD degree in cryptography;
- have adequate cryptography research experience demonstrated through a strong publication record.
Applications should be sent via email and should include a CV, a list of publications, a short research proposal, and contact information for one or two persons who are willing to give references.
Closing date for applications: 30 June 2018
Contact: Contact: Prof. Louis Goubin, Louis.Goubin (at) uvsq.fr
More information: http://lmv.math.cnrs.fr/equipes/crypto/
12 June 2018
Sadegh Sadeghi, Nasour Bagheri
Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
Sergey Agievich
Sankhanil Dey, Ranjan Ghosh
Xiaoming Chen, Weiqing You
Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
In this paper we tackle this tension by proposing BISEN, a new provably-secure boolean searchable symmetric encryption scheme that improves these three complementary dimensions by exploring the design space of isolation guarantees offered by novel commodity hardware such as Intel SGX, abstracted as Isolated Execution Environments (IEEs). BISEN is the first scheme to enable highly expressive and arbitrarily complex boolean queries, with minimal leakage of information regarding performed queries and accessed data. Furthermore, by exploiting trusted hardware and the IEE abstraction, BISEN reduces communication costs between the client and the cloud, boosting query execution performance. Experimental validation and comparison with the state of art shows that BISEN provides better performance with enriched search semantics and security
Tapas Pal, Ratna Dutta
In this work, we give constructions of the following cryptographic primitives without using multilinear maps and instantiating obfuscation from randomized encoding: We construct witness PRFs using a puncturable pseudorandom function and sub-exponentially secure randomized encoding scheme in common reference string (CRS) model. A sub-exponentially secure randomized encoding scheme in CRS model can be achieved from a sub-exponentially secure public key functional encryption scheme and learning with error assumptions with sub-exponential hardness. We turn our witness PRF into a multi-relation witness PRF where one can use the scheme with a class of relations related to an NP language. Furthermore, we construct an offline witness encryption scheme using our proposed witness PRF. The offline witness encryption scheme of Abusalah et al. [AFP16] was built from a plain public-key encryption, a statistical simulation-sound non-interactive zero knowledge (SSS-NIZK) proof system and obfuscation. In their scheme, a(n) SSS-NIZK proof is needed for the encryption whose efficiency depends on the underlying public key encryption. We replace SSS-NIZK by our witness PRF and construct an offline witness encryption scheme. More precisely, our scheme is based on a public-key encryption, a witness PRF and employs a sub-exponentially secure randomized encoding scheme in CRS model instantiating obfuscation. Our offline witness encryption can be turned into an offline functional witness encryption scheme where decryption releases a function of a message and witness as output.
Yoshinori Aono, Phong Q. Nguyen, Takanobu Seito, Junji Shikata
Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
Our main idea is to generically combine two abstract encryption schemes that satisfies some special properties. We also gives an instantiation of our scheme by combining ElGamal scheme and Ring-LWE based homomorphic encryption scheme, whose ciphertext length is exactly $2\ell+1,$ for any degree $d.$
Mugurel Barcau, Vicentiu Pasol
Mugurel Barcau, Vicentiu Pasol
11 June 2018
PQShield Ltd., Oxford, UK.
We invite experts in PQ cryptography to join our team as (Senior) Cryptographic Researchers. Candidates are expected to have a PhD degree in any PQ cryptography field or the equivalent in industrial experience with a solid publication record.
The company is offering competitive packages in addition to the chance to be affiliated with the Mathematical Institute at the University of Oxford.
Closing date for applications: 15 August 2018
Contact: Interested candidates, please send your CVs to Ali El Kaafarani on elkaafarani (at) pqshield.com or elkaafarani (at) maths.ox.ac.uk
09 June 2018
National University of Singapore
Research Fellow
National University of Singapore
Description:
“NUS-Singtel Cyber Security R&D Lab” (http://nus-singtel.nus.edu.sg/) is a 5 years joint project with about SGD 43 mil (approximately USD 31 mil) of funds contributed by Singapore Telecommunications Limited (SingTel), National University of Singapore (NUS), and National Research Foundation (NRF) of Singapore. The R&D Lab will conduct research in four broad areas of cyber security having strategic relevance to Singtel’s business: (1) Predictive Security Analytics; (2) Network, Data and Cloud Security; (3) Internet-of-Things and Industrial Control Systems; (4) Future-Ready Cyber Security Systems.
NUS-SingTel Lab currently has one research fellow position with competitive pay. It is available to (fresh) PhD graduates in computer science/engineering from Singapore or overseas.
The Research Fellow will be responsible for working closely with the Principal Investigator and lab members on a new 3-year research project which just starts in June 2018. He/she should possess experience or interest in at least some of the following research areas:
• Key management, Authentication, Authorization and Access control
• Trusted computing (e.g. TPM, Intel SGX)
• Post-quantum cryptography
Job requirements:
• A PhD degree in a relevant area (Computer Science/Engineer, mathematics, etc);
• Good publication record in cyber security and crypto area
o Publication in Rank 1 Cyber Security or Crypto Conference, or AsiaCrypt, ESORICS, ACSAC, TCC, Euro S&P, etc;
• Good communication skills (English), self-motivated and good team players;
• Some experience in programming is a plus;
• Willing to perform practical research which may eventually lead to products
To apply for the above position, please send a copy of your recent CV to comxj (at) nus.edu.sg with an email subject “Application for RF”.
Closing date for applications: 31 December 2018
Contact: Dr Xu (comxj (at) nus.edu.sg)
More information: https://www.nus-singtel.nus.edu.sg/
07 June 2018
University of Birmingham, UK
Candidates should have a background including cyber security (e.g. good grades in cyber security modules, a strong cyber security final project, or being on a dedicated cyber security course). Given the focus of all three studentships on hardware and attacks, candidates should additionally have a demonstrable interest in and familiarity with hardware security, pentesting, embedded systems and/or side-channel attacks.
The available projects (with supervisors and stipends) are:
- Cyber Security for the Vehicles of Tomorrow (Flavio Garcia) £14,553 for 3 years
- User-controlled Hardware Security Anchors: Evaluation and Design (Mark Ryan, Flavio Garcia, David Oswald) £14,553 for 3 years
- BioLeak: Side-Channel Analysis of Fingerprint Matching Algorithms (David Oswald, Flavio Garcia) £22,000 for 3 years
- FaultFinder: from Faulty Output to Fault Model – an Automated Approach (David Oswald, Flavio Garcia) £22,000 for 3 years
For more information please contact the relevant supervisors or our centre administrator. Please note that for BioLeak and FaultFinder candidates must be UK citizens.
Closing date for applications: 25 June 2018
Contact: Garfield Benjamin (administrator) g.r.benjamin (at) cs.bham.ac.uk
Mark Ryan (Professor) m.d.ryan (at) cs.bham.ac.uk
Flavio Garcia (Professor) f.garcia (at) cs.bham.ac.uk
David Oswald (Lecturer) d.f.oswald (at) cs.bham.ac.uk
More information: https://sec.cs.bham.ac.uk/
Deparment of Computer Science, TU Darmstadt, Germany
We are offering three positions for Ph.D. candidates and Postdocs in the following areas:
- information-flow analysis techniques for object-oriented programs at the level of source code and bytecode based on compositional and precise verification techniques
- experimental analysis of side-channel vulnerabilities in cryptographic implementations and generation of attacks exploiting such vulnerabilities
- program analysis techniques for detecting side-channel vulnerabilities in cryptographic implementations and for assessing the seriousness of such vulnerabilities
The overall goal of our research at MAIS is to make software-based systems more trustworthy (i.e. secure, safe, and correct) than they are today. As software engineering is a complex and error-prone task,
we employ formal methods in combination with experiments for reasoning about software and critical system properties. We investigate software systems on the level of source code, bytecode, and machine code as well as on the level of more abstract system specifications. This allows us to provide support for security at different stages of software
development. At MAIS we are offering a productive and collaborative research environment in which you can discuss ideas with other team members working on related topics.
The positions are available immediately and applications will be considered until the positions are taken. These are positions with regular salary and social benefits based on TV-TUD. For more information and how to apply, see http://www.mais.informatik.tu-darmstadt.de/Positions.html.
Closing date for applications:
Valletta, Malta, 22 October - 26 October 2018
Submission deadline: 3 July 2018
Notification: 2 August 2018