IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
06 July 2018
Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
Shuhong Gao
05 July 2018
The University of Auckland, New Zealand
Project Aim
The aim of the project is to develop practical obfuscation techniques based on a theoretical foundation.
The theoretical work will be led by Prof Steven Galbraith while Associate Prof. Giovanni Russello will lead the practical aspects.
Experience
The ideal candidate will have an undergraduate degree in computer science, engineering or mathematics and have written a master thesis in some topic related to security, cryptography, or the underlying mathematics. We are looking for candidates with experience in some or all of the following:
- Hands-on experience with standard obfuscators and de-obfuscator tools
- Understanding of cryptography and its applications
- Understanding of ARM and/or X86 architecture and respective instruction set
- Experience in coding in C/C++ and assembly
- Understanding of compilers and run-time code optimisations
Application Process:
Please send an email to g.russello (at) auckland.ac.nz with a short CV and an unofficial transcript of grades in your degree.
Successful applicants will be asked to provide further information (such as an IELTS English language test and official transcripts of their degrees) at a later stage of the application process.
Closing date for applications: 2 September 2018
Contact: g.russello (at) auckland.ac.nz
The University of Auckland, New Zealand
Applicants are required to have completed (or be close to completing) a Master degree (or equivalent) with outstanding grades in Computer Science, Mathematics, or closely related areas. Additional knowledge in related disciplines such as, e.g., complexity theory or IT security is welcome.
The candidate should be able not only to design but also implement working prototypes of the crypto scheme developed during the research period. Good knowledge of C/C++ and Linux is a must.
The STRATUS project will provide a stipend of 27,000 NZD p.a. and cover the costs of the tuition fee for 3 years.
Closing date for applications: 31 December 2018
Contact: Dr. Giovanni Russello
University of Luxembourg/ Centre for Security and Trust
The Applied Security and Information Assurance (APSIA) research group, headed by Prof P Y A Ryan, invites applications for two PhD and two post-doc positions, details below. The APSIA team of SnT is a dynamic and growing research group, some 20 strong, conducting research on security-critical systems, information assurance, cryptography, crypto protocols and privacy.
The Interdisciplinary Centre for Security, Reliability and Trust (SnT) carries out interdisciplinary research in secure, reliable and trustworthy ICT systems and services, often in collaboration with industrial, governmental and international partners.
The successful candidate will join the APSIA group and will be part of the joint Luxembourg National Research Fund (FNR) and Norwegian RCN project “SURCVS” and will conduct research on the design and evaluation of secure yet usable voting systems. The project will be conducted jointly with the NTNU in Oslo. The candidate will be supervised by Prof. Peter Y. A. Ryan and Dr. Peter Roenne.
The candidate’s tasks include the following:
Conducting research on the following topics in verifiable, coercion resistant voting systems:
Formal definitions of relevant properties such verifiability, privacy, receipt-freeness and coercion resistance.
Modelling complex socio-technical systems, taking account of human aspects of security and trust.
Exploring quantum-safe algorithms and everlasting privacy for voting systems.
Providing guidance to M.Sc. students
Disseminating results through scientific publications and talks at conferences
Closing date for applications: 20 July 2018
Contact: peter.ryan (at) ui.lu or peter.roenne (at) uni.lu
More information: http://emea3.mrted.ly/1vjtw
University of Luxembourg/ Centre for Security and Trust
The Applied Security and Information Assurance (APSIA) research group, headed by Prof P Y A Ryan, invites applications for two PhD and two post-doc positions, details below. The APSIA team of SnT is a dynamic and growing research group, some 20 strong, conducting research on security-critical systems, information assurance, cryptography, crypto protocols and privacy.
The position will be for an initial two year, but potentially extendable to five years.
See also: https://wwwen.uni.lu/snt/research/apsia/we_are_hiring
The Interdisciplinary Centre for Security, Reliability and Trust (SnT) carries out interdisciplinary research in secure, reliable and trustworthy ICT systems and services, often in collaboration with industrial, governmental and international partners.
The successful candidate will join the APSIA group led by Prof. Peter Y. A. Ryan. The candidate will be part of the joint Luxembourg National Research Fund (FNR) and Norwegian RCN project “SURCVS” and will conduct research on the design and evaluation of secure yet usable voting systems. The project will be conducted jointly with the NTNU in Oslo. The candidate’s tasks include the following:
Conducting research on the following topics in verifiable, coercion resistant voting systems:
Formal definitions of relevant properties such as verifiability, privacy, receipt-freeness and coercion resistance.
Modelling complex socio-technical systems, taking account of human aspects of security and trust.
Exploring quantum-safe algorithms and everlasting privacy for voting systems.
Coordinating research projects and delivering outputs
Collaborating with partners in the SURCVS project
Providing guidance to PhD and MSc students
Disseminating results through scientific publications
Closing date for applications: 20 July 2018
Contact: Peter.Ryan (at) uni.lu or Peter.Roenne (at) uni.lu.
More information: http://emea3.mrted.ly/1vjs5
Information Assurance Platform (IAP)
This position is available full time or part time, on a work remotely basis (telecommuting).
The position is focused on computational integrity and privacy systems for providing tools to enhance corporate and organisational transparency with data privacy and confidentiality.
Applicants should be familiar with cutting edge scalable computational integrity and privacy research and other systems of CIP such as PCP, LPCP, MPC, KOE based systems, CLP, pairing based systems (KOE or otherwise), IP, IVC, and the state of the art including zero knowledge proofs as applicable.
The position is not required to invent, recreate or improve existing cryptography; rather, to research, understand, explain and translate, and knowledge transfer to other positions within the company for practical use in applications.
All applicants are welcome.
Closing date for applications: 30 December 2018
Contact: Please share your professional details to team [at] iap.network. All information held in strictest confidence.
More information: https://iap.network
03 July 2018
Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
Tomer Ashur, Raluca Posteuca
29 June 2018
Kos, Greece, 16 September - 21 September 2018
Tel Aviv, Israel, 17 June - 20 June 2019
Submission deadline: 28 February 2019
Taipei, Taiwan , 4 December - 7 December 2018
Submission deadline: 30 June 2018
Notification: 15 August 2018
28 June 2018
Old Dominion University
The incumbent is expected to participate in the cybersecurity research lab at VMASC led by Dr. Sachin Shetty
Responsibilities include conducting fundamental research in IoT security and publishing in leading conferences and journals, participation in proposal development, and some supervision of graduate students. This position is ideally suited for a recent Ph.D. graduate who plans to pursue a future research career. A completed Ph.D. degree in ECE or CS is required by the time of the appointment. Solid background in network security, game theory, distributed systems, protocols and algorithms, is highly desirable.
Closing date for applications: 1 September 2018
Contact: Dr. Sachin Shetty (sshetty (at) odu.edu)
More information: http://ww2.odu.edu/~sshetty/PostDoc_Cyber_2018.htm
27 June 2018
Christopher Patton, Thomas Shrimpton
26 June 2018
Shweta Agrawal
1. Bootstrapping. In a recent work, Lin and Tessaro [LT17] (LT) show that iO may be constructed using i) Functional Encryption (FE) for polynomials of degree $L$ , ii) Pseudorandom Generators (PRG) with blockwise locality $L$ and polynomial expansion, and iii) Learning With Errors (LWE). Since there exist constructions of FE for quadratic polynomials from standard assumptions on bilinear maps [Lin17, BCFG17], the ideal scenario would be to set $L=2$, yielding iO from widely believed assumptions.
Unfortunately, it was shown soon after [LV17,BBKK17 ] that PRG with block locality $2$ and the expansion factor required by the LT construction, concretely $\Omega(n \cdot 2^{b(3+\epsilon)})$, where $n$ is the input length and $b$ is the block length, do not exist. While [LV17, BBKK17] provided strong negative evidence for constructing iO based on bilinear maps, they could not rule out the possibility completely; a tantalizing gap has remained. Given the current state of lower bounds, the existence of $2$ block local PRG with expansion factor $\Omega(n \cdot 2^{b(1+\epsilon)})$ remains open, although this stretch does not suffice for the LT bootstrapping, and is hence unclear to be relevant for iO.
In this work, we improve the state of affairs as follows.
(a) Weakening requirements on PRGs: In this work, we show that the narrow window of expansion factors left open by lower bounds do suffice for iO . We show a new method to construct FE for $NC_1$ from i) FE for degree $L$ polynomials, ii) PRGs of block locality $L$ and expansion factor $\Omega(n \cdot 2^{b(1+\epsilon)})$, and iii) LWE (or RLWE ). Our method of bootstrapping is completely different from all known methods. This re-opens the possibility of realizing iO from $2$ block local PRG, SXDH on Bilinear maps and LWE.
(b)Broadening class of sufficient PRGs: Our bootstrapping theorem may be instantiated with a broader class of pseudorandom generators than hitherto considered for iO, and may circumvent lower bounds known for the arithmetic degree of iO -sufficient PRGs [LV17 , BBKK17]; in particular, these may admit instantiations with arithmetic degree $2$, yielding iO with the additional assumptions of SXDH on Bilinear maps and LWE. In more detail, we may use the following two classes of PRG:
i) Non-Boolean PRGs: We may use pseudorandom generators whose inputs and outputs need not be Boolean but may be integers restricted to a small (polynomial) range. Additionally, the outputs are not required to be pseudorandom but must only satisfy a milder indistinguishability property. We tentatively propose initializing these PRGs using the multivariate quadratic assumption (MQ) which has been widely studied in the literature [MI88 , Wol05 , DY09] and against the general case of which, no efficient attacks are known.
ii) Correlated Noise Generators: We introduce an even weaker class of pseudorandom generators, which we call correlated noise generators (CNG) which may not only be non-Boolean but are required to satisfy an even milder (seeming) indistinguishability property.
(c) Assumptions and Efficiency. Our bootstrapping theorems can be based on the hardness of the Learning With Errors problem (LWE) or its ring variant (RLWE) and can compile FE for degree $L$ polynomials directly to FE for $NC_1$. Our method for bootstrapping to $NC_1$ does not go via randomized encodings as in previous works, which makes it simpler and more efficient than in previous works.
2. Instantiating Primitives. In this work, we provide the first direct candidate of FE for constant degree polynomials from new assumptions on lattices. Our construction is new and does not go via multilinear maps or graded encoding schemes as all previous constructions. Our construction is based on the ring learning with errors assumption (RLWE) as well as new untested assumptions on NTRU rings.
We provide a detailed security analysis and discuss why previously known attacks in the context of multilinear maps, especially zeroizing attacks and annihilation attacks, do not appear to apply to our setting. We caution that the assumptions underlying our construction must be subject to rigorous cryptanalysis before any confidence can be gained in their security. However, their significant departure from known multilinear map based constructions make them, we feel, a potentially fruitful new direction to explore. Additionally, being based entirely on lattices, we believe that security against classical attacks will likely imply security against quantum attacks.