IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
13 July 2018
Ward Beullens, Bart Preneel, Alan Szepieniec
Cyril Bouvier, Laurent Imbert
Takanori Isobe, Kazuhiko Minematsu
Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
Paolo Santini, Edoardo Persichetti, Marco Baldi
12 July 2018
Toronto, Canada, 15 October 2018
Submission deadline: 16 July 2018
Notification: 13 August 2018
Information Assurance Platform (IAP)
This position is available full time or part time, on a work remotely basis (telecommuting).
The successful applicant is requested to support the written documentation of the project. The project aims to establish an open standard for the use of the platform (the IAP standard). Where applicable, cryptographic terms, algorithms, diagrams and other items will be required to be written to the current standards of the industry and to the standards of peer review.
The position will be responsible for the project documentation as it pertains to cryptography; to rewrite existing documentation in an expert manner, and to ensure that additional information is correct, useful, up to date and appropriate. Therefore, the position will be required to understand the goals and designs of the project intimately. Full support in gaining this understanding will be provided.
The cryptography in question is focused on computational integrity and privacy research, including zero knowledge proofs and succinct non interactive arguments of knowledge.
The position is not expected to create, invent, redesign or develop cryptography or cryptographic systems. Rather, to understand current research, explain, interpret and ultimately document the relevant cryptography as it pertains (or does nor pertain) to the design of systems of the platform.
All applicants are welcome.
Closing date for applications: 31 December 2018
Contact: Please contact team [at] iap.network. All information held in strictest confidence.
More information: https://iap.network
IBM Global Security Services
Position is located in the United States. Must be willing to travel 75% annually, including international travel.
Marketing and Sales:
•Work with global solutions teams and across local geographies to provide content and drive deals to successful closing
•Provide demonstration of IBM credentials in the core domain of Data Security, especially cryptography
•Work closely with the global and local solution design teams to develop client presentations and Statements Of Work (SOWs)
•Provide a focal point for geographies to help understand capabilities, offerings, client references
•Become a recognized thought leader in the core domain, utilizing conferences, white papers, client presentations to build awareness of IBM credentials
•Be accountable for driving signings in the geographies
Delivery:
•Work with global and local teams to help organize project approaches and teams for client delivery
•Participate in project delivery to varying degrees depending on project complexity and geography needs
•Help resolve project issues as they arise
•Establish demonstrated client relationships in key accounts to help progress the Security Services portfolio
Practice:
•Provide global practice leadership by facilitating a community of like-minded practitioners to share and exchange ideas for practice growth and improvement
•Contribute content and advice to the offering development process
•Help shape the emerging model of the Global Security Practice
People:
•Help establish capability and skills models for the core domain• Become a role model for global practitioners in the core domain
Closing date for applications:
Contact: Harry Dougherty
Senior Recruiter - Talent Acquisition
IBM Security Services
https://www.linkedin.com/in/harrydougherty1/
More information: https://www.linkedin.com/jobs/view/associate-partner-cryptography-encryption-at-ibm-742561074/
10 July 2018
Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
Our framework builds a cryptographic invariant map, which is a new primitive closely related to a cryptographic multilinear map, but whose range does not necessarily have a group structure. Nevertheless, we show that a cryptographic invariant map can be used to build several cryptographic primitives, including NIKE, that were previously constructed from multilinear maps and indistinguishability obfuscation.
09 July 2018
Shafi Goldwasser, Sunoo Park
In this work we show how the use of cryptographic protocols, and in particular, the use of zero-knowledge proofs can ensure accountability and transparency of the government in this extraordinary, seemingly deadlocked, setting. We propose an efficient record-keeping infrastructure with versatile publicly verifiable audits that preserve perfect (information-theoretic) secrecy of record contents as well as of the rules by which the records are attested to abide. Our protocol is based on existing blockchain and cryptographic tools including commitments and zero-knowledge SNARKs, and satisfies the properties of indelibility (i.e., no back-dating), perfect data secrecy, public auditability of secret data with secret laws, accountable deletion, and succinctness. We also propose a variant scheme where entities can be required to pay fees based on record contents (e.g., for violating regulations) while still preserving data secrecy. Our scheme can be directly instantiated on the Ethereum blockchain (and a simplified version with weaker guarantees can be instantiated with Bitcoin).
Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
In this paper, we propose an efficient algorithm for logistic regression on encrypted data, and evaluate our algorithm on real financial data consisting of 422,108 samples over 200 features. Our experiment shows that an encrypted model with a sufficient Kolmogorov Smirnow statistic value can be obtained in $\sim$17 hours in a single machine. We also evaluate our algorithm on the public MNIST dataset, and it takes $\sim$2 hours to learn an encrypted model with 96.4% accuracy. Considering the inefficiency of HEs, our result is encouraging and demonstrates the practical feasibility of the logistic regression training on large encrypted data, for the first time to the best of our knowledge.
Christoph Döpmann, Sebastian Rust, Florian Tschorsch
08 July 2018
Xun Yi, Kwok-Yan Lam, Dieter Gollmann
07 July 2018
Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
Seattle, USA, 10 December - 13 December 2018
Submission deadline: 10 October 2018
Notification: 1 November 2018