IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 August 2018
Promise Protocols
Promise Protocols is one of the fastest growing FinTech companies in Silicon Valley. Promise delivers cash analytics and cash access to thousands of small businesses, that operate with volatile cash balances. We are a platform company whose aim is to automate the hardest parts of small business financial management. We are sometimes the last company many small business merchants come to when no one else will help their businesses stay alive.
Why work at Promise?
We are a high-energy, innovation-focused team of engineers and technologists who want to make running a small business less painful for owners all over the world. Promise’s environment is highly collaborative, and the ideal candidate will have an eye for detail and be a team player who enjoys working with others to find cutting-edge solutions to tricky problems. Come join us!
What we are looking for in the Senior Software Engineer?
Promise Protocols is looking for a passionate and experienced developer with cryptography experience to help develop, build and deploy a distributed, fault-tolerant P2P payments and exchange platform.
This role is ideal for cryptography scientists or software engineers with deep experience and familiarity with evolving and established cryptographic protocols and their implementation.
What you will be responsible doing?
1. Develop, build and deploy crypto protocols in distributed p2p systems
2. Work with core internal team and external open source community
3. Collaborate with teammates to produce protocol specifications
4. Collaborate and support other teams in developing crypto economic consensus protocol
5. Develop and maintain interfaces for platform API
6. Identify and recommend technologies to solve technical challenges
Closing date for applications:
Contact: Please send a request to jobs (at) promiseprotocols.com
More information: https://aquila-1.workable.com/jobs/772792
08 August 2018
The IACR is soliciting for affiliated events to be held in conjunction with Eurocrypt 2019 on Saturday, May 18, and/or Sunday, May 19. Each such event is expected to provide a forum for discussing a specific topic of the broad cryptographic world (theory, practice, implementation, standardizations, industry, etc.). The format of the event (e.g., workshop, tutorial, panel, etc.) is up to the organizers.
Information about proposing an affiliated event can be found at https://eurocrypt.iacr.org/2019/callforaffiliatedevents.html. Proposals are due September 2.
07 August 2018
Beijing, China, 14 April - 17 April 2019
Submission deadline: 12 October 2018
Notification: 21 December 2018
Nele Mentens, Edoardo Charbon, Francesco Regazzoni
05 August 2018
Cyber Security Researchers of Waikato (CROW), University of Waikato, New Zealand
We are seeking to appoint a full time fixed term Research Fellow to contribute to our research objectives associated with cybercrime, computer security and cloud computing. This position has responsibilities to achieve research objectives associated with the STRATUS industry partners.
A PhD in cyber security, cybercrime, computer science or a related field is essential as is having demonstrated research ability in cyber security and cybercrime. A requirement of this position is the ability to commercialise research prototypes into products/services and the demonstrated ability to publish in high quality academic journals, work collaboratively with others and undertake some teaching if required.
Preference will be given to candidates who have work experience with cybercrime, security, intelligence, or law enforcement agencies including work experience in the cybercrime, security digital forensics, machine learning, applied cryptography, etc.
Salary will be in the range of NZ$74,034 to $89,163 per year, depending on qualifications, skills and experience.
This position is fixed-term until October 2020, and will be opened until filled.
Enquiries of an academic nature should be directed to Associate Professor Ryan Ko – Director, NZ Institute for Security and Crime Science, email: ryan.ko AT waikato.ac.nz
Closing date for applications: 4 January 2019
Contact: Associate Professor Ryan Ko, ryan.ko AT waikato.ac.nz
More information: https://www.waikato.ac.nz/vacancies/current-vacancies
03 August 2018
Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
Henning Kopp, Frank Kargl, Christoph B{\"o}sch, Andreas Peter
Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
Paul Crowley , Eric Biggers
02 August 2018
University of Twente, Enschede, the Netherlands
Cybersecurity (broadly conceived) is by all means among the topics of interest!
The full announcement of these positions can be found here:
https://www.utwente.nl/en/organization/careers/vacancy/!/421417/6-assistantassociate-professors-and-lecturers-in-computer-science
Closing date for applications: 31 August 2018
More information: https://www.utwente.nl/en/organization/careers/vacancy/
University of Tartu, Estonia
We expect candidates to be able to develop and devote significant time to their own research agenda around the theme of the project. Successful candidates will help to design and evaluate privacy-enhancing cryptographic techniques for blockchains (e.g., SNARKs) and perform other research duties to help with the project, collaborate with partners and ensure the smooth administration of the project including the timely delivery of research output.
The EU H2020 project PRIViLEDGE requires travel to and collaboration with colleagues throughout the European Union. Full travel and equipment budget is available to support the activities of the project.
For any inquiries or to apply for the positions, submit a full research curriculum-vitae (cv), names of two references, and a research statement to Prof Helger Lipmaa (firstname.lastname (at) ut.ee) clearly indicating the position sought. This is crucial since we have several open positions.
The project started from January 1, 2018, and will last for three years. In the case of interest, the candidates may later seek further employment (the group has other projects, some of which have a later ending date) but this is not necessarily guaranteed. The position will stay open until we find a suitable candidate; please apply early.
Closing date for applications: 1 September 2018
Contact: Helger Lipmaa
More information: https://crypto.cs.ut.ee/index.php/Projects/PRIViLEDGE
Bogotá, Colombia, 5 June - 7 June 2019
Submission deadline: 22 January 2019
Notification: 22 March 2019
01 August 2018
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
As a first step, we perform a theoretical feasibility study on exact reconstruction, i.e., recovery of the exact plaintext values of the encrypted database. For ordered responses, we show that exact reconstruction is feasible if the attacker has additional access to some auxiliary information that is normally not available in practice. For unordered responses, we prove that exact reconstruction is impossible due to the infinite number of valid reconstructions. As a next step, we propose practical and more realistic approximate reconstruction attacks so as to recover an approximation of the plaintext values. For ordered responses, we show that after observing enough query responses, the attacker can approximate the clients encrypted database with considerable accuracy. For unordered responses we characterize the set of valid reconstructions as a convex polytope in a k-dimensional space and present a rigorous attack that reconstructs the plaintext database with bounded approximation error.
As multidimensional spatial data can be efficiently processed by mapping it to one dimension via Hilbert curves, we demonstrate our approximate reconstruction attacks on privacy-sensitive geolocation data. Our experiments on real-world datasets show that our attacks reconstruct the plaintext values with relative error ranging from 2.9% to 0.003%.
Koji Nuida
- There are a secure and correct public key encryption (PKE) scheme (with negligible decryption error probability) and a secure PRG satisfying that, implementing the key generation algorithm by using the PRG makes the scheme incorrect. The reason of this phenomenon is that, the standard formulation of correctness of PKE schemes does in general not imply that erroneous keys (that yield non-negligible decryption error probability for some plaintext) are efficiently detectable.
- There are a secure and correct PKE scheme and a PRG secure against uniform distinguishers, satisfying that, implementing the encryption algorithm by using the PRG makes the scheme incorrect. The reason of this phenomenon is that, when a PKE scheme is incorrect, a plaintext that yields non-negligible decryption error probability is in general not efficiently samplable by a uniform algorithm; hence security of the PRG against non-uniform distinguishers is required. We also discuss a possibility to avoid the reliance on PRGs secure against non-uniform distinguishers.
Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
Anne Canteaut, Léo Perrin
In this paper, we characterize CCZ-equivalence as a property of the zeroes in the Walsh spectrum of a function $F : \mathbb{F}_2^{n} \to \mathbb{F}_2^{m}$ or, equivalently, of the zeroes in its Difference Distribution Table. We use this framework to show how to efficiently upper bound the number of distinct EA-equivalence classes in a given CCZ-equivalence class. More importantly, we prove that it is possible to go from a specific member of any EA-equivalence class to a specific member of another EA-equivalence class in the same CCZ-equivalence class using an operation called \emph{twisting}; so that CCZ-equivalence can be reduced to the association of EA-equivalence and twisting. Twisting a function is a simple process and its possibility is equivalent to the existence of a particular decomposition of the function considered. Using this knowledge, we revisit several results from the literature on CCZ-equivalence and show how they can be interpreted in light of our new framework.
Our results rely on a new concept, the ``thickness'' of a space (or linear permutation), which can be of independent interest.