IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 August 2018
The award committee recognizes this paper "for introducing compact two-operation homomorphic encryption and developing new bilinear map techniques that led to major improvements in the design of cryptographic schemes."
The TCC Test of Time Award recognizes outstanding papers, published in TCC at least eight years ago, making a significant contribution to the theory of cryptography, preferably with influence also in other area of cryptography, theory, and beyond. The inaugural TCC Test of Time Award was given in TCC 2015 for papers published no later than TCC 2007.
20 August 2018
Nadim Kobeissi, Karthikeyan Bhargavan
We present Noise Explorer, an online engine for designing, reasoning about and formally verifying arbitrary Noise Handshake Patterns. Based on our formal treatment of the Noise Protocol Framework, Noise Explorer can validate any Noise Handshake Pattern and then translate it into a model ready for automated verification. We use Noise Explorer to analyze 50 Noise Handshake Patterns. We confirm the stated security goals for 12 fundamental patterns and provide precise properties for the rest. We also analyze unsafe Noise patterns and discover potential attacks. All of this work is consolidated into a usable online tool that presents a compendium of results and can parse formal verification results to generate detailed-but-pedagogical reports regarding the exact security guarantees of each message of a Noise Handshake Pattern with respect to each party, under an active attacker and including malicious principals. Noise Explorer evolves alongside the standard Noise Protocol Framework, having already contributed new security goal verification results and stronger definitions for pattern validation and security parameters.
Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
This paper introduces a symbolic approach for proving security of cryptographic constructions based on the Learning With Errors assumption (Regev, STOC 2005). Such constructions are instances of lattice-based cryptography and are extremely important due to their potential role in post-quantum cryptography. Following (Barthe, Gr\'egoire and Schmidt, CCS 2015), our approach combines a computational logic and deducibility problems---a standard tool for representing the adversary's knowledge, the Dolev-Yao model. The computational logic is used to capture (indistinguishability-based) security notions and drive the security proofs whereas deducibility problems are used as side-conditions to control that rules of the logic are applied correctly. We then use \AutoLWE, an implementation of the logic, to deliver very short or even automatic proofs of several emblematic constructions, including CPA-PKE (Gentry et al., STOC 2008), (Hierarchical) Identity-Based Encryption (Agrawal et al. Eurocrypt 2010), Inner Product Encryption (Agrawal et al. Asiacrypt 2011), CCA-PKE (Micciancio et al., Eurocrypt 2012). The main technical novelty beyond AutoLWE is a set of (semi-)decision procedures for deducibility problems, using extensions of Gr\"obner basis computations for subalgebras in the (non-)commutative setting (instead of ideals in the commutative setting). Our procedures cover the theory of matrices, which is required for lattice-based assumption, as well as the theory of non-commutative rings, fields, and Diffie-Hellman exponentiation, in its standard, bilinear and multilinear forms. Additionally, AutoLWE supports oracle-relative assumptions, which are used specifically to apply (advanced forms of) the Leftover Hash Lemma, an information-theoretical tool widely used in lattice-based proofs.
Universidade de São Paulo, São Paulo, Brazil
The focus will be on performance improvements, possibly in terms of processing time and energy requirements, but especially in terms of key, signatures and ciphertext sizes. The security analysis of these schemes should consider both cryptanalytic attacks and implementation-related threats, such as side-channel attacks. The performance evaluation of the schemes will be both theoretical (considering computational complexity, underlying parallelism opportunities) and experimental (using software prototypes and hardware implementations).
The main requirements for the application are: (1) to have a solid background in cryptography, preferably (but not necessarily) with post-quantum primitives; (2) to have good design/programming skills, preferably (but not necessarily) in programming languages such as C and/or hardware description languages such as VHDL, and (3) to be enrolled (or to be willing to enroll) at the Graduate Program in Electrical Engineering, Escola Politécnica, Universidade de São Paulo, São Paulo campus (http://ppgee.poli.usp.br/en/), with a full time dedication.
This opportunity is open for candidates of any nationality.
Closing date for applications: 27 August 2018
Contact: Prof. Marcos A. Simplicio Jr -- msimplicio (at) larc.usp.br
University of Salerno (Italy)
Post-Doc Positions.
Professor Ivan Visconti is the scientific coordinator for University of Salerno of the project Privacy-Enhancing Cryptography in Distributed Ledgers (PRIViLEDGE) and is involved in several other research activities related to Cybersecurity, Cryptography and Blockchain Technology. Expressions of interest for post-doc positions in the field of privacy-preserving cryptography and distributed ledger technology, to be supervised by professor Ivan Visconti are welcome. Candidates are expected to have a solid publication record (e.g., IACR conferences, CCS, IEEE S&P,....). The positions are available immediately. The net salary can be even higher than the average net salary of an associate professor in Italy. There is also some travel budget to attend conferences, project meetings and research visits. In case you are interested, please send your CV and 2 names for letters of reference to Ivan Visconti (ivan DOT visconti AT gmail DOT com).
PhD Positions.
There are up to 14 PhD positions at the computer engineering department of University of Salerno (Italy). The deadline for applications is September 19, 2018, and the master degree must be obtained by November 6, 2018.
Closing date for applications: 6 November 2018
Contact: Ivan Visconti (ivan DOT visconti AT gmail DOT com)
More information: https://goo.gl/DmFgGM
Mathias Hall-Andersen, Philip S. Vejre
While several tools have been developed to search for optimal linear and differential trails, e.g. MILP and SAT based methods, only few approaches specifically try to find as many trails of a single approximation or differential as possible. This can result in an overestimate of a ciphers resistance to linear and differential attacks, as was for example the case for PRESENT.
In this work, we present a new algorithm for linear and differential trail search. The algorithm represents the problem of estimating approximations and differentials as the problem of finding many paths through a multistage graph, and we demonstrate that this approach allows is to find a very large number of trails for each approximation or differential. Moreover, we show how the algorithm can be used to efficiently estimate the key dependent correlation distribution of a linear approximation, facilitating advanced linear attacks. We apply the algorithm to 17 different ciphers, and demonstrate new and improved results on several of these.
Tim Beyne
Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
In this paper, we extend the SPDZ compiler so that it can work with general underlying protocols. Our SPDZ extensions were made in mind to enable the use of SPDZ for arbitrary protocols and to make it easy for others to integrate existing and new protocols. We integrated three different types of protocols, an honest-majority protocol for computing arithmetic circuits over a field (for any number of parties), a three-party honest majority protocol for computing arithmetic circuits over the ring of integers $\Z_{2^n}$, and the multiparty BMR protocol for computing Boolean circuits. We show that a single high-level SPDZ-Python program can be executed using all of these underlying protocols (as well as the original SPDZ protocol), thereby making SPDZ a true general run-time MPC environment.
In order to be able to handle both arithmetic and non-arithmetic operations, the SPDZ compiler relies on conversions from field elements to bits and back. However, these conversions do not apply to ring elements (in particular, they require element division), and we therefore introduce new bit decomposition and recomposition protocols for the ring over integers with replicated secret sharing. These conversions are of independent interest and utilize the structure of $\Z_{2^n}$ (which is much more amenable to bit decomposition than prime-order fields), and are thus much more efficient than all previous methods.
We demonstrate our compiler extensions by running a complex SQL query and a decision tree evaluation over all protocols.
N. Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
Xiu Xu, Haiyang Xue, Kunpeng Wang, Song Tian, Bei Liang, Wei yu
In the random oracle model, both three-pass AKE and two-pass AKE protocols are secure in the CK model, supporting arbitrary registration of public key, and resistant to the weak perfect forward secrecy (wPFS) attack, key-compromise impersonation (KCI) attack and maximal exposure (MEX) attack, which solves the open problem provided Galbraith of looking for new techniques to design and prove security of AKE in SIDH setting with the widest possible adversarial goals.
Prabhanjan Ananth, Alex Lombardi
We formalize this notion by defining locally simulatable garbling schemes. By suitably realizing this notion, we give a new construction of succinct garbling schemes for Turing machines assuming the polynomial hardness of compact functional encryption and standard assumptions (such as either CDH or LWE). Prior constructions of succinct garbling schemes either assumed sub-exponential hardness of compact functional encryption or were designed only for small-space Turing machines.
We also show that a variant of locally simulatable garbling schemes can be used to generically obtain adaptively secure garbling schemes for circuits. All prior constructions of adaptively secure garbling that use somewhere equivocal encryption can be seen as instantiations of our construction.
Christina Boura, Nicolas Gama, Mariya Georgieva
Kimmo Halunen, Outi-Marja Latvala
Craig Gentry, Charanjit S. Jutla
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
Concretely, we first show that some known PKE schemes meet RSIM-SO-CCA security. Then, we introduce the notion of master-key SOA security for identity-based encryption (IBE), and extend the Canetti-Halevi-Katz (CHK) transformation to show generic PKE constructions achieving RSIM-SO-CCA security. Finally, we show how to construct an IBE scheme achieving master-key SOA security.
Juan Garay, Aggelos Kiayias
One of the main issues in consensus research is the many different variants of the problem that exist as well as the various ways the problem behaves when different setup, computational assumptions and network models are considered. In this work we perform a systematization of knowledge in the landscape of consensus research starting with the original formulation in the early 1980s up to the present blockchain-based new class of consensus protocols. Our work is a roadmap for studying the consensus problem under its many guises, classifying the way it operates in many settings and highlighting the exciting new applications that have emerged in the blockchain era.
Yan Michalevsky, Marc Joye
David Urbanik
Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
In this paper, we present the first end-to-end automated system for deploying large-scale MPC protocols between end users, called MPSaaS (for \textit{MPC system-as-a-service}). Our system enables parties to pre-enroll in an upcoming MPC computation, and then participate by either running software on a VM instance (e.g., in Amazon), or by running the protocol on a mobile app, in Javascript in their browser, or even on an IoT device. Our system includes an automation system for deploying MPC protocols, an administration component for setting up an MPC computation and inviting participants, and an end-user component for running the MPC protocol in realistic end-user environments. We demonstrate our system for a specific application of running secure polls and surveys, where the secure computation is run end-to-end with each party actually running the protocol (i.e., without relying on a set of servers to run the protocol for them). This is the first such system constructed, and is a big step forward to the goal of commoditizing MPC.
One of the cryptographic difficulties that arise in this type of setting is due to the fact that end users may have low bandwidth connections, making it a challenge to run an MPC protocol with high bandwidth. We therefore present a protocol based on Beerliova-Trubiniova and Hirt (TCC 2008) with many optimizations, that has very low concrete communication, and the lowest published for small fields. Our protocol is secure as long as less than a third of the parties are \textit{malicious}, and is well suited for computing both arithmetic and Boolean circuits. We call our protocol HyperMPC and show that it has impressive performance. In particular, 150 parties can compute statistics---mean, standard deviation and regression---on 4,000,000 inputs (with a circuit of size 16,000,000 gates of which 6,000,000 are multiplication) in five minutes, and 10 parties can compute the same circuit in 30 seconds. Although our end-to-end system can be used to run any MPC protocol (and we have incorporated numerous protocols already), we demonstrate it for our new protocol that is optimized for end-users without high bandwidth.
17 August 2018
National Chengchi University, Taipei, Taiwan
Initial review of applications will begin on October 1st, 2018 and continue until the position is filled. The position may close when an adequate number of qualified applications are received.
We seek candidates in research areas related to all fields in Computer Science. Candidates from the following research areas are especially welcome:
• Artificial Intelligence
• Information Security
• Interdisciplinary fields of computer science and social science (eg., CS and Digital Content, CS and Communication, CS and Finance, etc. )
At a minimum, candidates must have a Ph.D. degree in Computer Science or a closely related field and have demonstrated strong research ability.
Applicants must send curriculum vitae, transcripts, diploma certificate, a copy of Ph.D. dissertation or abstract, recent publications, and at least two recommendation letters to recruit (at) cs.nccu.edu.tw or
Faculty Recruit Committee Department of Computer Science
National Chengchi University
64, Sec. 2, ZhiNan Rd. Wenshan District
Taipei, Taiwan, 11605
R.O.C.
Applicants are invited to visit our web page at https://www.cs.nccu.edu.tw .
Closing date for applications: 1 February 2019
Contact: Raylin Tso
Chairman of the Department of Computer Science, National Chengchi University
eMail: raylin (at) cs.nccu.edu.tw
More information: https://www.cs.nccu.edu.tw