IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
31 August 2018
Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
Shenzhen, China, 29 November - 1 December 2018
Submission deadline: 30 September 2018
Notification: 10 October 2018
IBM Research - Zurich
Candidates for both types of openings are required to have a Ph.D. in Computer Science, Mathematics, or a related area by the time of appointment and an outstanding research record, demonstrated in the form of publications at top cryptography or security conferences (Crypto, Eurocrypt, CCS, S&P, ...).
The ideal applicant for an RSM position is someone with demonstrated ability to perform top notch independent work, who is also keen on pursuing joint research directions with the current members of the group. The possibility of establishing one's own research team, including Ph.D. students and post-docs, would also be supported.
Particular topics of interest include (but are not limited to):
- Verifiable computing and zero-knowledge proofs
- Foundations & solutions for real-world cryptography
- Privacy-enhancing technologies
The cryptography and privacy group at IBM Research - Zurich offers an exciting research environment with the ability to cooperate with researchers working on various aspects of security and cryptography, including lattice-based cryptography, provably secure protocol design, blockchain, and system security.
Cooperation with other academic and industry researchers outside IBM, as well as acquisition of external research funding, e.g., European grants (including the ERC) is also possible and encouraged.
The positions offer a very competitive salary and the opportunity to live in the Zurich area, which is consistently ranked as one of the top 5 cities with the best quality of life.
Review of applications will begin mid-September and continue until the positions are filled. Ideally, the successful applicants would start in the beginning of 2019, but other possibilities can be negotiated.
Closing date for applications:
Contact: For informal enquiries please contact:
? Anja Lehmann (anj (at) zurich.ibm.com) and/or
? Vadim Lyubashevsky (vad (at) zurich.ibm.com).
To apply, please send your CV, including contact information for three references, to cryptojobs (at) zurich.ibm.com
29 August 2018
Information Security Group (ISG), Royal Holloway University of London
Applications are invited for the post of Lecturer (teaching focussed) in the Information Security Group at Royal Holloway, University of London. The post is for 12 months and covers a period of parental leave.
The post holder will contribute to the creation and/or revision, delivery and assessment of postgraduate (MSc) and undergraduate teaching modules across a wide range of topics in the field of information/cyber security.
Applicants should have a Ph.D. in a relevant subject or equivalent and have a sound knowledge of information/cyber security. Applicants should be able to demonstrate an enthusiasm for teaching and communicating with diverse audiences, as well as show an awareness of contemporary issues relating to cyber security. See the URL for more details. The URL has a link to the online application form.
Closing date for applications: 2 September 2018
Contact:
Peter Komisarczuk
Email peter.komisarczuk (at) rhul.ac.uk
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0818-321
27 August 2018
Yael Kalai, Omer Paneth, Lisa Yang
The soundness of our scheme relies on the assumption that there exists a group with a bilinear map, such that given group elements $g,h,h^t,h^{t^2},$ it is hard to output $g^a,g^b,g^c$ and $h^a,h^b,h^c$ such that $a \cdot t^2 + b \cdot t + c = 0$, but $a,b,c$ are not all zero.
Previously, such a result was only known under knowledge assumptions (or in the Random Oracle model), or under non-standard assumptions related to obfuscation or zero-testable homomorphic encryption.
We obtain our result by converting the interactive delegation scheme of Goldwasser, Kalai and Rothblum (J. ACM 2015) into a publicly verifiable non-interactive one. As a stepping stone, we give a publicly verifiable non-interactive version of the sum-check protocol of Lund, Fortnow, Karloff, Nisan (J. ACM 1992).
Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
Brandon Goodell, Sarang Noether
Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
Our work resolves an open problem mentioned by Libert et al. (EUROCRYPT '16) of how to efficiently adapt the above discrete logarithm proof techniques to the lattice setting. To achieve our result, we introduce technical tools for design and analysis of algebraic lattice-based zero-knowledge proofs, which may be of independent interest.
Using our proof system as a building block, we design a short lattice-based ring signature scheme. Our scheme offers post-quantum security and practical usability in cryptocurrencies and e-voting systems. Even for a very large ring size such as 1 billion, our ring signature size is only 4.5 MB for 100-bit security level compared to 166 MB in the best existing lattice-based result by Libert et al. (EUROCRYPT '16).
Itai Dinur
In this paper, we consider LowMC instances with block size $n$, partial non-linear layers of size $s \leq n$ and $r$ encryption rounds. We show that when $s < n$, each LowMC instance belongs to a large class of equivalent instances. We then select a \emph{representative instance} from this class for which encryption (and decryption) can be implemented much more efficiently than for an arbitrary instance. This yields a new encryption algorithm that is equivalent to the standard one, but reduces the evaluation time and storage of the linear layers from $r \cdot n^2$ bits to about $r \cdot n^2 - (r-1)(n-s)^2$, which is a substantial improvement for small $s$ and a reasonable choice of $r$. For standard LowMC parameters, our new encryption algorithm achieves a reduction by a factor between 2 and 4, while for more extreme parameter choices (suggested by the designers) the reduction is by a factor of more than 140. Furthermore, our new encryption algorithm is applicable to all SP-networks with partial non-linear layers.
An additional unique feature of LowMC is that the linear layers of its instances are sampled at random. In the second part of the paper, we show how to reduce the sampling time and randomness complexities (i.e., the number of random bits used) by directly sampling representative instances. Finally, we formalize the notion of linear equivalence of block ciphers with partial non-linear layers and prove that the memory complexity of our encryption algorithm and the randomness complexity of our sampling algorithm are optimal.
Sanjam Garg, Akshayaram Srinivasan
Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
BROs make the task of bootstrapping cryptographic hardness somewhat challenging. Indeed, with only a single arbitrarily backdoored function no hardness can be bootstrapped as any construction can be inverted. However, when two (or more) independent hash functions are available, hardness emerges even with unrestricted and adaptive access to all backdoor oracles. At the core of our results lie new reductions from cryptographic problems to the communication complexities of various two-party tasks. Along the way we establish a communication complexity lower bound for set-intersection for cryptographically relevant ranges of parameters and distributions and where set-disjointness can be easy.
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
26 August 2018
University of South Florida and Florida Atlantic University
The areas of interest are
- Lattice based cryptography.
- Isogeny-based cryptography.
- Cryptocurrencies.
- Classical and quantum cryptanalysis.
The person recruited at USF will report to Dr. Jean-Francois Biasse. They will work on fundamental aspects of the aforementioned topics and be hired by the Mathematics department. The annual salary will be $47,659
The person recruited at FAU will report to Dr Reza Azarderakhsh. They will work on efficient implementations related to the topics of interests, with an emphasis on hardware solutions. They will be hired by the Department of Computer and Electrical Engineering and Computer Science. The annual salary will be $50,000.
If you are interested in either position, please send a CV and a 1 page research statement to usf.fau.crypto.postdoc (at) gmail.com.
Review of applications will start immediately and will continue until both positions are filled.
Closing date for applications: 31 December 2018
25 August 2018
Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
23 August 2018
Milano, Italy, 10 October 2018
Queensland University of Technology, Brisbane, Australia
This critical position will sit within the School\'s Information Security Discipline whose research and teaching addresses a range of interdisciplinary topics in information security management, cryptography, network security and digital forensics. QUT is also one of the founding members of the newly-established Cyber Security Cooperative Research Centre. This position will involve conducting high quality research in emerging areas of cybersecurity; teaching undergraduate and postgraduate classes in cybersecurity principles and practices; and supervising higher-degree research students. The research will be conducted in one or more areas of cybersecurity principles and practices such as:
• Critical infrastructure design
• Computer security certification
• Identity management
• Digital forensics
• Network security
• Ransomware recovery
• Security auditing
• Information security management
• Trusted computing bases
• Malware analysis
• Intrusion detection
• Security-by-design
• Social engineering
• Applied cryptography
• Cloud security
• Supply chain security
Closing date for applications: 22 September 2018
More information: https://qut.nga.net.au/?jati=D9C23EA3-394E-7D62-5EDD-A474F0AE7BD7
Algorand
Algorand is the next generation blockchain platform and digital currency. Possessing a thorough and thoughtfully constructed decentralized economy where all transactions are safe, fast and uncensored while scalable to billions of users, Algorand will help unleash the economic potential of people across the globe as we democratize access to financial instruments.
The Team
The Algorand team combines technological luminaries and proven business leaders. Algorand is founded by Silvio Micali, MIT Ford Professor of Engineering and recipient of the Turing Award in Computer Science.
Our office is located in the heart of downtown Boston. All positions are in this location, though remote work is possible for exceptional candidates.
The Role
This is a senior level role where you will have the opportunity to influence the design and implementation of Algorand’s core cryptographic protocols and schemes. You’ll be working closely with senior cryptographers at the company to engineer new schemes and constructions, implement and deploy them at scale. This involves open source development, contribution to cutting-edge research, and industry standards.
Cryptography engineers are expected to have deep domain knowledge, be familiar with the nuances of implementing public-key cryptography, side-channel attacks, padding oracles, constant-time implementations.
Responsibilities
You will join a small, extremely capable, and enthusiastic Boston-based team. Your ideas and your innovation will help shape the new blockchain and cryptocurrency ecosystem of tomorrow. The current suite of projects are implemented in primarily Go and C++.
The core product will be open sourced. Significant open source contribution experience will be considered very favorably.
Closing date for applications: 1 July 2019
Contact: Sergey Gorbunov, sergey (at) algorand.com
More information: https://www.algorand.com/careers/
University of Adelaide
In the most recent Academic Ranking of World Universities (Computer Science & Engineering) the School of Computer Science was ranked 43rd world-wide. We can provide you with an excellent research and industry environment in cybersecurity in which to thrive. This continuing position is a great opportunity for you to set new research directions and contribute to teaching curriculum development.
A variety of flexible working arrangements are available for the successful candidate.
Closing date for applications: 9 September 2018
More information: http://careers.adelaide.edu.au/cw/en/job/499007/senior-lecturer-associate-professor-in-cyber-security-school-of-computer
Information Security Group, Royal Holloway, University of London
The PDRA will work alongside Martin Albrecht and other cryptographic researchers at Royal Holloway on topics in lattice-based cryptography. This post is part of the EU H2020 PROMETHEUS project (http://prometheuscrypt.gforge.inria.fr) for building privacy preserving systems from advanced lattice primitives. Our research focus within this project is on cryptanalysis and implementations, but applicants with a strong background in other areas such as protocol/primitive design are also encouraged to apply.
Applicants should have already completed, or be close to completing, a PhD in a relevant discipline. Applicants should have an outstanding research track record in cryptography. Applicants should be able to demonstrate scientific creativity, research independence, and the ability to communicate their ideas effectively in written and verbal form.
In return we offer a highly competitive rewards and benefits package including generous annual leave and training and development opportunities. This is a full time fixed term post is based in Egham, Surrey where the College is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London.
To view further details of this post and to apply please visit https://jobs.royalholloway.ac.uk. For queries on the application process the Human Resources Department can be contacted by email at: recruitment (at) rhul.ac.uk.
Please quote the reference: 0818-334
Closing date for applications: 17 September 2018
Contact: Martin Albrecht, martin.albrecht _at_ royalholloway.ac.uk
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0818-334