IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 September 2018
Graz University of Technology
To increase the proportion of female academic personnel in the position of professor at Graz University of Technology, the Faculty of Computer Science and Biomedical Engineering is seeking to fill a tenure track professorship for the field of Cryptography for women.
The position, is initially restricted to six years as a University Assistant with Doctorate, 40 hours per week and the successful candidate is expected to start on 01.04.2019, at the Institute of Applied Information Processing and Communications.
Upon agreement on a qualification agreement, the candidate will be appointed as assistant professor. As soon as the qualification agreement has been fulfilled, the position will be converted into a tenured position as associate professor.
Closing date for applications: 3 December 2018
Contact: Stefan Mangard, Email: Stefan.Mangard (at) iaik.tugraz.at
More information: https://www.tugraz.at/fakultaeten/infbio/news/vacancies/tenure-track-professor-in-cryptography-women-only/
20 September 2018
Xingye Lu, Man Ho Au, Zhenfei Zhang
Shi Bai, Damien Stehlé, Weiqiang Wen
In this work, we first report experiments providing more insight on this shorter-than-expected phenomenon. We then propose a refined BKZ simulator by taking the distribution of short vectors in random lattices into consideration. We report experiments suggesting that this refined simulator more accurately predicts the concrete behavior of BKZ. Furthermore, we design a new BKZ variant that exploits the shorter-than-expected phenomenon. For the same cost assigned to the underlying SVP-solver, the new BKZ variant produces bases of better quality. We further illustrate its potential impact by testing it on the SVP-120 instance of the Darmstadt lattice challenge.
Tibor Jager, Saqib A. Kakvi, Alexander May
We introduce a new technique that enables the first security proof for RSA-PKCS#1 v1.5 signatures. We prove full existential unforgeability against adaptive chosen-message attacks (EUF-CMA) under the standard RSA assumption. Furthermore, we give a tight proof under the Phi-Hiding assumption. These proofs are in the random oracle model and the parameters deviate slightly from the standard use, because we require a larger output length of the hash function. However, we also show how RSA-PKCS#1 v1.5 signatures can be instantiated in practice such that our security proofs apply.
In order to draw a more complete picture of the precise security of RSA PKCS#1 v1.5 signatures, we also give security proofs in the standard model, but with respect to weaker attacker models (key-only attacks) and based on known complexity assumptions. The main conclusion of our work is that from a provable security perspective RSA PKCS#1 v1.5 can be safely used, if the output length of the hash function is chosen appropriately.
Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
In this work, we initiate a formal study of $(k,p)$-poisoning attacks in which an adversary controls $k\in[n]$ of the parties, and even for each corrupted party $P_i$, the adversary submits some poisoned data $T'_i$ on behalf of $P_i$ that is still "$(1-p)$-close" to the correct data $T_i$ (e.g., $1-p$ fraction of $T'_i$ is still honestly generated). For $k=m$, this model becomes the traditional notion of poisoning, and for $p=1$ it coincides with the standard notion of corruption in multi-party computation.
We prove that if there is an initial constant error for the generated hypothesis $h$, there is always a $(k,p)$-poisoning attacker who can decrease the confidence of $h$ (to have a small error), or alternatively increase the error of $h$, by $\Omega(p \cdot k/m)$. Our attacks can be implemented in polynomial time given samples from the correct data, and they use no wrong labels if the original distributions are not noisy.
At a technical level, we prove a general lemma about biasing bounded functions $f(x_1,\dots,x_n)\in[0,1]$ through an attack model in which each block $x_i$ might be controlled by an adversary with marginal probability $p$ in an online way. When the probabilities are independent, this coincides with the model of $p$-tampering attacks, thus we call our model generalized $p$-tampering. We prove the power of such attacks by incorporating ideas from the context of coin-flipping attacks into the $p$-tampering model and generalize the results in both of these areas.
Christos Patsonakis, Katerina Samari , Mema Roussopoulos , Aggelos Kiayias
In our work, we leverage the scalability, as well as, the built-in incentive mechanism of blockchain systems and propose a smart contract-based DPKI. The main barrier in realizing a smart contract-based DPKI is the size of the contract's state which, being its most expensive resource to access, should be minimized for a construction to be viable. We resolve this problem by proposing and using in our DPKI a public-state cryptographic accumulator with constant size, a cryptographic tool which may be of independent interest in the context of blockchain protocols. We also are the first to formalize the DPKI design problem in the Universal Composability (UC) framework and formally prove the security of our construction under the strong RSA assumption in the Random Oracle model and the existence of an ideal smart contract functionality.
Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
In this work, we construct a perfectly secure 3-server ORAM scheme that outperforms the best known single-server scheme by a logarithmic factor. In the process we also show, for the first time, that there exist specific algorithms for which multiple servers can overcome known lower bounds in the single-server setting.
19 September 2018
University of Surrey, Guildford, UK
The Department has a large secure systems research group, led by Professor Steve Schneider, with expertise in security by design, authentication, verification, distributed ledger technologies, trusted systems and cloud security.
This post offers an exciting opportunity for an appointment in the Secure Systems group. Suitable areas of expertise that complement and extend strengths of the group include (but are not limited to): practical system security, trusted systems, verification, distributed systems, complex systems and networks, and the interface between security and machine learning.
The University and the Department specifically are committed to building a culturally diverse organisation and strongly encourages applications from female, minority candidates and industry experts.
Interested candidates will find details of these posts at: https://jobs.surrey.ac.uk/Vacancy.aspx?id=5405&forced=1
Closing date 21 October 2018.
Interviews 5 and 6 November 2018.
For an informal discussion about the position, please contact the Head of Department of Computer Science, Dr Helen Treharne on h.treharne (at) surrey.ac.uk, Professor Steve Schneider or Professor Liqun Chen ( s.schneider (at) surrey.ac.uk, liqun.chen (at) surrey.ac.uk ).
Closing date for applications: 21 October 2018
Contact:
- Dr Helen Treharne (h.treharne (at) surrey.ac.uk),
- Professor Steve Schneider (s.schneider (at) surrey.ac.uk), or
- Professor Liqun Chen (liqun.chen (at) surrey.ac.uk)
More information: https://jobs.surrey.ac.uk/Vacancy.aspx?id=5405&forced=1
Universitat Politècnica de Catalunya (Barcelona, Spain)
http://prometheuscrypt.gforge.inria.fr/
Specifically, to design/analyze/implement better lattice-based cryptographic protocols that may be needed in electronic voting applications; this includes encryption, (group, blind) signatures and zero-knowledge proofs of knowledge.
The candidate (with a phD. completed or close to be completed) should therefore have experience in the area of lattice-based cryptography.
The expected salary will be around 43.000 euros per year, before taxes are applied (which may mean around 30.000 euros per year, at the end). The work place will be in UPC Campus Nord (Barcelona). The contract would start at some point in 2019, and could last 1-2 years.
Closing date for applications: 30 November 2018
Contact: Interested candidates can send an e-mail to Javier Herranz (javier.herranz (at) upc.edu) with a CV.
University of Surrey, Guildford, Surrey, UK
The Department has a large secure systems research group, led by Professor Steve Schneider, with expertise in security by design, authentication, verification, distributed ledger technologies, trusted systems and cloud security.
This post offers an exciting opportunity for an appointment in the Secure Systems group. Suitable areas of expertise that complement and extend strengths of the group include (but are not limited to): practical system security, trusted systems, verification, distributed systems, complex systems and networks, and the interface between security and machine learning.
The University and the Department specifically are committed to building a culturally diverse organisation and strongly encourages applications from female, minority candidates and industry experts.
For an informal discussion about the position, please contact the Head of Department of Computer Science, Dr Helen Treharne on h.treharne (at) surrey.ac.uk, Professor Steve Schneider or Professor Liqun Chen (s.schneider (at) surrey.ac.uk, liqun.chen (at) surrey.ac.uk).
Closing date for applications: 21 October 2018
Contact:
Dr Helen Treharne, Head of Department of Computer Science, h.treharne (at) surrey.ac.uk
Prof Steve Schneider, Director of Surrey Centre for Cyber Security, s.schneider (at) surrey.ac.uk
Prof Liqun Chen, Professor of Secure Systems, liqun.chen (at) surrey.ac.uk
More information: https://jobs.surrey.ac.uk/Vacancy.aspx?id=5405
King Khaled University. Abha, Saudi Arabia
time positions of Professor, Associate Professor and Assistant Professor in the following
fields:
Network Security
IoT Security
cloud Security
Cryptography
Hardware Security
Salary:
The University offers a competitive salary based on qualification, professional
experience, and the position offered, as follows:
Professor: $52,500 - $88,500 per annum.
Associate professor: $43,000- $73,000 per annum.
Assistant professor: $35,500 - $60,000 per annum.
Common Benefits:
Free visa.
Around 1-week vacation on each Islamic Eid.
60-days annually paid vacation.
Annual air tickets for up to 4 family members to home country.
Free Medical Services for all family members at all government hospitals.
Children Education Allowance (Terms and Conditions apply).
Annual housing allowance (Terms and Conditions apply).
Furniture allowance upon arrival (Terms and Conditions apply).
Weekends (Friday and Saturday) are off.
Closing date for applications: 31 December 2018
Contact: ccs (at) kku.edu.sa
More information: http://www.cs.kku.edu.sa/en
Charles University in Prague
Potential research topics may include (but are not limited to):
- cryptographic hardness of total search problems,
- verifiable delegation of computation,
- applications of game theory in cryptography.
The position is funded by the Primus Research Programme of Charles University. The funding is available for one year with a flexible starting date from October 2018, a competitive salary and a possibility of extension. The applicants should hold a PhD degree (or be near its completion) in computer science, mathematics or a related field.
Applications should include a CV and a research statement and may be sent directly to Pavel Hubacek (informal inquiries are welcome).
The applications will be considered until the position is filled.
Closing date for applications: 30 November 2018
Contact: Pavel Hubacek, hubacek (at) iuuk.mff.cuni.cz
Friedrich-Alexander-University Erlangen-Nuremberg
The city of Nuremberg is very international with over 20% of foreigners and the teaching language for our MSc courses is English. Therefore, there is no need to speak/learn German.
The position is initially offered for one year, with the option of an extension to two or more years (up to six years). The starting date is December 1st or later. There is no closing date for applications, the position remains open until filled.
To apply for this position, please send a single pdf document with the following content:
- Cover letter
- research and teaching statement
- CV and a list of publications
- Optional: one or two letter(s) of recommendation
- Optional: further supporting material
Incomplete applications or obvious mass applications that do not specifically address the offered position can not be considered.
Please submit applications by e-mail to Dominique Schröder and using the tag [POSTDOC] in the subject.
Closing date for applications: 1 November 2018
Contact: Dominique Schröder
dominique.schroeder (at) fau.de
More information: http://chaac.tf.fau.de
17 September 2018
New York University (NYU) Abu Dhabi
Closing date for applications: 15 October 2018
Contact: Christina Pöpper
More information: https://apply.interfolio.com/52873
ING Netherlands
At ING, increasing the pace of innovation is a strategic priority of the Think Forward strategy. We need to get faster and better at innovating so we can stay abreast of the pace of change around us. Blockchain technology is one of the innovation enablers at ING and the Blockchain program encompasses all of our efforts to explore and unlock its business value. As such, the Blockchain program at ING is directly responsible for all DLT related initiatives at ING globally.
The Blockchain program is also responsible for identifying and piloting the most promising use cases. To do so, we constantly scope the environment for relevant opportunities, actively engage with and educate the organization about the technology’s potential as well as researching trends within the industry. This allows us to have a comprehensive approach in our delivery of business value.
We are looking for a cryptographer to strengthen the team. Your main tasks that you will be performing are:
Research:
- Follow the developments in cryptography, with a focus on subjects important to DLT, such as zero-knowledge protocols, secret sharing, ring signatures, homomorphic encryption, etc.
- Implement interesting protocols in a proof-of-concept fashion
- Present interesting advances/protocols to the DLT team
Experimenting:
Participate in projects that experiment with DLT solutions, with a focus on cryptography, security and privacy components
- Advise on the cryptographic solutions to be used and how these should be used
Analysis:
- Analyse solutions and implementations thereof to verify if the implementation is correct and the privacy and/or security requirements ING has are met
Relevant stakeholders: you will be working with the DLT team, and reporting to the Chapter Lead and squad’s Customer Journey Expert / Product Owner.
You will be fully part of an enthusiastic multi-disciplinary team that has a willingness to help you grow and learn as much as possible throughout your position.
Closing date for applications: 22 December 2018
Contact: Mariana Gómez de la Villa
Global Program Manager Distributed Ledger Technology
ING Wholesale Banking Innovation
AMP G.04, Bijlmerplein 888, 1102 MG Amsterdam Zuidoost
P.O. Box 1800, 1000 BV Amsterdam, The Netherlands
M +31649420406
E mariana.gomez.de.la.villa (at) ing.nl
More information: https://www.ing.jobs/Global/Careers/Job-opportunities/Vacancy/DLT-Blockchain-Engineer-4.htm?org=searchresult
Singapore University of Technology and Design (SUTD)
Candidates should have a strong interest in the blockchain technology and an excellent background in at least one of the following fields: cryptography, security protocol analysis, network or system security, distributed systems, networking, or related. If you are interested, please send your CV to Pawel Szalachowski.
Closing date for applications: 1 January 2019
Contact: Pawel Szalachowski
pawel (at) sutd.edu.sg
New York University (NYU) Abu Dhabi
Deadline coming up soon: Dec 12 (through Courant) and Dec 15 (through Tandon).
Closing date for applications: 12 December 2018
Contact: Christina Pöpper
More information: https://nyuad.nyu.edu/en/academics/graduate/global-phd-student-fellowship-in-computer-science.html
New York University (NYU) Abu Dhabi
Closing date for applications: 15 November 2018
More information: https://apply.interfolio.com/52873