IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
23 September 2018
Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
Suvradip Chakraborty, C. Pandu Rangan
To this end, we formulate a new notion of security, which we call entropic post-challenge IND-CCA-BLT secure PKE. We first define a weaker notion called entropic restricted post-challenge IND-CCA-BLT secure PKE, which can be instantiated using the (standard) DDH assumption. We then show a generic compiler from our entropic restricted notion to the entropic notion of security using a simulation-extractable non-interactive zero-knowledge argument system. This requires an untamperable common reference string as in previous works. Finally, we demonstrate the usefulness of our entropic notion of security by giving a simple and generic construction of post-challenge IND-CCA-BLT secure PKE scheme in the split-state leakage and tampering model. This also settles the open problem posed by Faonio and Venturi (Asiacrypt 2016).
Benjamin Smith
Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori
Christophe Pfeifer, Patrick Haddad
Ke Gu, Bo Yin
Marc Joye, Yan Michalevsky
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Micha{\l} Zaj\k{a}c
Haibat Khan, Benjamin Dowling, Keith M. Martin
Varun Narayanan, Vinod M. Prabahakaran
Johannes Bl{\"o}mer, Fabian Eidens, Jakob Juhnke
To achieve this we rely on a general unforgeability and a simulation-based privacy definition that is stronger than standard indistinguishability-based privacy. Further, we show that two extant concrete ABS constructions satisfy this simulation-based privacy definition and are therefore UC secure. The two concrete constructions are the schemes by Sakai et al. (PKC'16) and by Maji et al. (CT-RSA'11). Additionally, we identify the common feature that allows these schemes to meet our privacy definition, giving us further insights into the security requirements of ABS.
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
-- The first construction of lossy TDFs based on the Decisional Diffie-Hellman (DDH) assumption with image size linear in input size, while retaining the lossiness rate of [Peikert-Waters STOC 2008].
-- The first construction of deterministic-encryption schemes for block-source inputs (both for the CPA and CCA cases) based on the Computational Diffie-Hellman (CDH) assumption. Moreover, by applying our efficiency-enhancing techniques, we obtain CDH-based schemes with ciphertext size linear in plaintext size.
Prior to our work, all DDH-based constructions of lossy TDFs had image size quadratic in input size. Moreover, all previous constructions of deterministic encryption based even on the stronger DDH assumption incurred a quadratic gap between the ciphertext and plaintext sizes. At a high level, we break the previous quadratic barriers by introducing novel techniques for encoding input bits via hardcore output bits with the use of erasure-resilient codes. All previous schemes used group elements for encoding input bits, resulting in quadratic blowup.
Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
George Teseleanu
Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
The $\textit{DCA adversary}$ is $\textit{passive}$, and so does not exploit the full power of the white-box setting, implying that many white-box schemes are insecure even in a weaker setting than the one they were designed for. An important problem is therefore how to develop implementations which are resistant to this attack. A natural approach is to apply standard side-channel countermeasures such as $\textit{masking}$ and $\textit{shuffling}$. In this paper, we study the security brought by this approach against the DCA adversary. We show that under some necessary conditions on the underlying randomness generation, these countermeasures provide resistance to standard (first-order) DCA. Furthermore, we introduce $\textit{higher-order DCA}$, and analyze the security of the countermeasures against this attack. This attack is enhanced by introducing a $\textit{multivariate}$ version based on the maximum likelihood approach. We derive analytic expressions for the complexity of the attacks which are backed up through extensive attack experiments. As a result, we can quantify the security level of a masked and shuffled implementation in the (higher-order) DCA setting. This enables a designer to choose appropriate implementation parameters in order to obtain the desired level of protection against passive DCA attacks.
22 September 2018
Information Security Group (ISG), Royal Holloway University of London
Applications are invited for the post of Lecturer in the Information Security Group (ISG) at Royal Holloway, University of London.
The post holder will contribute to the research and teaching of the ISG and will be expected to work as part of the Smart Card and IoT Security Centre (see https://scc.rhul.ac.uk). The applicant will have a research profile that fits the wide range of research undertaken within the ISG (https://www.royalholloway.ac.uk/research-and-teaching/departments-and-schools/information-security/research/our-research-areas/) but we are particularly interested in applicants who will be able to drive forward research related to the Internet of Things (IoT) and cyber physical system security. The applicant should ideally have experience in the creation and/or revision, delivery and assessment of postgraduate (MSc) and undergraduate teaching modules across a range of topics in information/cyber security.
Applicants should have a Ph.D. and research in the discipline and have a sound knowledge of information/cyber security. Applicants should be able to demonstrate an enthusiasm for research as well as teaching and communicating with diverse audiences, as well as a good awareness of contemporary issues relating to cyber security.
This is a full time permanent post, with a preferred start date as soon as possible, although there is some flexibility. This post is based in Egham, Surrey, where the College is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London.
For an informal discussion about the post, please contact the head of department, Peter Komisarczuk peter.komisarczuk (at) rhul.ac.uk or the director of the Smart Card and IoT Centre, Kostas Markantonakis K.Markantonakis (at) rhul.ac.uk.
Closing date for applications: 30 September 2018
Contact:
Peter Komisarczuk, Head of Department, Information Security Group, School of Mathematics and Information Security, Royal Holloway University of London, Egham, Surrey, TW20 0EX, UK. Email: peter.komisarczuk (at) rhul.ac.uk Tel: +44 (0)784443089.
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0818-357
University of Texas at San Antonio
The Department of Computer Science at the University of Texas at San Antonio (UTSA) is seeking a dynamic Department Chair that can lead a department of preeminence in an extraordinary diverse University that is focused on a significant expansion of its research mission. The Department seeks exceptional candidates with (1) a record of high quality scholarship and competitive research with federal, state, and industry funding, (2) experience and leadership in institutions of higher education, industry, or professional organizations, (3) an understanding of pedagogies that will lead to student success and excellence in undergraduate and graduate teaching, (4) experience leading interdisciplinary teams, and (5) mentorship experience and a commitment to inclusion and diversity. The University of Texas at San Antonio is designated a National Center of Academic Excellence in Cyber Operations and has just been approved for $70 million in funding to construct two new facilities – A National Security Collaboration Center and a proposed School of Data Science. The Computer Science Department has 23 full-time faculty, 8 full-time lecturers, 1,300 undergraduate students, 70 M.S., and 60 Ph.D. students. The successful candidate must have a doctorate in computer science or closely related field, with outstanding research and teaching records that warrant an appointment at the rank of full professor with tenure. Tenure is contingent upon Board of Regents approval.
See http://apptrkr.com/1295217 for information on the Department and application instructions. Screening of applications will begin on November 15, 2018. The search will continue until the position is filled or the search is closed. The University of Texas at San Antonio is an Affirmative Action/Equal Opportunity Employer. Women, minorities, veterans, and individuals with disabilities are encouraged to apply.
Closing date for applications:
More information: http://apptrkr.com/1295217