IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 October 2018
Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
We implement the gadget toolkit in PALISADE and evaluate the performance of our algorithms both in terms of runtime and noise growth. We illustrate the improvements due to our algorithms by implementing a concrete complex application, key-policy attribute-based encryption (KP-ABE), which was previously considered impractical for CPU systems (except for a very small number of attributes). Our runtime improvements for the main bottleneck operation based on subgaussian sampling range from 18x (for 2 attributes) to 289x (for 16 attributes; the maximum number supported by a previous implementation). Our results are applicable to a wide range of other advanced applications in lattice cryptography, such as GSW-based homomorphic encryption schemes, leveled fully homomorphic signatures, key-hiding PRFs and other forms of ABE, some program obfuscation constructions, and more.
Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
Our main result is a simple lower bound that allows us to show that known encodings for many predicates considered in the cryptographic literature such as greater than and threshold are essentially optimal for prime modulus $q$. Using this approach, we also prove lower bounds on encodings for composite $q$, and then show tight upper bounds for such predicates as greater than, index and disjointness.
Tokyo, Japan, 28 August - 30 August 2019
Submission deadline: 15 March 2019
Notification: 15 May 2019
07 October 2018
Chongqing, China, 8 May - 10 May 2019
Submission deadline: 24 November 2018
Notification: 12 January 2019
05 October 2018
Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
Motivated by the emerging applications of UCs in various privacy preserving computation scenarios, we revisit Valiant's universal circuits, and propose a size-optimal 4-way supernode of size 18, and an EUG of size $4.5n\log n$. As a practical consequence, we reduce the size of universal circuits (and the number of AND gates) by more than 5\% in general (rather than just for small-size circuits in particular), and thus improve upon the efficiency of UC-based cryptographic applications accordingly. Our approach to the design of optimal supernodes is computer aided (rather than by hand as in previous works), which might be of independent interests. As a complement, we give lower bounds on the size of EUGs and UCs in Valiant's framework, which significantly improves upon the generic lower bound on UC size and therefore reduces the gap between theory and practice of universal circuits.
Carsten Baum, Bernardo David, Rafael Dowsley
We present a highly efficient protocol which allows public verification of cheating behavior during the output stage. This scheme is constructed using a publicly verifiable homomorphic commitment scheme, for which we propose an efficient construction. Furthermore, we construct a compiler that uses any such scheme together with a Smart Contract to implement Insured MPC. This compiler requires a standard (non-private) Smart Contract. Our results are proven in the Universal Composability framework using a Global Random Oracle as the setup assumption. From a theoretical perspective, our general results provide the first characterization of sufficient properties that MPC protocols must achieve in order to be efficiently combined with Cryptocurrencies, as well as insights on publicly verifiable protocols. On the other hand, all our constructions and protocols are highly efficient and allow for a fast implementation.
Andreas Lochbihler, S. Reza Sefidgar
Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
Ishai et al. (Eurocrypt 2011) showed how to construct NISC protocols that only use parallel calls to an ideal oblivious transfer (OT) oracle, and additionally make only a black-box use of any pseudorandom generator. Combined with the efficient 2-message OT protocol of Peikert et al. (Crypto 2008), this leads to a practical approach to NISC that has been implemented in subsequent works. However, a major limitation of all known OT-based NISC protocols is that they are subject to selective failure attacks that allows a malicious sender to entirely compromise the security of the protocol when the receiver's first message is reused.
Motivated by the failure of the OT-based approach, we consider the problem of basing \emph{reusable} NISC on parallel invocations of a standard arithmetic generalization of OT known as oblivious linear-function evaluation (OLE). We obtain the following results:
- We construct an information-theoretically secure reusable NISC protocol for arithmetic branching programs and general zero-knowledge functionalities in the OLE-hybrid model. Our zero-knowledge protocol only makes an absolute constant number of OLE calls per gate in an arithmetic circuit whose satisfiability is being proved. As a corollary, we get reusable NISC/OLE for general Boolean circuits using any one-way function. - We complement this by a negative result, showing that reusable NISC/OT is impossible to achieve, and a more restricted negative result for the case of the zero-knowledge functionality. This provides a formal justification for the need to replace OT by OLE. - We build a universally composable 2-message OLE protocol in the CRS model that can be based on the security of Paillier encryption and requires only a constant number of modular exponentiations. This provides the first arithmetic analogue of the 2-message OT protocols of Peikert et al. (Crypto 2008). - By combining our NISC/OLE protocol and the 2-message OLE protocol, we get protocols with new attractive asymptotic and concrete efficiency features. In particular, we get the first (designated-verifier) NIZK protocols where following a statement-independent preprocessing, both proving and verifying are entirely ``non-cryptographic'' and involve only a constant computational overhead.
Marcella Hastings, Nadia Heninger, Eric Wustrow
Iraklis Leontiadis, Serge Vaudenay
Despite the merits of the message franking protocols [GLR17], our observation which launched this work, is that all the designs be it compositional or the CEP construction, leak too much when the receiver needs to open the abusive message to the third party. Namely, the receiver opens the entire message along with the opening key to the third party, thus confidentiality of the message is entirely broken. Moreover, the opening of the entire message increases the communication cost of the protocol and in cases of big messages being exchanged (attachments, videos, multimedia files, etc.) it might be unnecessary. We provide to the best of our knowledge the first formal treatment of message franking protocols with minimum leakage whereby only the abusive blocks are opened, while the rest non-abusive blocks of the message remain private.
First we give a new definition for multi-opening indistinguishability with partial opening (MO-IND-PO), which forces an adversary to distinguish encryptions of abusive blocks. We then design and analyze two protocols CEP-AOP1 (Committing Encrypt and PRF with After Opening Privacy) and CEP-AOP2, which adhere to the new privacy definition. As a side contribution we show a multi-opening secure CEP-AOP2 construction using only one PRF evaluation over the message, in a weaker but meaningful security model, relying only on standard assumptions of the underlying symmetric primitives.
Mathias Wagner, Stefan Heyse
04 October 2018
Stockholm, Sweden, 16 June - 20 June 2018
Submission deadline: 11 November 2018
Notification: 3 December 2018
Thessaloniki, Greece, 7 December - 9 December 2018
Submission deadline: 1 November 2018
03 October 2018
DarkMatter, Abu Dhabi
Design, implement and deploy cryptographic algorithms tailored for a cloud environment.
Conduct research and development in differential privacy, secret sharing, multi-party secure computation and fully homomorphic encryption.
Perform security assessments of crypto-primitives, cryptosystems and cloud security solutions at the theoretical and implementation level.
Work closely with the other teams in the organization to design and deploy safe cloud-based solutions .
Be involved in the integration of developed cryptosystems within DarkMatter products.
Enjoy all the cultural, educational and travel opportunities Abu Dhabi offers
To bring your dream to life, you’ll need:
PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics or Computer Science.
Extensive experience developing in various programming languages.
A desire to innovate in the UAE
Closing date for applications: 3 March 2019
Contact: Sheila Morjaria
Mehdi Messaoudi
More information: https://grnh.se/d694fd601
DarkMatter, Abu Dhabi
• Design, implement and deploy cryptographic algorithms tailored for resource-constrained devices.
• Conduct research and development in lightweight cryptography.
• Perform security assessments of crypto-primitives and cryptosystems suitable for resource-constrained devices at the theoretical and implementation level.
• Work closely with the other teams in the organization to deploy secure embedded systems.
• Be involved in the integration of developed cryptosystems within DarkMatter products.
• Enjoy all the cultural, educational and travel opportunities Abu Dhabi offers.
To bring your dream to life, you’ll need:
• MS or PhD degree in Computer Science, Computer Engineering, Electrical Engineering, Cryptography or related field.
• Development experience within embedded systems, RFID and sensor networks.
• Knowledge of Unix/Linux environments and kernel development.
• Knowledge of one or more of the following: Microcontrollers, SoC, TrustZone, ARM processors, performance optimization, bootloading, firmware, x86 assembly, system BIOS or hardware/software integration.
• Knowledge of side-channel attacks and countermeasures.
• Experience coding in C/C++.
• A desire to innovate in the UAE
Closing date for applications: 3 April 2019
Contact: Sheila Morjaria
Mehdi Messaoudi
More information: https://grnh.se/fb5c073f1
Cloudflare
Cloudflare’s Technology team is working on building the future of Cloudflare by tackling strategic projects that have a large impact on the way Cloudflare systems, and the Internet at large, work. Engineers in the Technology team are expected to research new ideas and technologies, dive into existing codebases to make meaningful changes, work independently on greenfield projects, and collaborate closely with the engineering organization to achieve common goals.
The Cryptography team is a sub-team of the Technology team focused on solving difficult problems in security, performance, and privacy at scale using cryptographic tools. This involves systems engineering, open source software development, protocol design, the implementation of cryptographic primitives, contributions to cutting-edge research in collaboration with academia, participation in Internet standards organizations like the IETF, and more.
Closing date for applications: 1 July 2019
Contact: Nick Sullivan
More information: https://www.cloudflare.com/careers/departments/technology-research/
Technical University of Denmark
The department, DTU Compute, is an internationally unique academic environment spanning the science disciplines mathematics, statistics and computer science. At the same time, we are an engineering department covering informatics and communication technologies (ICT) in their broadest sense. Finally, we play a major role in addressing the societal challenges of the digital society where ICT is a part of every industry, service, and human endeavor.
Responsibilities and tasks
Through the position, the University seeks to strengthen the research within cyber security. The cyber security section at DTU has experts in cryptology, in particular the design and analysis of ciphers and hash functions, but wishes to further strengthen its research within cryptology.
Topics of particular interest include but are not limited to:
• symmetric cryptology
• lightweight and resource-efficient cryptography
• post-quantum cryptology
• provable security of cryptographic primitives
• side-channel attacks and physical cryptanalysis
• analysis and protection of cryptographic implementations
• algorithmic aspects of cryptology
• efficient implementation of cryptographic primitives
Candidates with strong expertise in any other area of cryptology are also encouraged to apply.
Application procedure
To apply, please read the full job advertisement at www.career.dtu.dk
Please submit your online application no later than 1 December 2018.
Closing date for applications: 31 December 2018
02 October 2018
Singapore University of Technology and Design (SUTD), Singapore
Closing date for applications: 8 January 2019
Contact: Prof. Jianying Zhou
Email: jianying_zhou (at) sutd.edu.sg
More information: http://jianying.space/
Graz University of Technology
At the Graz University of Technology / Faculty of Computer Science and Biomedical Engineering the position of
University Professor of Information Security
is to be filled at the institute of Applied Information Processing and Communications (IAIK) as a full time permanent position according to section 98 of the Austrian Universities Act (§98 UG). IAIK is an internationally visible research center at TU Graz where more than 60 researchers work on a multitude of topics in information security.
We are seeking a candidate with proven scientific expertise who will represent the field of Information Security in research and teaching. The successful candidate will complement existing strengths at the institute and be an engaged teacher in the Computer Science programs at the bachelor, master, and PhD level.
Closing date for applications: 3 December 2018
Contact: Stefan Mangard, Email: Stefan.Mangard (at) iaik.tugraz.at
More information: https://www.tugraz.at/fakultaeten/infbio/news/vacancies/professor-of-information-security/