IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 November 2018
Chalmers University of Technology, Sweden
The position is fully funded for 2 years and it would be extended under conditions for 2 more.
The post-doc will be hired at the department of Computer Science and Engineering at Chalmers and will be working under the supervision of Prof. Katerina Mitrokotsa.
The preferred starting date is in April 2019.
To apply send an email with subject: post-doc in cryptography and the following documents:
- CV, research statement, list of publications and names of at least two referees
Closing date for applications: 5 January 2019
Contact: Katerina Mitrokotsa
Associate Professor,
Chalmers University of Technology
Department of Computer Science and Engineering,
Gothenburg, Sweden
More information: http://www.cse.chalmers.se/~aikmitr/
University of Waterloo, Waterloo, Ontario, Canada
PDF applicants with a recent PhD in Computer/Electrical Engineering or Computer Science and publications at premium venues are encouraged to send their CVs and cover letters via email to ahasan at uwaterloo.ca.
PhD student applicants with mathematical maturity and research experience in cryptographic engineering or applied cryptography, who meet the admission requirements for the PhD program in Electrical and Computer Engineering at the University of Waterloo, are encouraged to apply online following this link https://uwaterloo.ca/electrical-computer-engineering/future-graduate-students/programs
Closing date for applications: 11 January 2019
Canadian Institute for Cybersecurity (CIC)
Position Description:
We are currently looking for PhD and Post-doc researchers to fill various roles within our cyber security research and projects.
Required skills and experience:
- A computer science degree (Master for PhD candidates, PhD for Post-doc candidates) with expertise in network and information security, networking, and other relevant research area. (completed by the start of appointment)
- Strong communication and writing skills.
- Ability to do independent research, as well as to work collaboratively with other team members.
Helpful skills and experience:
- Application development using Java and Python
- Technical abilities in systems design, coding, testing, debugging, and maintenance.
- Demonstrated experience with the design and implementation of large networked and security systems.
Applications will be considered until the available positions are filled. To apply please include your curriculum vitae and the following:
- Research experience (projects, publications, etc.)
- Two representative publications (post-doc candidates)
- Proof of language proficiency (international applicants)
- Contact information (email, address, phone) of three references
Closing date for applications: 30 April 2019
Contact:
Arash Habibi Lashkari, PhD
Assistant Professor and Research Coordinator
Canadian Institute for Cybersecurity (CIC)
University of New Brunswick (UNB)
Fredericton, NB, Canada
A.habibi.l (at) unb.ca
More information: http://www.unb.ca/cic
University of Birmingham
Previous work in this field would be a plus but is not required. Generally, a strong background in algorithmic number theory, cryptographic protocols, cryptanalysis and/or applied cryptography is sought.
The position is for up to 30 months.
Informal inquiries are welcome.
Closing date for applications: 3 January 2019
Contact: Christophe Petit christophe.f.petit (at) gmail.com
More information: https://atsv7.wcn.co.uk/search_engine/jobs.cgi?SID=amNvZGU9MTc2OTA5NiZ2dF90ZW1wbGF0ZT03Njcmb3duZXI9NTAzMjUyMSZvd25lcnR5c
University of Birmingham
The ideal candidate will have a master in Mathematics, Computer Science or Electrical Engineering. Previous knowledge in cryptography and/or number theory is a plus.
Informal inquiries welcome.
Closing date for applications: 14 January 2019
Contact: Christophe Petit christophe.f.petit (at) gmail.com
More information: https://www.birmingham.ac.uk/postgraduate/courses/findaphd.aspx
RWC 2019 will be held January 9-11 in San Jose, California, USA.
29 November 2018
Viet Tung Hoang, Phillip Rogaway
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
Simon-Philipp Merz, Christophe Petit
Our decomposition algorithm yields a universal forgery attack on WalnutDSA^TM, which is one of the 20 proposed signature schemes that are being considered by NIST for standardization of quantum-resistant public-key cryptographic algorithms. Our attack on WalnutDSA^TM can universally forge signatures within seconds for both the 128-bit and 256-bit security level, given one random message-signature pair. The attack worked on 99.8% and 100% of signatures for the 128-bit and 256-bit security levels in our experiments.
Furthermore, we show that the decomposition algorithm can be used to solve instances of the conjugacy search problem and decomposition search problem in braid groups. These problems are at the heart of other cryptographic schemes based on braid groups.
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
Antonio Faonio
In this paper we show two new constructions in the standard model where the above limitation is avoided. Specifically, the first scheme achieves slack parameter $O(1/\lambda)$ where $\lambda$ is the security parameter and it is based on standard number theoretic assumptions, the second scheme achieves optimal slack parameter (i.e. $\gamma = 1$) and it is based on knowledge of the exponent assumptions. Our constructions are efficient and have leakage rate $1 - o(1)$, most notably our second construction has signature size of only 8 group elements which makes it the leakage-resilient signature scheme with the shortest signature size known to the best of our knowledge.
Kexin Hu, Zhenfeng Zhang, Kaiven Guo
28 November 2018
Ashutosh Kumar, Raghu Meka, Amit Sahai
We give an unconditional compiler that transforms any standard secret sharing scheme with arbitrary access structure into a $p$-party leakage-resilient one for $p$ logarithmic in the number of parties. This yields the first secret sharing schemes secure against adaptive and joint leakage for more than two parties.
As a natural extension, we initiate the study of leakage-resilient non-malleable secret sharing} and build such schemes for general access structures. We empower the computationally unbounded adversary to adaptively leak from the shares and then use the leakage to tamper with each of the shares arbitrarily and independently. Leveraging our $p$-party leakage-resilient schemes, we also construct such non-malleable secret sharing schemes: any such tampering either preserves the secret or completely `destroys' it. This improves upon the non-malleable secret sharing scheme of Goyal and Kumar (CRYPTO 2018) where no leakage was permitted. Leakage-resilient non-malleable codes can be seen as 2-out-of-2 schemes satisfying our guarantee and have already found several applications in cryptography [LL12,ADKO15,GKPRS18,GK18,CL18,OPVV18].
Our constructions rely on a clean connection we draw to communication complexity in the well-studied number-on-forehead (NOF) model and rely on functions that have strong communication-complexity lower bounds in the NOF model (in a black-box way). We get efficient $p$-party leakage-resilient schemes for $p$ upto $O(\log n)$ as our share sizes have exponential dependence on $p$. We observe that improving this dependence from $2^{O(p)}$ to $2^{o(p)}$ will lead to progress on longstanding open problems in complexity theory.
Jasper Scholten
S. Sharmila Deva Selvi , Arinjita Paul, C. Pandu Rangan
Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
Furthermore, by applying this new technique to Litecoin and its child cryptocur rencies, we are able to provide the first extensive view and lower bound on the stale block and fork rate in the Litecoin network. Finally, we outline that a recovery of other important metrics and blockchain characteristics through merged mining may also be possible.