IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
04 May 2020
Thomas Espitau, Antoine Joux, Natalia Kharchenko
Michael Scott
Myrto Arapinis, Nikolaos Lamprou, Lenka Marekova, Thomas Zacharias
Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
In this paper, we handle the necessary aspects in the definitions of the KEM to ensure the security claim is correct. In particular, we close the gap in the proof by defining the notion of a message-agnostic PKE for which decryption failures are independent of the encrypted message. We show that all the PKE underlying the BIKE versions are message-agnostic. This implies that BIKE with a decoder that has a sufficiently low DFR is also an IND-CCA KEM.
Avijit Dutta, Mridul Nandi
Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
Victoria Vysotskaya
Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
02 May 2020
Due to the current novel coronavirus outbreak, EUROCRYPT 2020 has been converted into an all-digital event, which will be taking place online during 11-15 May 2020.
Registration. The registration site (https://eurocrypt.iacr.org/2020/registration.php) for EUROCRYPT 2020 virtual attendance is now open. There will be no cost for virtual attendance itself but you have to register. If you have not already paid your IACR membership fee (USD 50 for regular members or USD 25 for student members) by attending a previous IACR event in 2020, you will need to pay that fee as part of registering for EUROCRYPT 2020.
Program. The program for EUROCRYPT 2020 is already available online (https://eurocrypt.iacr.org/2020/program.php). Sessions will be conducted as panel discussions in which authors give a very brief overview (5 minutes) of their papers, and then take live questions from the panel moderators and audience. There will also be links to papers and videos of longer talks by authors on their papers.
More details about virtual participation can be found here: https://eurocrypt.iacr.org/2020/participation.php
Dubai, UAE, UAE, 20 June - 21 June 2020
Submission deadline: 28 May 2020
Douthit Hills, USA, 5 May 2020
30 April 2020
Status
Closing date for applications:
Contact: Ceri Power CA29 FB53 97E3 0232 106A 2DE6 9F07 1B10 A0D1 12EB
More information: https://grnh.se/c967211f1us
Security & Privacy Group ( Academic Centre of Excellence in Cyber Security) University of Birmingham
One funded PhD position (International/EU/UK) in hardware security with attractive travel grant for attending conferences.
Closing date: 8th May
We expect the PhD candidate to have a strong background in programming, digital circuit design, hardware/software implementation of algorithms, etc.
For more information on 'Why PhD with us?' see my website. https://www.cs.bham.ac.uk/~sinharos/
The PhD will be working with Dr. Sujoy Sinha Roy and will be based at the Security and Privacy group of the University of Birmingham's School of Computer Science. The National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) jointly recognise the research group as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR).
If you are interested in the PhD position, please contact Dr. Sujoy Sinha Roy with a CV. For more information, please visit https://www.cs.bham.ac.uk/~sinharos/
Closing date for applications:
Contact: Dr. Sujoy Sinha Roy
Aalborg University (Copenhagen, Denmark)
Closing date for applications:
Contact: Emmanouil Vasilomanolakis
More information: https://www.stillinger.aau.dk/vis-stilling/?vacancy=1098638
University of Surrey, Department of Computer Science, Guildford, UK
We seek to appoint a lecturer in one or more of the following areas: machine learning, cloud computing, programming-languages principles, and the intersection of security and AI, which are already areas of research within the Department. We are also interested in candidates who have experience in data science, edge networks, social computing and DevOps security, in order to expand our research in new directions.
The Department is renowned for its security and artificial intelligence research, with publications in leading venues in artificial intelligence (TNNLS, TEVC, CBY, TSP, Machine Learning, Neural Computation, Bioinformatics, IJCAI, AAMAS), programming languages (FASE, PODC), security (CCS, S&P, Esorics, Euro S&P, CSF, TDSC, TIFS ), cryptography (Crypto, Eurocrypt), cloud computing and networking (InfoCOM, Trans. Networking), and web & social computing (WWW, ICWSM, and Web Science)
Notably,
We encourage ambitious post-docs and early career lecturers to apply.
Closing date for applications:
Contact: Professor Helen Treharne, Head of Department, (h.treharne@surrey.ac.uk)
More information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=020820
Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
However, current decentralized protocols, including DP3T and the protocol by Canetti, Trachtenberg and Varia, do not sufficiently protect infected users from having their status revealed to their contacts, which may raise fear of stigmatization.
By taking a dual approach, we propose a new and practical solution with stronger privacy guarantees even against active adversaries. In particular, we solve the aforementioned problem with additional pseudorandom warning identities that are associated to the broadcasted public identity, but this association is only known to a non-colluding dedicated server, which does not learn to whom the public identity belongs. Then, only these anonymous warning identities are published.
Moreover, our solution allows warned contacts to prove that they have been in contact with infected users, an important feature in times of restricted testing capacities. Among other additional security measures, we detail how the use of secret sharing can prevent the unnecessary and potentially panic-inducing warning of contacts that have only been around the infected person for a very brief time period.