IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
25 May 2020
Barcelona, Spain, 27 May 2020
Event CalendarIMDEA Software Institute, Madrid (Spain)
Job PostingApplications are invited for multiple PhD student positions at the IMDEA Software Institute, Madrid, Spain.
Selected candidates will work under the supervision of Marco Guarnieri on the design, verification, and implementation of countermeasures against CPU micro-architectural attacks.
The specific topic of the research will be determined based on the common interests of the candidate and the supervisor.
The positions are fully funded by a research grant from Intel Corporation.
How to apply?
Applicants interested in the position should submit their application at https://careers.software.imdea.org/ selecting option 5 - PhD Student and reference code 2020-05-phd-uarchsec.
Questions
For any questions about these positions, please contact Marco Guarnieri directly (marco dot guarnieri at imdea dot org).
Closing date for applications:
Contact:
Marco Guarnieri, Assistant Professor @ IMDEA Software
Email: marco dot guarnieri at imdea dot org
Website: https://mguarnieri.github.io
More information: https://software.imdea.org/open_positions/2020-05-phd-uarchsec.html
University of Warwick, UK
Job PostingWe have two post-docs posts (Research Fellow and Senior Research Fellow, each for up to 4 years) available in the Department of Computer Science, University of Warwick, as part of a 4-year EPSRC project on "End to End Authentication of Caller ID in Heterogeneous Telephony Systems", working with Professor Feng Hao (PI) and Dr Adrian Von Mühlenen (co-I). The primary aim of this project is to improve security in telecommunication systems, in particular, providing reliable authentication of the caller ID without requiring any PKI, and protecting end-to-end privacy of the call contents.
The candidates will join a dynamic and growing team of security researchers in the Department of Computer Science, University of Warwick. Warwick Computer Science is ranked 1st in research output, 2nd in research impact, and 2nd overall among all computer science departments in the UK based on REF 2014. The candidates will have the flexibility to collaborate with other members in the security team on a wider range of topics, such as key exchange, e-voting, e-auction, PUF, cryptocurrency, mobile security, IoT, web security and e-payment security. Our work has been largely driven by tackling real-world security problems. Candidates who have a strong interest in working on real-world problems for practical impacts are encouraged to apply. Those who have industrial experiences are also most welcome to apply.
- Research fellow: https://tinyurl.com/y8spmtb5
- Senior research fellow (equivalent grade as Assistant Professor): https://tinyurl.com/ybjyqzh4
Application deadline: 17 June, 2020. After the deadline, the posts will be vacant until they are filled. Interested candidates are encouraged to contact Prof Feng Hao with an expression of interest as early as possible.
Closing date for applications:
Contact: Professor Feng Hao (feng.hao@warwick.ac.uk)
Radboud University, Nijmegen
Job PostingWe offer one 2-year and one 3-year position as postdoctoral researcher in the area of symmetric cryptography.
The positions will be fulfilled within the Digital Security group at Radboud University in Nijmegen in the team led by Joan Daemen and Bart Mennink. Your main tasks will be to perform research and supervise that of the PhD of our ESCADA and SCALAR teams and master students. The research subjects are cryptanalysis and design of primitives, provable security of modes of use, implementation attacks and countermeasures. We concentrate on cryptography based on permutations as in the sponge, duplex and farfalle constructions. As such, we are building an alternative for block cipher based cryptography, both in the lightweight as in the high-performance arena.
There are possibilities for teaching courses within our BSc in Cyber Security program and MSc in Computer Security.
The starting date is negotiable but is preferably not later than October.
The successful candidate should ideally have a PhD in Computer Science, Mathematics, or Electrical engineering and a good publication record in the area.
Applications will be considered until the position is filled.
Closing date for applications:
Contact: Joan Daemen, joan (at) cs.ru.nl and Bart Mennink, b.mennink (at) cs.ru.nl
22 May 2020
T-H. Hubert Chan, Wei-Kai Lin, Kartik Nayak, Elaine Shi
ePrint ReportThe first result is a new perfectly secure OPRAM scheme with $O(\log^3 N/\log \log N)$ expected overhead. In comparison, the prior literature has been stuck at $O(\log^3 N)$ for more than a decade.
The second result is a new perfectly secure OPRAM scheme with $O(\log^4 N/\log \log N)$ worst-case overhead. To the best of our knowledge, this is the first perfectly secure OPRAM scheme with polylogarithmic worst-case overhead. Prior to our work, the state of the art is a perfectly secure ORAM scheme with more than $\sqrt{N}$ worst-case overhead, and the result does not generalize to a parallel setting. Our work advances the theoretical understanding of the asymptotic complexity of perfectly secure OPRAMs.
Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
ePrint ReportArghya Bhattarcharjee, Avijit Dutta, Eik List, Mridul Nandi
ePrint ReportAmir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
ePrint ReportSaikrishna Badrinarayanan, Peihan Miao, Peter Rindal
ePrint ReportFor both functionalities, we show that any protocol must have communication complexity $\Omega(nT)$. We build protocols with a matching upper bound of $O(nT)$ communication complexity for both functionalities assuming threshold FHE. We also construct a computationally more efficient protocol for the second functionality with communication complexity $\tO(nT^2)$ under a weaker assumption of threshold additive homomorphic encryption.
As a consequence, we achieve the first "regular" multi-party PSI protocol where the communication complexity only grows with the size of the set difference and does not depend on the size of the input sets.
Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
ePrint ReportWe introduce two new formulations of the private matching for compute problem meeting these requirements, called private-ID and streaming private secret shared set intersection, and design new DDH-based constructions for both. Our implementation shows that when taking advantage of the inherent parallelizability of these solutions, we can execute the matching for datasets of size upto 100 million records within an hour.
Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
ePrint ReportIn the case when non-membership witnesses are issued using the $RS$-based construction (with $RS$ kept secret by the Manager), we show that a group of colluding users can reconstruct the $RS$ and compute witnesses for arbitrary new elements. In particular, if the accumulator is initialized by adding $m$ secret elements, $m$ colluding users that share their non-membership witnesses will succeed in such attack.
Kalle Ngo, Elena Dubrova, Michail Moraitis
ePrint ReportTore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, and Dominique Unruh
ePrint ReportMasahito Ishizaka, Shinsaku Kiyomoto
ePrint ReportJean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
ePrint ReportClaire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
ePrint ReportNishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
ePrint ReportAt the heart of our framework lies a highly-efficient, maliciously-secure, three-party computation (3PC) over rings that provides guaranteed output delivery (GOD) in the honest-majority setting. To the best of our knowledge, SWIFT is the first robust and efficient PPML framework in the 3PC setting. SWIFT is as fast as the best-known 3PC framework BLAZE (Patra et al. NDSS'20) which only achieves fairness. We extend our 3PC framework for four parties (4PC). In this regime, SWIFT is as fast as the best known fair 4PC framework Trident (Chaudhari et al. NDSS'20) and twice faster than the best-known robust 4PC framework FLASH (Byali et al. PETS'20).
We demonstrate the practical relevance of our framework by benchmarking two important applications-- i) ML algorithms: Logistic Regression and Neural Network, and ii) Biometric matching, both over a 64-bit ring in WAN setting. Our readings reflect our claims as above.
Fukang Liu, Takanori Isobe, Willi Meier
ePrint ReportJun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
ePrint ReportIn this paper, we are the first to resolve this long-standing question. We show how to achieve BB in expected $O((n/(n-f))^2)$ rounds. In particular, even when 99\% of the nodes are corrupt we can achieve expected constant rounds.Our results hold under both a static adversary and a weakly adaptive adversary who cannot perform ``after-the-fact removal'' of messages already sent by a node before it becomes corrupt.