IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 November 2020
Marco Calderini, Lilya Budaghyan, Claude Carlet
Poulami Das, Julia Hesse, Anja Lehmann
DPASE offers strong security and usability, such as protecting the user's password against online and offline attacks, and ensuring message privacy and ciphertext integrity as long as at least one server is honest. We formally define the desired security properties in the UC framework and propose a provably secure instantiation. The core of our protocol is a new type of OPRF that allows to extend a previous partially-blind-query with a follow-up request and will be used to blindly carry over passwords across evaluations and avoid online attacks. Our (proof-of-concept) implementation of DPASE uses $10$ exponentiations at the user, $4$ exponentiations and $2$ pairings at each server, takes $105.58$ ms to run with $2$ servers and has a server throughput of $40$ encryptions per second.
Morten Øygarden, Patrick Felke, Håvard Raddum
Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
In this work, we close this gap by presenting \textsc{PayMo}, the first payment channel protocol that is fully compatible with Monero. \textsc{PayMo} does not require any modification of Monero and can be readily used to perform off-chain payments. Notably, transactions in \textsc{PayMo} are identical to standard transactions in Monero, therefore not hampering the coins' fungibility. Using \textsc{PayMo}, we also construct the first fully compatible secure atomic-swap protocol for Monero: One can now securely swap a token of Monero with a token of several major cryptocurrencies such as Bitcoin, Ethereum, Ripple, Cardano, etc. Before our work, it was not known how to implement secure atomic swaps protocols for Monero without forcing a hard fork. Our main technical contribution is a new construction of an efficient verifiable timed linkable ring signature, where signatures can be hidden for a pre-determined amount of time, in a verifiable way. Our scheme is fully compatible with the transaction scheme of Monero and it might be of independent interest. We implemented \textsc{PayMo} and our results show that, even with high network latency and with a single CPU core, two regular users can perform up to 93500 payments over a span of 2 minutes (the block production rate of Monero). This is approximately five orders of magnitude improvement over the current payment rate of Monero.
SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures
Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
While those legacy systems are preferred for their stability, reliability, availability, and security properties, in adapting the frontends and services many security and privacy issues can occur. Clearly, this issues are arising as those systems have been designed decades ago, without considering the enormous amounts of data that they are required to handle and also considering different threat scenarios. Moreover, the trend towards using new technologies such as Distributed Ledger Technologies (DLT) has also emerged in the financial sector. As the nodes in DLT systems are decentralized, additional security threats come to light.
The focus of this work is the security of financial technologies in the FinTech domain. We provide relevant categorization and taxonomies for a better understanding of the main cyber-attack types, and suitable countermeasures. Our findings are supported by using security-by-design principles for some selected critical financial use-cases, and include a detailed discussion of the resulting threats, attack vectors and security recommendations.
Radboud University, The Netherlands
To further strengthen and complement the expertise in our group, we are looking for outstanding researchers and teachers in the area of computer security. We have three faculty openings at the Assistant Professor, Associate Professor or Full Professor level (depending on the candidates, different combinations are possible). Possible focus areas for these positions include, but are not limited to, systems security, network security, hardware security, security analysis, usability of security, cryptography, formal methods in security, and privacy-enhancing technologies.
In the Master's programme in Computing Science our group is responsible for the specialisation in cybersecurity, and together with the Data Science group we are setting up a joint specialisation in cybersecurity and artificial intelligence (AI). As we seek to broaden our field of expertise, we especially encourage candidates in computer security disciplines outside the field of cryptography and those with expertise in both computer security and AI to apply. In view of our group's current gender balance, we strongly encourage qualified women to apply.
As we have multiple positions at different seniority levels available, the required qualifications for each of the three levels are different.
You will be appointed in the Digital Security Group at the Institute for Computing and Information Sciences (iCIS) of the Faculty of Science. The faculty is internationally renowned for the quality of its research. The Digital Security Group is one of the leading groups in computer security in the Netherlands and Europe, with, for example, 4 ERC grants in the last decade and strong involvement in European projects.
Closing date for applications:
Contact: Prof.dr.ir. Joan Daemen, joan@cs.ru.nl
More information: https://www.ru.nl/english/working-at/vacature/details-vacature/?recid=1132394&pad=%2fenglish&doel=embed&taal=uk
Intrinsic ID, Eindhoven, The Netherlands
Intrinsic ID currently has four open positions to expand its R&D team in Eindhoven and support the development of Intrinsic ID’s security solutions and products.
Positions:
- Hardware Design Engineer
- Hardware Verification Engineer
- Embedded Security Engineer
- Sr. Embedded Software Engineer / Architect
- Competitive salary and benefits
- Career development opportunities in a fast-growing company
- Diverse and challenging problem-solving opportunities in a dynamic workplace
- An excellent working atmosphere
- The opportunity to be a part of a team with unparalleled experience in hardware and software security
Closing date for applications:
Contact: Geert-Jan Schrijen, CTO (Geert.Jan.Schrijen@intrinsic-id.com)
More information: https://www.intrinsic-id.com/company/careers/
Monash University, Malaysia campus
Closing date for applications:
Contact: Professor Raphaël Phan
More information: https://sites.google.com/monash.edu/postdoc/home
18 November 2020
Unione di Comuni della Romagna Forlivese, Italy, 23 July - 26 July 2021
Submission deadline: 1 February 2021
Notification: 15 April 2021
17 November 2020
Attendance is free but attendees are required to pay the IACR membership fee for 2022 if they have not already paid it (USD 50 for regular attendees and USD 25 for student attendee).
The conference program is coming soon - talks will be roughly 4pm UTC - 7.30pm UTC on January 11-14.
George Mason University, USA
The starting date can be anytime in Spring or Summer of 2021.
For more information and to apply please contact Prof. Foteini Baldimtsi at foteini@gmu.edu
Closing date for applications:
Contact: Foteini Baldimtsi
15 November 2020
Directors:
Masayuki Abe: 384
Britta Hale: 222
Tancrède Lepoint: 352
Emmanuel Thomé : 212
Moti Yung : 345
Congratulations to all elected members and thank to you all candidates for your contributions to the IACR and willingness to serve.
Election verification data can be found at https://vote.heliosvoting.org/helios/e/IACR2020Election.
Kevin "Kenny" Niehage
Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
11 November - 15 June 2021
Submission deadline: 15 June 2021
Notification: 30 June 2021
Cambridge, USA, 2 December - 3 December 2020
Rhodes, Greece, 26 July - 28 July 2021
Submission deadline: 15 February 2021
Notification: 12 April 2021
Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
1) We provide a round-preserving black-box compiler that compiles a wide class of MPC protocols into a circuit-scalable maliciously secure MPC in the plain model, assuming a (succinct) FE combiner. By using our compiler with a round-optimal MPC, we derive the first round-optimal and circuit-scalable maliciously secure MPC in the plain model.
2) We provide a round-preserving black-box compiler that compiles a wide class of MPC protocols into a circuit-independent---i.e., with CC that depends only on the input-output length of the circuit---maliciously secure MPC in the plain model, assuming Multi-Key Fully-Homomorphic Encryption (MFHE). Again, by using this second compiler with a round-optimal MPC, we derive the first round-optimal and circuit-independent maliciously secure MPC in the plain model. This is the best to-date CC for a round-optimal malicious MPC protocol, which is even communication-optimal when the output size of the function being evaluated is smaller than its input size (e.g., for boolean functions).
Our compilers assume the existence of four-round maliciously secure oblivious transfer which can be obtained from standard cryptographic assumptions.
Michael John Jacobson Jr., Prabhat Kushwaha
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
In this work, we first show that, even if all the above limitations/assumptions hold, a malicious verifier could still violate the zero-knowledge property by leveraging smart contracts. We show an ``attack of the clones'' that allows a malicious verifier to clone some of the stakeholder capabilities via a smart contract that is designed after the proof is received from the prover. This leaves open the question of constructing publicly verifiable zero-knowledge proofs from blockchains. Moreover, it raises the issue of using blockchains as setup assumptions since they evolve over time and could even become unreliable in the future. Then, we provide a publicly verifiable zero-knowledge proof system, based on any blockchain (i.e., not only proof-of-stake) that, very roughly, satisfies the following unpredictability property. Sufficiently many future honest blocks added to the blockchain contain a high min-entropy string in a specific location (e.g., a new wallet for cashing the mining reward). Our proof system is secure against a verifier/prover that can corrupt blockchain players adaptively. In particular, it remains zero knowledge even if the blockchain eventually collapses and all blockchain players are controlled by the zero-knowledge adversary.