IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 September 2022
Lúcás Críostóir Meier
In this work, we investigate the notion of time travel, formally defining models for adversaries equipped with a time machine, and exploring the consequences for cryptography. We find that being able to rewind time breaks some cryptographic schemes, and being able to freely move both forwards and backwards in time breaks even more schemes.
We look at the impacts of time travel on encryption and signatures in particular, finding that the $\text{IND-CCA}$ and $\text{EUF-CMA}$ security games are broken, while $\text{IND-CPA}$ and $\text{UUF-CMA}$ remain secure.
Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder
In this paper, we present a new CP-based method to search for ID and ZC distinguishers and extend it to a unified constraint optimization problem for finding full ID, ZC, and integral attacks. To show the effectiveness and usefulness of our method, we apply it to the ISO standard block cipher SKINNY and improve all of the existing ID, ZC, and integral attacks on it. In particular, we improve the integral attacks on SKINNY-$n$-$3n$ and SKINNY-$n$-$2n$ by 3 and 2 rounds, respectively, obtaining the best cryptanalytic results on these variants in the single-key setting. We improve the ZC attack on SKINNY-$n$-$2n$ and SKINNY-$n$-$n$ by 1 and 2 rounds, respectively. Applying our tool to discover ID attacks, we improve the ID attacks on all variants of SKINNY in the single-tweakey setting. Particularly, we improve the time complexity of the best previous single key ID attack on SKINNY-$128$-$256$ by a factor of $2^{22.57}$, while keeping the data and memory complexities much smaller. We also improve the ID attack on SKINNY-$n$-$3n$ in the related-tweakey setting. Our method is generic and applicable to other word-oriented block ciphers.
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
Rami Akeela, Weikeng Chen
- Yafa-108 is estimated to offer 108-bit security, which we parameterized to match the 102-bit security of BN254
- Yafa-146 is estimated to offer 146-bit security, which we parameterized to match the 131-bit security of BLS12-446 or 122-bit security of BLS12-381
We use these curves as an example to demonstrate two things:
- The "elastic" zero-knowledge proofs, Gemini (EUROCRYPT '22), is more than being elastic, but it is more curve-agnostic and hardware-friendly. - The cost of nonnative field arithmetics can be drastic, and the needs of application-specific curves may be inherent. This result serves as evidence of the necessity of EIP-1962, and the insufficiency of EIP-2537.
Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
In this work, we provide the first threshold linearly homomorphic encryption whose message space is $\mathbf{Z}/2^k\mathbf{Z}$ for any $k$. It is inspired by Castagnos and Laguillaumie's encryption scheme from RSA 2015, but works with a class group of discriminant whose factorisation is unknown.
Its natural structure à la Elgamal makes it possible to distribute the decryption among servers using linear integer secret sharing, allowing any access structure for the decryption policy. Furthermore its efficiency and its flexibility on the choice of the message space make it a good candidate for applications to multiparty computation.
Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
1) We describe a vulnerability in existing MPM implementations through a variation of the compromised-friend (CF) attack proposed by Angel et al. Our attack can compromise the exact metadata of any conversations between honest users.
2) We present a security definition for MPM systems assuming that some friends may be compromised.
3) We present a protocol satisfying our security definition based on Anysphere, an MPM system we deployed in practice.
Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
Any Muanalifah, Ayus Riana Isnawati
Hart Montgomery, Mark Zhandry
Our main result is that CDH for abelian group actions is quantumly *equivalent* to discrete log. Galbraith et al. (Mathematical Cryptology) previously showed *perfectly* solving CDH to be equivalent to discrete log quantumly; our result works for any non-negligible advantage. We also explore several other questions about group action and isogeny protocols.
04 September 2022
Jeju Island, South Korea, 15 December - 17 December 2022
Notification: 31 October 2022
National Sun Yat-sen University, Department of Computer Science and Engineering; Kaohsiung, Taiwan
Responsibilities: Apart from academic work, student must involve in several activities in a group or individually, such as (not limited to):
Requirements: Apart from the university's basic admission policies (https://cse.nsysu.edu.tw/?Lang=en), students are desired to have following key requirements:
Scholarship:
What students can expect:
What the supervisor can expect: Apart from academic and research works, students are expected to have
Deadline: Until September 2022 (for spring semester) and March 2023 (for fall semester)
Closing date for applications:
Contact: Arijit Karati (arijit.karati@mail.cse.nsysu.edu.tw)
Amazon (any US Location)
Closing date for applications:
Contact: Apply through link above
More information: https://www.amazon.jobs/en/jobs/2033486/sr-applied-cryptographer-ds-crypto
Nanyang Technological University, Singapore
- tool aided cryptanalysis, such as MILP, CP, STP, and SAT
- machine learning aided cryptanalysis and designs
- privacy-preserving friendly symmetric-key designs
- quantum cryptanalysis
- theory and proof
- threshold cryptography
- cryptanalysis against SHA-2, SHA-3 and AES
Closing date for applications:
Contact: Jian Guo, guojian@ntu.edu.sg, with subject [IACR-CATF]
More information: https://team.crypto.sg
CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
The group of Prof. Dr. Cas Cremers at CISPA has multiple open positions. CISPA is one of the leading research institutions in Information Security worldwide, and is situated in Saarbrücken, Germany.
Positions are fully funded and we offer at least two year contracts with optional extension.
We have several ongoing projects in the areas of:
- Provable security : methodologies and automation (e.g., (manual) computational proofs, our work on the Tamarin Prover, or other tools),
- Protocol design, and
- Secure messaging.
We highly welcome new directions, and appreciate applicants with a passion for projects that are different from, but possibly connected to, our ongoing research.
Positions are fully funded and full-time.
Application deadline: September 22, 2022.
For more information, please click the link (title) of this job posting.
Closing date for applications:
Contact: Cas Cremers
More information: https://cispa.saarland/group/cremers/positions/index.html
CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
The group of Prof. Dr. Cas Cremers at CISPA has open positions. CISPA is one of the leading research institutions in Information Security worldwide, and is situated in Saarbrücken, Germany.
We have several open projects in the areas of:- Provable security : methodologies and automation (e.g., (manual) computational proofs, our work on the Tamarin Prover, or other tools),
- Protocol design, and
- Secure messaging.
Positions are fully funded and full-time.
Application deadline: September 22, 2022.
For more information, please click the link (title) of this job posting.
Closing date for applications:
Contact: Cas Cremers
More information: https://cispa.saarland/group/cremers/positions/index.html