IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
02 June 2025
Cong Ling, Laura Luzzi, Hao Yan
Pouria Fallahpour, Serge Fehr, Yu-Hsuan Huang
We resolve this matter here by means of a novel UF-CMA-to-UF-NMA reduction that applies to FSwA and HSwA signature schemes simultaneously, and that offers an improved reduction loss (without making the zero-knowledge assumption more stringent).
Bishwajit Chakraborty, Mridul Nandi, Soumit Pal, Thomas Peyrin, Quan Quan Tan
Pierre-Alain Jacqmin, Jean Liénardy
We show that the protocols $\textrm{LP2}$ and $\textrm{LP3}$ of Boyd et al. do not satisfy the claimed security properties. We propose a new 2-message protocol based on them, called $\textrm{LP2+}$. This protocol is proved to satisfy correctness, weak synchronization robustness, entity authentication, key indistinguishability and, as a consequence, it admits perfect forward secrecy. An instantiation of $\textrm{LP2+}$ is presented, whose security only relies on that of a pseudo-random function (PRF). Its total execution time in normal cases is dominated by only 14 evaluations of the PRF, making it a lightweight protocol that is particularly well suited for resource-constrained environments such as IoT devices.
The flaws found in the security models as well as in the security arguments could have been avoided with precise and detailed proofs. We thus take this paper as an opportunity to advocate for thorough security proofs. Therefore, we have made the choice of rigor over concision.
Hans Heum
Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang
Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
Zhengrong Lu, Hongbo Yu, Xiaoen Lin, Sitong Yuan
Toomas Krips, Pille Pullonen-Raudvere
Xiaolin Duan, Fan Huang, Yaqi Wang, Honggang Hu
Roberto Avanzi, Bishwajit Chakraborty, Eik List
For each component of Vistrutah, we conducted a systematic evaluation of functions that can be efficiently implemented across different vector instruction set architectures. Our evaluation methodology combines latency estimation with security analysis, aiming to maximize the ratio of "bits of security per unit of time." This approach ensures we achieve the highest security or, equivalently, the best performance for this class of designs. Implementation results confirm the accuracy of our latency model.
We support our security claims with a comprehensive cryptanalysis.
A core design principle is the use of an inline key schedule: all round keys are computed during each encryption or decryption operation without requiring memory storage. Key schedules like the AES's must precompute and store round keys in memory for acceptable performance. This creates security vulnerabilities: such implementations become more susceptible to memory read oracles and, as demonstrated by Kamal and Youssef, more vulnerable to cold boot attacks. We consider these designs unsuitable for modern software security requirements. Vistrutah's approach minimizes leakage to at most one value during context switches. Furthermore, expensive key schedules reduce key agility, limiting the design of modes of operation.
Vistrutah is particularly well-suited for Birthday-Bound modes of operation, including Synthetic IV modes and Accordion modes for 256-bit block ciphers. It also serves effectively as a building block for compression functions (such as Matyas-Meyer-Oseas) in wide Merkle–Damg\aa rd hash functions. Additionally, it can implement "ZIP" wide pseudo-random functions as recently proposed by Flórez-Gutiérrez et al. in 2024.
Our cryptanalysis includes consideration of related-key security for two key reasons. First, strong related-key security demonstrates the robustness of both the key schedule and the cipher as a whole. Second, in counter-mode-based modes, Vistrutah's ability to change key with no overhead may allow the designer of a mode of operation to place counters (or values obtained from other update functions) in the key input rather than the plaintext input. This approach makes it easier to achieve Beyond the Birthday Bound security.
As a by-product of this research, we identified design flaws in Ghidle that affect both its security and performance. Our security analysis accounts for these weaknesses. We also developed Vistrutah-B, a variant of Vistrutah that addresses Ghidle's issues while maintaining comparable performance in most aspects. Nevertheless, Vistrutah retains superior diffusion properties.
Eylon Yogev, Shany Ben-David
Several positive results exist in incompressible cryptography. On the one hand, there are constructions based on minimal assumptions but with a poor rate (i.e., rate tends to 0). On the other hand, there are rate-1 constructions that achieve optimal efficiency but rely on strong cryptographic assumptions, such as obfuscation.
A stronger security notion, known as everlasting security, has been proposed for incompressible encryption. In this formulation, the second adversary, who receives the compressed state and the secret key, is allowed to be computationally unbounded. While this notion is conceptually appealing, no constructions of everlasting incompressible encryption are currently known, regardless of the underlying assumption or even in idealized models.
In this work, we give the first construction of everlasting incompressible encryption. In fact, we show that everlasting incompressible encryption is inherent in any sufficiently secure public-key encryption scheme. Specifically, we prove that any public-key encryption scheme with subexponential security (when instantiated with an appropriate security parameter) already satisfies the definition of everlasting incompressible encryption with subexponential security. Furthermore, our scheme achieves rate-1, improving upon existing results even for the weaker notion of standard incompressible encryption.
Joshua G. Stern
30 May 2025
Balthazar Bauer, Georg Fuchsbauer, Fabian Regen
Unforgeability of the original EQS construction is proven directly in the generic group model. While there are constructions from standard assumptions, these either achieve prohibitively weak security notions (PKC’18) or they require a common reference string (AC’19, PKC’22), which reintroduces trust assumptions avoided by EQS.
In this work we ask whether EQS schemes that satisfy the original secu- rity model can be proved secure under standard (or even non-interactive) assumptions with standard techniques. Our answer is negative: assum- ing a reduction that, after running once an adversary breaking unforge- ability, breaks a non-interactive computational assumption, we construct efficient meta-reductions that either break the assumption or break class- hiding, another security requirement for EQS.
Jeju, South Korea, 20 August - 22 August 2025
Submission deadline: 13 June 2025
Notification: 18 July 2025
Graz, Österreich, 1 September - 5 September 2025
Early-Career and/or Postdoctoral Researchers in SCAs & Countermeasures for Post-Quantum Cryptography
Industrial Systems Institute/Research Center ATHENA
The Industrial Systems Institute (ISI) is a public research institute under the supervision of the General Secretariat for Research and Technology of the Greek Ministry of Education and Religious Affairs, Culture and Sports. Founded in Patras in June 1998, ISI is part of the Research and Innovation Centre in Information, Communication, and Knowledge Technologies “Athena” since 2003. The institute focuses on contributing to high-technology sectors related to integrated industrial systems, aiming to increase the competitiveness of the Greek industry through the application of state-of-the-art technologies. ISI is currently hosted in Patras Science Park premises.
Role DescriptionThis is a full-time hybrid role for Early-Career or Postdoctoral Researchers in Side-Channel Attacks & Countermeasures for Post-Quantum Cryptography (PQC). The positions are based in Greece, with some work from home being acceptable. Day-to-day tasks include conducting research in side-channel attacks and countermeasures for PQC and developing countermeasures in software and/or FPGA hardware.
Qualifications- Solid programming background in C/C++ programming language
- Basic signal processing knowledge
- Research and Data Analysis skills
- Experience with AI model libraries (e.g., Pytorch, Tensorflow)
- Strong written and verbal communication skills
- Ability to work independently and as part of a team
- Experience in post-quantum cryptography is a plus
- Experience in Hardware Programming Languages or High Level Synthesis tools is a plus
- Basic Laboratory Skills on oscilloscopes and electronics (for the side channel attack position) is a plus
- PhD or Master’s degree in a relevant field
Closing date for applications:
Contact: Dr. Apostolos Fournaris
28 May 2025
Bence Mali
In this work we propose an orthogonal approach to performing encrypted matrix operations with BGV-like encryption schemes, where the plaintext and ciphertext spaces are generalized to a matrix ring of arbitrary dimension. To deal with the inherent problem of noncommutativity in the case of matrix rings, we present a new superoperator technique to better represent linear and quadratic expressions in the secret key, which allows for the relinearization of ciphertexts after multiplication. The security of the modified encryption schemes is based on Module-LWE with module rank equal to the dimension of the matrices. With this construction, we demonstrate that Ring-LWE, Module-LWE, and LWE are potentially equally efficient for homomorphic encryption, both in terms of useful information density and noise growth, only for different sizes of matrices.
Christoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe
Giulio Malavolta, Tamer Mour
Both protocols are also efficiently verifiable. Despite having worse asymptotics, our first protocol is conceptually simple and relies only on arithmetic modulo 2, which can be implemented with one-qubit Hadamard and CNOT gates, plus a single one-qubit non-Clifford gate.