International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2013-03-07
19:17 [Pub][ePrint] An MQ/Code Cryptosystem Proposal, by Leonard J. Schulman

  We describe a new trap-door (and PKC) proposal. The proposal is ``multivariate quadratic\'\' (relies on the hardness of solving systems of quadratic equations); it is also code-based, and uses the code-scrambling technique of McEliece (1978). However, in the new proposal, the error-correcting code is not revealed in the public key, which protects against the leading attacks on McEliece\'s method.



16:17 [Pub][ePrint] Attribute-Based Encryption for Circuits from Multilinear Maps, by Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters

  In this work, we provide the first construction of Attribute-Based

Encryption (ABE) for general circuits. Our construction is based on

the existence of multilinear maps. We prove selective security of

our scheme in the standard model under the natural multilinear

generalization of the BDDH assumption. Our scheme achieves both

Key-Policy and Ciphertext-Policy variants of ABE.

Our scheme and its proof of security directly translate to the recent multilinear map

framework of Garg, Gentry, and Halevi.

This paper is the result of a merge of the works of Garg, Genry, and Halevi and of Sahai and Waters,

and subsumes both these works.



16:17 [Pub][ePrint] An Ideal-Security Protocol for Order-Preserving Encoding, by Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich

  Order-preserving encryption - an encryption scheme where the sort order of ciphertexts matches the sort order of the corresponding plaintexts - allows databases and other applications to process queries involving order over encrypted data efficiently. The ideal security guarantee for order-preserving encryption put forth in the literature is for the ciphertexts to reveal no information about the plaintexts besides order. Even though more than a dozen schemes were proposed, all these schemes leak more information than order.

This paper presents the first order-preserving scheme that achieves ideal security. Our main technique is mutable cipher- texts, meaning that over time, the ciphertexts for a small number of plaintext values change, and we prove that mutable ciphertexts are needed for ideal security. Our resulting protocol is interactive, with a small number of interactions.

We implemented our scheme and evaluated it on microbenchmarks and in the context of an encrypted MySQL database application. We show that in addition to providing ideal security, our scheme achieves 1-2 orders of magnitude higher performance than the state-of-the-art order-preserving encryption scheme, which is less secure than our scheme.





2013-03-06
19:51 [Event][New] SeCIHD'13: 3rd Inter. Work. on Security and Cognitive Informatics for Homeland Defense

  Submission: 15 April 2013
Notification: 20 May 2013
From September 2 to September 6
Location: Regensburg, Germany, Germany
More Information: http://isyou.info/conf/secihd13/


19:51 [Event][New] RFIDsec'13 Asia: The 2013 Workshop on RFID and IoT Security

  Submission: 1 July 2013
Notification: 12 August 2013
From November 27 to November 27
Location: Guangzhou, China
More Information: http://www.inscrypt.cn/2013/Inscrypt_2013/CFP-RFIDsecAsia.htm


19:50 [Event][New] ICITS 2013: The 7th International Conference on Information Theoretic Security

  Submission: 5 July 2013
Notification: 30 August 2013
From November 28 to November 30
Location: Singapore, Singapore
More Information: http://www.spms.ntu.edu.sg/mas/conference/icits2013/


00:07 [Job][New] Assistant Professor Position, Crypto Group - University of Versailles-St-Quentin-en-Yvelines (France)

  In view of its ongoing development, the crypto group of the University of Versailles St-Quentin-en-Yvelines (France) invites applications for the following full-time position.

A faculty position at the tenured Assistant Professor (\\\"Maître de Conférences\\\") level is open to highly qualified candidates who are committed to a career in research and teaching. Preference will be given to candidates with strong research achievements in one or several of the areas related to the general fields of cryptology and/or information security.

Responsibilities include research, supervision of undergraduates and graduate students, preparation and management of research projects, and teaching in various study programs.

IMPORTANT NOTE: A \\\"qualification aux fonctions de Maître de Conférences\\\" certificate from to the French \\\"Conseil National des Universités\\\" is usually required to apply. However candidates who already hold an Assistant Professor (or equivalent) position may be exempted from this certificate.

00:07 [Job][New] Post-Doc, University of Waterloo, Canada

  The Cryptography, Security, and Privacy (CrySP) research group at the University of Waterloo is seeking applications for a postdoctoral research position in the field of security and privacy for location-based or mobile systems and applications. This position will be held in the Cheriton School of Computer Science, and there will be the possibility for collaboration with Google Waterloo.

Applicants must hold a PhD in a related field and should have a convincing publication record.

The start date of the position is negotiable. The position may be for one or two years.

Applicants should submit a CV, a research plan, two or three selected papers, and the names and contact information of three references.



2013-03-05
15:25 [Job][New] Ph.D. student, Radboud University Nijmegen, the Netherlands, European Union

  The Digital Security (DS) group of RU Nijmegen has a PhD position in side-channel analysis and countermeasure design and implementation.

Candidates should have a Master’s degree in computer science, applied mathematics or engineering with strong interest in algorithms and signal processing. Prior experience in side-channel analysis and embedded software or hardware design is an asset.

This research addresses potential threats within the scope of side-channel analysis and fault injection. The successful candidate will contribute to a research project entitled Side-channel resistant devices for pervasive security (SIDES), which is funded by STW. The project is a joint collaboration with Riscure.

Conditions of employment

The position is for 4 years, the expected starting date is flexible, preferably not later than September. Salary is 2042-2612 euro/month.

Candidates moving to the Netherlands from abroad may qualify for a tax incentive scheme, where 30% of your income is tax free.

For additional information about the DS group, see http://www.ru.nl/ds

15:24 [Job][New] Integrated circuit designer, PhD, INVIA, Aix en Provence, France

  INVIA provides security-related semiconductor design IP and embedded software to ASIC and FPGA designers. Our customers are semiconductor vendor and OEM addressing markets where security is a key requirement.

Description

The integrated circuit designer will work in the R&D digital team and will contribute to the development of innovative IP for secure products. Main activities include various technical aspects as target specifications, technology survey, architecture, concept, IP development and validation, prototyping, IP packaging, documentation, etc.

He could be also visible from customers side in relationship with Invia marketing through market needs enquiries, technical meeting, deliveries to the customer, field support, etc.

Qualifications

PhD Degree in digital IC design, cryptography, MSc Degree in electrical engineering or equivalent.

Permanent position. The gross income depends on the experience level. Min package is about 40,000 EUR per year.



13:17 [Pub][ePrint] Speed Optimized Implementations of the QUAD Algorithm, by Jason Hamlet and Robert Brocato

  We present several software and hardware implementations of QUAD, a recently introduced stream cipher designed to be provably secure and practical to implement. The software implementations target both a personal computer and an ARM microprocessor. The hardware implementations target field programmable gate arrays. The purpose of our work was to first find the baseline performance of QUAD implementations, then to optimize our implementations for throughput. Our software implementations perform comparably to prior work. Our hardware implementations are the first known implementations to use random coefficients, in agreement with QUAD\'s security argument, and achieve much higher throughputs than prior implementations.