Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via
To receive your credentials via mail again, please click here.
You can also access the full news archive.
The department has research groups within “Algorithms and Data Structures”, “Data-Intensive Systems”, “Cryptography and Security”, “Mathematical Computer Science”, “Logics and Semantics”, “Ubiquitous Computing and Interaction”, “Computer-Mediated Activity”, “Use, Design and Innovation”, “Programming Languages”, “Computer Graphics and Image Processing” and “Bioinformatics”. In addition, we want to build competences within “Software Engineering / Multicore/ Systems”, “Machine Learning / Data Mining” and “Quantum Informatics”.
Applicants are expected to have several years of experience at the assistant professor level. They must document a strong record of original research and have teaching experience at undergraduate/graduate level.
The department has a staff of 140 people including 28 full and associate professors, 5 assistant professors, 25 PostDocs and 65 PhD students. The number of students is approximately 1,000.
Please apply online at http://www.au.dk/en/job/nat/academicpositions/ before August 15, 2013.
The PhD studentship is funded by an ERC Starting Grant on Efficient Cryptographic Arguments and Proofs with a starting date around October 1st, 2013 and a duration of 4 years. The studentship will provide a tax-free annual stipend of £19,790, however, ERC funding does not cover student fees (currently £4,200 for UK/EU students and £19,250 for Overseas students).
University College London is one of Europe\\\'s highest ranked universities and has recently been recognized by the EPSRC and GCHQ as one of UK\\\'s Academic Centres of Excellence in Cyber Security Research. The Computer Science Department is one of the largest in the UK and is located at UCL\\\'s main campus in the centre of London.
For the position description please see
For more information on the group please see
For more information on the information security program please see
For a new project which addresses the problem of secure handling of personal data and privacy in many-core architectures, we proposes a Post Doc position to work on secure-by-design crypto-processor embedded in many-core architecture. We are looking for candidates with an outstanding Ph.D. in computer science or electrical engineering. Strong knowledge in digital system (VHDL, SystemC) design would be appreciated.
The Post-Doc position will start in January 2014, it is funded for 12 month extendable to 36 month.
To apply please send your detailed CV, motivation for applying (1 page) and names of at least two people who can provide reference letters (email).
The group has two faculty members (Ivan Damgard and Jesper Buus Nielsen), 3 postdocs and 8 PhD students. We can offer an active and welcoming research environment with good possibilities for travels and inviting guests. We usually offer 1-year contracts with an option for prolonging by a year.
In this paper, we provide impossibility results on projecting bilinear pairings in a prime-order group setting. More precisely, we specify the lower bounds of
1. the image size of a projecting asymmetric bilinear pairing
2. the image size of a projecting symmetric bilinear pairing
3. the computational cost for a projecting asymmetric bilinear pairing
4. the computational cost for a projecting symmetric bilinear pairing
in a prime-order group setting naturally induced from the $k$-linear assumption, where the computational cost means the number of generic operations.
Our lower bounds regarding a projecting asymmetric bilinear pairing are tight, i.e., it is impossible to construct a more efficient projecting asymmetric bilinear pairing than the constructions of Groth-Sahai and Freeman. However, our lower bounds regarding a projecting symmetric bilinear pairing differ from Groth and Sahai\'s results regarding a symmetric bilinear pairing; We fill these gaps by constructing projecting symmetric bilinear pairings.
In addition, on the basis of the proposed symmetric bilinear pairings, we construct more efficient instantiations of cryptosystems that essentially use the projecting symmetric bilinear pairings in a modular fashion. Example applications include new instantiations of the Boneh-Goh-Nissim cryptosystem, the Groth-Sahai non-interactive proof system, and Seo-Cheon round optimal blind signatures proven secure under the DLIN assumption. These new instantiations are more efficient than the previous ones, which are also provably secure under the DLIN assumption. These applications are of independent interest.
rights over a tag from a current owner to a new owner in a secure
and private way. Recently, Kapoor and Piramuthu have proposed two
schemes which overcome most of the security weaknesses detected in
previously published protocols. Still, this paper reviews that
work and points out that such schemes still present some practical
and security issues. In particular, they do not manage to
guarantee the privacy of the new owner without the presence of a
Trusted Third Party, and we find that the assumed communication
model is not suitable for many practical scenarios. We then
propose here a lightweight protocol that can be used in a wider
range of applications, and which incorporates recently defined
security properties such as Tag Assurance, Undeniable Ownership
Transfer, Current Ownership Proof and Owner Initiation. Finally,
this protocol is complemented with a proposed Key Change Protocol,
based on noisy tags, which provides privacy to the new owner
without either resorting to a Trusted Third Party or assuming an