IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 June 2018
Microsoft Research, Redmond WA, USA
Closing date for applications: 1 August 2018
Contact: Kristin Lauter
Email: klauter (at) microsoft.com
University of Lübeck, Germany
Professor for Secure Software Systems (W2)
As future holder of the position, you should bring a proven scientific track record in IT Security, especially in at least one of the following areas:
- Security of Complex and Networked Software Systems
- Anonymity and Privacy
- Operating Systems Security
- Computer Forensics
You bring along a high potential for strengthening the profile of the new Institute for IT Security through research work, project management, and the acquisition of third party funds in the field of IT Security.
Your teaching tasks include participation in the courses of the degree programs of the Department of Computer Science/Engineering, especially in the new Bachelor’s and Master’s program in IT Security.
University of Lübeck offers excellent opportunities for interdisciplinary cooperation in the key areas of Computer Science, Medical Engineering, Robotics, e-Government, Data Science, as well as the Life Sciences and Medicine. In addition, the university supports activities in technology transfer.
For a detailed description of the position as well as necessary templates and further information on the application process, please visit the link below.
Closing date for applications: 18 July 2018
Contact: Susanne Markmann,
Büro der MINT-Sektionen
Email: mint.buero (at) uni-luebeck.de
More information: https://www.uni-luebeck.de/structure/sektionen/sektionen-mint/berufungsverfahren-stellen.html
Technische Universität Darmstadt in Darmstadt, Germany
We are looking for candidates interested in working at the intersection of privacy engineering, and applied cryptography. This project addresses two central challenges in the provision of cloud services: (1) client privacy, and (2) verifiable metering and billing. For challenge (1), we design and develop anonymous communication mechanisms for the cloud. For challenge (2), we build techniques for service verification and design an infrastructure for verifiable metering and billing, enabling clients to verify in real-time their service consumption and corresponding charges. By solving and combining both challenges we obtain privacy-preserving verifiable metering and billing. Further details on the project can be found here.
The vacancy is within the Collaborative Research Center CROSSING, funded by DFG, the German Research Foundation. Collaborative Research Centers are institutions funded by the German Research Foundation (DFG) and are established at universities to pursue a scientifically ambitious, complex, longterm research program. The goal of the center CROSSING is to provide cryptography-based security solutions enabling trust in new and next generation computing environments. For more information about CROSSING please visit www.crossing.tu-darmstadt.de.
As part of its research program CROSSING will develop an opensource software called OpenCCE which will allow users to deploy the developed solutions in a secure and easy way.
Applications will be considered until the positions are filled.
Closing date for applications: 30 September 2018
Contact: Applicants are kindly requested to send their applications to staff-sit (at) crisp-da.de with the subject “Funded PhD position in CRC CROSSING” and a single pdf (< 10MB).
More information: https://www.sit.informatik.tu-darmstadt.de
20 June 2018
Toronto, Canada, 15 October 2018
Submission deadline: 25 July 2018
Notification: 15 August 2018
18 June 2018
Universite Libre de Bruxelles, Belgium
The successful applicant will work on the analysis and design of searchable encryption schemes and on data structures enabling efficient search operations on encrypted data.
Candidates shall hold a PhD degree in Computer Science or related field, should have experience in the research field of the position and should be fluent in English.
Applications must include:
- A Curriculum Vitae
- A motivation letter
- The list of publications and a copy of three selected publications
- The copies of diplomas and certificates
- Two (or more) reference letters
- The date from which the applicant will be available
Applications must be sent to olivier.markowitch (at) ulb.ac.be and stefan.langerman (at) ulb.ac.be
Closing date for applications: 1 October 2018
Contact: Olivier Markowitch, Universite Libre de Bruxelles, Computer Science Department, olivier.markowitch (at) ulb.ac.be
More information: https://qualsec.ulb.ac.be/about-2/post-doc-position/
University of Luxembourg
Shaping research directions and producing results in one or more of the following topics:
Develop and analyse quantum-safe algorithms and protocols.
Explore the incorporation of quantum-safe algorithms in a TPM architecture.
Define security properties and models for a TPM against quantum adversaries.
Coordinating research projects and delivering outputs
Collaborating with partners in the FutureTPM project
Providing guidance to PhD and MSc students
Disseminating results through scientific publications
Closing date for applications: 6 July 2018
Contact: Peer Y A Ryan, peter.ryan (at) uni.lu or Alfredo Rial, alfredo.rial (at) uni.lu
More information: http://emea3.mrted.ly/1vbm4
University of Luxembourg
Research on the following topics in quantum cryptography and information theory:
Exploring formal definitions of the notion of deniability against various threat models.
Exploring the limits of what is achievable in terms of deniability using both classical and quantum mechanisms.
Designing and analysing novel protocols and mechanisms to achieve stronger forms of deniability.
Providing guidance to M.Sc. students
Closing date for applications: 6 July 2018
Contact: P Y A Ryan, peter.ryan (at) uni.lu
More information: http://emea3.mrted.ly/1vblq
Melissa Chase, Apoorvaa Deshpande, Esha Ghosh
Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
In this paper we propose a solution to this limitation, by leveraging a split-state refreshing procedure. Namely, whenever a decoding error happens, the two parts of an encoding can be locally refreshed (i.e.,\ without any interaction), which allows to avoid the self-destruct mechanism in some applications. Additionally, the refreshing procedure can be exploited in order to obtain security against continual leakage attacks. We give an abstract framework for building refreshable continuously non-malleable codes in the common reference string model, and provide a concrete instantiation based on the external Diffie-Hellman assumption.
Finally, we explore applications in which our notion turns out to be essential. The first application is a signature scheme tolerating an arbitrary polynomial number of split-state tampering attempts, without requiring a self-destruct capability, and in a model where refreshing of the memory happens only after an invalid output is produced. This circumvents an impossibility result from a recent work by Fuijisaki and Xagawa (Asiacrypt 2016). The second application is a compiler for tamper-resilient read-only RAM programs. In comparison to other tamper-resilient RAM compilers, ours has several advantages, among which the fact that, in some cases, it does not rely on the self-destruct feature.
Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
Matvei Kotov, Anton Menshov, Alexander Ushakov
We present a heuristic algorithm that allows a passive eavesdropper to recover Alice's private key by removing cloaking elements. Our attack has 100% success rate on randomly generated instances of the protocol for the originally proposed parameter values and for recent proposals that suggest to insert many cloaking elements at random positions of the private key. Our implementation of the attack is available on GitHub.
Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
-It is user-centric: It stresses the security guarantees given to users of the system, in terms of privacy, correctness, and timeliness of the services.
-It provides defense in depth: It considers the security of OpenStack even when some of the components are compromised. This departs from the traditional design approach of OpenStack, which assumes that all services are fully trusted.
-It is modular: It formulates security properties for individual components and uses them to assert security properties of the overall system.
We base our modeling and security analysis in the universally composable (UC) security framework, which has been so far used mainly for analyzing security of cryptographic protocols. Indeed, demonstrating how the UC framework can be used to argue about security-sensitive systems which are mostly non-cryptographic in nature is another main contribution of this work.
Our analysis covers only a number of core components of OpenStack. Still, it uncovers some basic and important security trade-offs in the design. It also naturally paves the way to a more comprehensive analysis of OpenStack.