IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
06 July 2018
Ivan Damgård, Chaya Ganesh, Claudio Orlandi
In a nutshell, proofs of replicated storage is a solution to the following problem: A user stores a file $m$ on $n$ different servers to ensure that the file will be available even if some of the servers fail. Using proof of retrievability, the user could check that every server is indeed storing the file. However, what if the servers collude and, in order to save on resources, decide to only store one copy of the file? A proof of replicated storage guarantees that, unless the server is indeed reserving the space necessary to store the $n$ copies of the file, the user will not accept the proof.
While some candidate proofs of replicated storage have already been proposed, their soundness relies on timing assumptions i.e., the user must reject the proof if the prover does not reply within a certain time-bound.
In this paper we provide the first construction of a proof of replication which does not rely on any timing assumptions.
Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
Fukang Liu
Then, we reviewed the searching strategy to find a differential path presented at Asiacrypt 2017, we observe some useful characteristics of the path which is not used in their work. To fully capture the characteristics of the differential path discovered by the searching strategy, we find an efficient attack framework under the guidance of the two principles, which in turn helps improve the searching strategy. Under our efficient attack framework, we easily improve the collision attack on 30-step RIPEMD-160 by a factor of $2^{13}$. And we believe that the collision attack can be further improved under this efficient framework if the differential path is discovered by taking the new strategies into consideration.
For some interest, we also consider an opposite searching strategy and propose another efficient attack framework special for the differential path discovered by the new searching strategy. Under this new framework, we find we can control one more step than that special for the original searching strategy. Therefore, we expect that we can obtain better collision attack by adopting the new searching strategy and attack framework.
Moreover, combining with the searching tool, we may give a tight upper bound of steps to mount collision attack on reduced RIPEMD-160 when adopting the two searching strategies.
Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
Susumu Kiyoshima
As an application of our PCP system, we obtain a 2-message scheme for delegating computation by using a known transformation. Compared with existing 2-message delegation schemes based on standard cryptographic assumptions, our scheme requires preprocessing (which can be reused multiple times) but has a simpler structure and makes use of cheaper cryptographic primitives such as additive/multiplicative homomorphic encryption schemes.
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
Thorsten Kleinjung, Benjamin Wesolowski
Huijia Lin, Christian Matt
Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
Alexei Zamyatin, Dominik Harz, William J. Knottenbelt
We systematise the notion of cryptocurrency-backed tokens, an approach towards trustless blockchain interoperability. We then propose a protocol for issuing, trading, and redeeming Bitcoin-backed tokens on Ethereum. Consequently, we provide an overview of system requirements, discuss open challenges regarding performance and security, and give an outlook on possible extensions. Our protocol, which requires no modifications to Bitcoin's consensus rules, can thereby be generalised to also support other cryptocurrencies.
Rami Khalil, Arthur Gervais
We present a novel non-custodial 2nd-layer financial intermediary solution secure against double-spending that guarantees users control of funds through leveraging a smart contract enabled decentralized blockchain ledger as a means of dispute resolution. Two-party payment channels networks have been proposed as building blocks for trust-free payments that do not exhaust the resources of the blockchain; however, they bear multiple fundamental limitations. NOCUST is a specification for secure N-party payment hubs with improved transaction utility, cheaper operational costs and leaner user enrollment.
Michael Backes, Lucjan Hanzlik, Jonas Schneider
We address this issue, starting from the vantage point of the comprehensive model due to Bootle et al. (ACNS'16), who prove that any scheme secure in their model is also secure in the previous models. Their model allows for fully dynamic management of group membership by segmenting the scheme's lifetime into epochs during which group membership is static but between which users may join or leave the group.
We extend the model of Bootle et al. by introducing formal notions of membership privacy. We then propose an efficient generic construction for a fully dynamic group signature scheme with membership privacy that is based on signatures with flexible public key (SFPK) and signatures on equivalence classes (SPSEQ). We instantiate the construction using a SFPK scheme based on the bilinear decisional Diffie-Hellman assumption and SPSEQ scheme by Fuchsbauer and Gay (PKC'18). The resulting scheme provides shorter signatures than existing schemes from standard assumption, while at the same time achieving stronger security guarantees.
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
Lucas Schabh\"{u}ser, Denis Butin, Denise Demirel, Johanens Buchmann
Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
Shuhong Gao
05 July 2018
The University of Auckland, New Zealand
Project Aim
The aim of the project is to develop practical obfuscation techniques based on a theoretical foundation.
The theoretical work will be led by Prof Steven Galbraith while Associate Prof. Giovanni Russello will lead the practical aspects.
Experience
The ideal candidate will have an undergraduate degree in computer science, engineering or mathematics and have written a master thesis in some topic related to security, cryptography, or the underlying mathematics. We are looking for candidates with experience in some or all of the following:
- Hands-on experience with standard obfuscators and de-obfuscator tools
- Understanding of cryptography and its applications
- Understanding of ARM and/or X86 architecture and respective instruction set
- Experience in coding in C/C++ and assembly
- Understanding of compilers and run-time code optimisations
Application Process:
Please send an email to g.russello (at) auckland.ac.nz with a short CV and an unofficial transcript of grades in your degree.
Successful applicants will be asked to provide further information (such as an IELTS English language test and official transcripts of their degrees) at a later stage of the application process.
Closing date for applications: 2 September 2018
Contact: g.russello (at) auckland.ac.nz
The University of Auckland, New Zealand
Applicants are required to have completed (or be close to completing) a Master degree (or equivalent) with outstanding grades in Computer Science, Mathematics, or closely related areas. Additional knowledge in related disciplines such as, e.g., complexity theory or IT security is welcome.
The candidate should be able not only to design but also implement working prototypes of the crypto scheme developed during the research period. Good knowledge of C/C++ and Linux is a must.
The STRATUS project will provide a stipend of 27,000 NZD p.a. and cover the costs of the tuition fee for 3 years.
Closing date for applications: 31 December 2018
Contact: Dr. Giovanni Russello