IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
13 July 2018
Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
Joey Green, Arnab Roy, Elisabeth Oswald
We define a novel metric to capture the importance of variable nodes in factor graphs, we propose two improvements to the sum-product algorithm for the specific use case in side channel analysis, and we explicitly define and examine different ways of combining information from multiple side channel traces. With these new considerations we systematically investigate a number of graphical models that "naturally" follow from an implementation of AES. Our results are unexpected: neither a larger graph (i.e. more side channel information) nor more connectedness necessarily lead to significantly better attacks. In fact our results demonstrate that in practice the (on balance) best choice is to utilise an acyclic graph in an independent graph combination setting, which gives us provable convergence to the correct key distribution. We provide evidence using both extensive simulations and a final confirmatory analysis on real trace data.
Ward Beullens, Bart Preneel, Alan Szepieniec
Cyril Bouvier, Laurent Imbert
Takanori Isobe, Kazuhiko Minematsu
Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
Paolo Santini, Edoardo Persichetti, Marco Baldi
12 July 2018
Toronto, Canada, 15 October 2018
Submission deadline: 16 July 2018
Notification: 13 August 2018
Information Assurance Platform (IAP)
This position is available full time or part time, on a work remotely basis (telecommuting).
The successful applicant is requested to support the written documentation of the project. The project aims to establish an open standard for the use of the platform (the IAP standard). Where applicable, cryptographic terms, algorithms, diagrams and other items will be required to be written to the current standards of the industry and to the standards of peer review.
The position will be responsible for the project documentation as it pertains to cryptography; to rewrite existing documentation in an expert manner, and to ensure that additional information is correct, useful, up to date and appropriate. Therefore, the position will be required to understand the goals and designs of the project intimately. Full support in gaining this understanding will be provided.
The cryptography in question is focused on computational integrity and privacy research, including zero knowledge proofs and succinct non interactive arguments of knowledge.
The position is not expected to create, invent, redesign or develop cryptography or cryptographic systems. Rather, to understand current research, explain, interpret and ultimately document the relevant cryptography as it pertains (or does nor pertain) to the design of systems of the platform.
All applicants are welcome.
Closing date for applications: 31 December 2018
Contact: Please contact team [at] iap.network. All information held in strictest confidence.
More information: https://iap.network
IBM Global Security Services
Position is located in the United States. Must be willing to travel 75% annually, including international travel.
Marketing and Sales:
•Work with global solutions teams and across local geographies to provide content and drive deals to successful closing
•Provide demonstration of IBM credentials in the core domain of Data Security, especially cryptography
•Work closely with the global and local solution design teams to develop client presentations and Statements Of Work (SOWs)
•Provide a focal point for geographies to help understand capabilities, offerings, client references
•Become a recognized thought leader in the core domain, utilizing conferences, white papers, client presentations to build awareness of IBM credentials
•Be accountable for driving signings in the geographies
Delivery:
•Work with global and local teams to help organize project approaches and teams for client delivery
•Participate in project delivery to varying degrees depending on project complexity and geography needs
•Help resolve project issues as they arise
•Establish demonstrated client relationships in key accounts to help progress the Security Services portfolio
Practice:
•Provide global practice leadership by facilitating a community of like-minded practitioners to share and exchange ideas for practice growth and improvement
•Contribute content and advice to the offering development process
•Help shape the emerging model of the Global Security Practice
People:
•Help establish capability and skills models for the core domain• Become a role model for global practitioners in the core domain
Closing date for applications:
Contact: Harry Dougherty
Senior Recruiter - Talent Acquisition
IBM Security Services
https://www.linkedin.com/in/harrydougherty1/
More information: https://www.linkedin.com/jobs/view/associate-partner-cryptography-encryption-at-ibm-742561074/
10 July 2018
Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
Our framework builds a cryptographic invariant map, which is a new primitive closely related to a cryptographic multilinear map, but whose range does not necessarily have a group structure. Nevertheless, we show that a cryptographic invariant map can be used to build several cryptographic primitives, including NIKE, that were previously constructed from multilinear maps and indistinguishability obfuscation.
09 July 2018
Shafi Goldwasser, Sunoo Park
In this work we show how the use of cryptographic protocols, and in particular, the use of zero-knowledge proofs can ensure accountability and transparency of the government in this extraordinary, seemingly deadlocked, setting. We propose an efficient record-keeping infrastructure with versatile publicly verifiable audits that preserve perfect (information-theoretic) secrecy of record contents as well as of the rules by which the records are attested to abide. Our protocol is based on existing blockchain and cryptographic tools including commitments and zero-knowledge SNARKs, and satisfies the properties of indelibility (i.e., no back-dating), perfect data secrecy, public auditability of secret data with secret laws, accountable deletion, and succinctness. We also propose a variant scheme where entities can be required to pay fees based on record contents (e.g., for violating regulations) while still preserving data secrecy. Our scheme can be directly instantiated on the Ethereum blockchain (and a simplified version with weaker guarantees can be instantiated with Bitcoin).
Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
In this paper, we propose an efficient algorithm for logistic regression on encrypted data, and evaluate our algorithm on real financial data consisting of 422,108 samples over 200 features. Our experiment shows that an encrypted model with a sufficient Kolmogorov Smirnow statistic value can be obtained in $\sim$17 hours in a single machine. We also evaluate our algorithm on the public MNIST dataset, and it takes $\sim$2 hours to learn an encrypted model with 96.4% accuracy. Considering the inefficiency of HEs, our result is encouraging and demonstrates the practical feasibility of the logistic regression training on large encrypted data, for the first time to the best of our knowledge.