IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
03 October 2018
Cloudflare
Cloudflare’s Technology team is working on building the future of Cloudflare by tackling strategic projects that have a large impact on the way Cloudflare systems, and the Internet at large, work. Engineers in the Technology team are expected to research new ideas and technologies, dive into existing codebases to make meaningful changes, work independently on greenfield projects, and collaborate closely with the engineering organization to achieve common goals.
The Cryptography team is a sub-team of the Technology team focused on solving difficult problems in security, performance, and privacy at scale using cryptographic tools. This involves systems engineering, open source software development, protocol design, the implementation of cryptographic primitives, contributions to cutting-edge research in collaboration with academia, participation in Internet standards organizations like the IETF, and more.
Closing date for applications: 1 July 2019
Contact: Nick Sullivan
More information: https://www.cloudflare.com/careers/departments/technology-research/
Technical University of Denmark
The department, DTU Compute, is an internationally unique academic environment spanning the science disciplines mathematics, statistics and computer science. At the same time, we are an engineering department covering informatics and communication technologies (ICT) in their broadest sense. Finally, we play a major role in addressing the societal challenges of the digital society where ICT is a part of every industry, service, and human endeavor.
Responsibilities and tasks
Through the position, the University seeks to strengthen the research within cyber security. The cyber security section at DTU has experts in cryptology, in particular the design and analysis of ciphers and hash functions, but wishes to further strengthen its research within cryptology.
Topics of particular interest include but are not limited to:
• symmetric cryptology
• lightweight and resource-efficient cryptography
• post-quantum cryptology
• provable security of cryptographic primitives
• side-channel attacks and physical cryptanalysis
• analysis and protection of cryptographic implementations
• algorithmic aspects of cryptology
• efficient implementation of cryptographic primitives
Candidates with strong expertise in any other area of cryptology are also encouraged to apply.
Application procedure
To apply, please read the full job advertisement at www.career.dtu.dk
Please submit your online application no later than 1 December 2018.
Closing date for applications: 31 December 2018
02 October 2018
Singapore University of Technology and Design (SUTD), Singapore
Closing date for applications: 8 January 2019
Contact: Prof. Jianying Zhou
Email: jianying_zhou (at) sutd.edu.sg
More information: http://jianying.space/
Graz University of Technology
At the Graz University of Technology / Faculty of Computer Science and Biomedical Engineering the position of
University Professor of Information Security
is to be filled at the institute of Applied Information Processing and Communications (IAIK) as a full time permanent position according to section 98 of the Austrian Universities Act (§98 UG). IAIK is an internationally visible research center at TU Graz where more than 60 researchers work on a multitude of topics in information security.
We are seeking a candidate with proven scientific expertise who will represent the field of Information Security in research and teaching. The successful candidate will complement existing strengths at the institute and be an engaged teacher in the Computer Science programs at the bachelor, master, and PhD level.
Closing date for applications: 3 December 2018
Contact: Stefan Mangard, Email: Stefan.Mangard (at) iaik.tugraz.at
More information: https://www.tugraz.at/fakultaeten/infbio/news/vacancies/professor-of-information-security/
01 October 2018
James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
In this work, we conduct an extensive study of simple conjunction obfuscation techniques.
- We abstract the Bishop et al. scheme to obtain an equivalent yet more efficient "dual'' scheme that can handle conjunctions over exponential size alphabets. This scheme admits a straightforward proof of generic group security, which we combine with a novel combinatorial argument to obtain distributional VBB security for $|S|$ of any size.
- If we replace the Reed-Solomon code with a random binary linear code, we can prove security from standard LPN and avoid encoding in a group. This addresses an open problem posed by Bishop et al. to prove security of this simple approach in the standard model.
- We give a new construction that achieves information theoretic distributional VBB security and weak functionality preservation for $|S| \geq n - n^\delta$ and $\delta < 1$. Assuming discrete log and $\delta < 1/2$, we satisfy a stronger notion of functionality preservation for computationally bounded adversaries while still achieving information theoretic security.
Subhabrata Samajder, Palash Sarkar
Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
In this paper we propose the first asymptotically ideal CRT-based secret sharing schemes for (disjunctive, conjunctive) multilevel and compartmented access structures. Our approach is compositional and it is based on a variant of the Asmuth-Bloom secret sharing scheme where some participants may have public shares. Based on this, we show that the proposed secret sharing schemes for multilevel and compartmented access structures are asymptotically ideal if and only if they are based on 1-compact sequences of co-primes.
Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
In this paper, we present a variant of approximate homomorphic encryption which is optimal for implementation on standard computer system. We first introduce a new structure of ciphertext modulus which allows us to use both the RNS decomposition of cyclotomic polynomials and the NTT conversion on each of the RNS components. We also suggest new approximate modulus switching procedures without any RNS composition. Compared to previous exact algorithms requiring multi-precision arithmetic, our algorithms can be performed by using only word size (64-bit) operations.
Our scheme achieves a significant performance gain from its full RNS implementation. For example, compared to the earlier implementation, our implementation showed speed-ups 17.3, 6.4, and 8.3 times for decryption, constant multiplication, and homomorphic multiplication, respectively, when the dimension of a cyclotomic ring is 32768. We also give experimental result for evaluations of some advanced circuits used in machine learning or statistical analysis. Finally, we demonstrate the practicability of our library by applying to machine learning algorithm. For example, our single core implementation takes 1.8 minutes to build a logistic regression model from encrypted data when the dataset consists of 575 samples, compared to the previous best result 3.5 minutes using four cores.
Kim Gyu-Chol, Li Su-Chol
Peter M. R. Rasmussen, Amit Sahai
Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
Benoît Libert, Damien Stehlé, Radu Titiu
Salim Ali Altug, Yilei Chen
We propose a candidate trapdoor group with infeasible inversion without using the heavy machinery of iO. The underlying group is isomorphic to the ideal class group of an imaginary quadratic order, and is represented by the elliptic curve isogeny graph. The hardness of group inversion relies on the conjectured hardness of several problems on the isogeny graphs defined over composite moduli with unknown factorization.
Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
Andreas Hülsing, Christoph Busold, Johannes Buchmann
Elizabeth C. Crites, Anna Lysyanskaya
The only previously known constructions of delegatable anonymous credentials were prohibitively inefficient. They were based on non-interactive zero-knowledge (NIZK) proofs. In this paper, we provide a simple construction of delegatable anonymous credentials and prove its security in the generic group model. Our construction is direct, not based on NIZK proofs, and is therefore considerably more efficient. In fact, in our construction, only five group elements are needed per link to represent an anonymous credential chain.
Our main building block is a new type of signature scheme, a mercurial signature, which allows a signature $\sigma$ on a message $M$ under public key $\mathsf{pk}$ to be transformed into a signature $\sigma'$ on an equivalent but unlinkable message $M'$ under an equivalent but unlinkable public key $\mathsf{pk}'$.