IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 October 2018
Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Younes Talibi Alaoui
Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
Diego Chialva, Ann Dooms
We note that our approach to comparisons is novel, and for the first time completely embedded in homomorphic encryption, differently from what proposed in previous studies (and beyond that, we supplement it with the necessary selection/jump operation). A number of studies have indeed dealt with comparisons, but have not managed to perform them in pure homomorphic encryption. Typically their comparison protocols do not utilise homomorphic encryption for the comparison itself, but rely on other cryptographic techniques, such as secure multiparty computation, which a) require a high level of communication between parties (each single comparison in a machine learning training and prediction process must be performed by exchanging several messages), which may not be possible in various use cases, and b) required the data owner to decrypt intermediate results, extract significant bits for the comparison, re-encrypt and send the result back to the other party for the accomplishment of the algorithm. Such ``decryption'' in the middle foils the purpose of homomorphic encryption. Beside requiring only homomorphic encryption, and not any intermediate decryption, our protocol is also provably safe (as it shares the same safety as the homomorphic encryption schemes), differently from other techniques such as OPE/ORE and variations, which have been proved not secure.
Roderick Bloem, Hannes Gross, Rinat Iusupov, Martin Krenn, Stefan Mangard
29 October 2018
Linköping University, Sweden
We are hiring one phd student to work on (acoustic) side channels, automotive security, or cybercrime at Linköping University.
Candidates with a solid MSc in security or applied crypto are welcome to apply.
PI profile: https://scholar.google.com/citations?hl=en&user=rYhiAEUAAAAJ&view_op=list_works&sortby=pubdate
Closing date for applications: 30 November 2018
Contact: Prof Jeff Yan (jeff.yan (at) liu.se)
26 October 2018
Nanyang Technological University, Singapore
We offer a globally competitive salary package and low income tax, plus an excellent research environment in Singapore. The initial contract will be for 2 years, and renewable for up to 5 years subject to the performance. Interested candidates are to send their CV, and 2 reference letters to Jian Guo. Review of application will start immediately until the positions are filled.
Closing date for applications: 31 March 2019
Contact: Asst Prof. Jian Guo, guojian (at) ntu.edu.sg
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
In this work, we resolve the above problem and construct RBE schemes based on standard assumptions (e.g., CDH or LWE). Furthermore, we show a new application of RBE in a novel context. In particular, we show that anonymous variants of RBE (which we also construct under standard assumptions) can be used for realizing abstracts forms of anonymous messaging tasks in simple scenarios in which the parties communicate by writing messages on a shared board in a synchronized way.
Zhe Li, Chaoping Xing, Sze Ling Yeo
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
Diana Maimut, George Teseleanu
Chitchanok Chuengsatiansup, Chloe Martindale
Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
Sinisa Matetic, Karl Wüst, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
To do so, we first introduce secure channel injection (SCI) protocols. These allow one party (in our setting, the blind CA) to insert a private message into another party's encrypted communications. We construct an efficient SCI protocol for communications delivered over TLS, and use it to realize anonymous proofs of account ownership for SMTP servers. Combined with a zero-knowledge certificate signing protocol, we build the first blind CA that allows Alice to obtain a X.509 certificate binding her email address alice@domain.com to a public key of her choosing without ever revealing ``alice'' to the CA. We show experimentally that our system works with standard email server implementations as well as Gmail.
25 October 2018
24 October 2018
Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK
Our Centre is host to the UK Research Institute in Secure Hardware and Embedded Systems (RISE: www.ukrise.org) and is recognised by NCSC as an Academic Centre of Excellence (ACE) in Cyber Security Research.
We are after a passionate and motivated academic with leadership experience in the areas of Cloud/Network Security, Hardware/Software Security and/or Security Analytics. We are particularly interested if you have a credible track record of technology transfer and delivering impact from your research. In return, you will have access to outstanding teaching and research facilities and opportunities to work with vibrant engineering and commercial teams to translate your research into impact.
We are seeking candidates with research experience (commensurate with career stage) in one or more of the following areas:
• Cloud/Network Security: security and privacy of cloud computing, application layer DDoS detection/mitigation, Web Application Firewall (WAF), network/cloud intrusion detection/prevention, malware and security models for trusted execution on the cloud.
• Software Security: Security protocol and crypto algorithm implementation, instruction set extensions for crypto, software analysis, and/or software vulnerability detection.
• Hardware Security: Micro-architectural security, SCA, Hardware Trojans, or PUF.
• Security Analytics: AI for Cybersecurity intelligence automation and threat response automation (data-fusion); or AI technologies for cyber-social-physical security. Including deep learning, particularly adversarial, graph mining, and reasoning with uncertainty.
Closing date for applications: 22 November 2018
Contact: Professor Máire O\'Neill, Email: m.oneill (at) ecit.qub.ac.uk
More information: https://hrwebapp.qub.ac.uk/tlive_webrecruitment/wrd/run/ETREC107GF.open?VACANCY_ID=862841AHAI&WVID=6273090Lgx&LANG=USA
Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK
Our Centre is host to the UK Research Institute in Secure Hardware and Embedded Systems (RISE: www.ukrise.org) and is recognised by NCSC as an Academic Centre of Excellence (ACE) in Cyber Security Research.
We are looking for passionate and motivated academics with experience in Cloud/Network Security, Hardware/Software Security and/or Security Analytics. We seek candidates who are interested in delivering impact from their research and have a record of technology transfer appropriate to career stage. In return, you will have access to outstanding teaching and research facilities and opportunities to work with vibrant engineering and commercial teams to translate your research into impact.
More specifically, we are seeking candidates with research experience (commensurate with career stage) in one or more of the following areas:
• Cloud/Network Security: security and privacy of cloud computing, application layer DDoS detection/mitigation, Web Application Firewall (WAF), network/cloud intrusion detection/prevention, malware and security models for trusted execution on the cloud.
• Software Security: Security protocol and crypto algorithm implementation, instruction set extensions for crypto, software analysis, and/or software vulnerability detection.
• Hardware Security: Micro-architectural security, SCA, Hardware Trojans, or PUF.
• Security Analytics: AI for Cybersecurity intelligence automation and threat response automation (data-fusion); or AI technologies for cyber-social-physical security. Including deep learning, particularly adversarial, graph mining, and reasoning with uncertainty.
Closing date for applications: 22 November 2018
Contact: Professor Máire O\'Neill, Email:m.oneill (at) ecit.qub.ac.uk
More information: https://hrwebapp.qub.ac.uk/tlive_webrecruitment/wrd/run/ETREC107GF.open?VACANCY_ID=411772AHKd&WVID=6273090Lgx&LANG=USA
Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK
Applicants must have at least a 2:1 Honours Degree in Electrical and Electronics Engineering, Computer Science, Mathematics or closely related discipline and a PhD, or expect, within 6 months, to obtain a PhD, in a relevant subject. At least 3 years relevant research experience in one or more of the following is essential: embedded systems design; FPGA or ASIC hardware design; integrated hardware/software design. Evidence of a strong publication record commensurate with career stage and experience is also essential.
Closing date for applications: 7 November 2018
Contact: Maire O\'Neill
More information: https://www.qub.ac.uk/sites/QUBJobVacancies/ResearchJobs/
University of Derby, Derby, UK
Closing date for applications: 18 November 2018
More information: https://www.derby.ac.uk/research/degrees/applicants/studentship-and-funding-opportunities/et-phd-studentship---iot-solut