IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
01 August 2025
Deirdre Connolly, Kathrin Hövelmanns, Andreas Hülsing, Stavros Kousidis, Matthias Meijers
To this end, we establish simple conditions that allow one to check whether a KEM is compatible with QSF by proving ciphertext second‑preimage resistance C2PRI for several variants of the Fujisaki–Okamoto (FO) transform. Applying these results to post-quantum KEMs that are either standardized or under consideration for standardization, we show that QSF can also be used with all of these, including ML-KEM-1024, (e)FrodoKEM, HQC, Classic McEliece, and sntrup.
We also present QSI, a variation of QSF and show that any two KEM can be combined by hashing their concatenated keys. The result is a hybrid KEM which is IND-CCA-secure as long as one of the KEM is IND-CCA- and the other C2PRI-secure.
Finally, we also analyze QSF and QSI regarding their preservation of the recently introduced family of binding properties for KEM.
George Teseleanu
Dariush Abbasinezhad-Mood
Gilad Asharov, Anirudh Chandramouli, Ran Cohen, Yuval Ishai
We initiate a study of secure computation in the presence of super-rushing adversaries. We focus on understanding the conditions under which existing synchronous protocols remain secure in the presence of super-rushing adversaries. We show that not all protocols remain secure in this model, highlighting a critical gap between theoretical security guarantees and practical implementations. Even worse, we show that security against super-rushing adversaries is not necessarily maintained under sequential composition.
Despite those limitations, we present a general positive result: secret-sharing based protocols in the perfect setting, such as BGW, or those that are based on multiplication triplets, remain secure against super-rushing adversaries. This general theorem effectively enhances the security of such protocols ``for free.'' It shows that these protocols do not require parties to wait for the end of a round, enabling potential optimizations and faster executions without compromising security. Moreover, it shows that there is no need to spend efforts to achieve perfect synchronization when establishing the communication networks for such protocols.
Michael Schaller
Sergio Demian Lerner, Ariel Futoransky
Mikhail Suslov
Within this framework, we define three post-quantum cryptographic primitives: Inverse Discrete Diffie–Hellman (IDDH), Inverse Discrete Key Encapsulation (IDKE), and Inverse Discrete Data Encapsulation (IDDE). Using a 512-bit modulus (prime or semiprime), a random generator \( g \), and a public exponent \( y \) with \(\gcd(y, \varphi(m)) = 2\), the masking function \[ \mathsf{Mask}_{g,y}(x) := g^{x y} \bmod m \] induces a two-to-one mapping that renders discrete logarithm inversion infeasible.
Our security analysis shows that known quantum algorithms yield only multiple candidates, requiring exhaustive search among equivalence classes, which remains intractable at 512-bit parameters. We demonstrate efficient prototype implementations with sub-millisecond key operations and AES-GCM-level data throughput. Full source code and parameters are publicly available at \url{https://github.com/AdamaSoftware/InverseDiscrete/}.
Mehdi Beriane, Muhammed Ali Bingol
Joshua Luberisse
East China Normal University, School of Cryptology; Shanghai, China
East China Normal University (ECNU) locates in Shanghai, China, and is one of the first institutions in China to conduct education and research in cryptography and cybersecurity.
The School of Cryptology at ECNU was founded in November 2024 and is now seeking candidates for tenure-track (associate professor) and tenured (full/chair professor) positions in all areas of cryptography and cybersecurity, including: public-key cryptography, symmetric-key cryptography, cryptanalysis, multi-party computation, zero-knowledge proof, fully homomorphic encryption, obfuscation, applied cryptography, blockchain, AI security, system security, etc. Preference will be given to applicants with publications in top-tier venues such as FOCS, STOC, CRYPTO, EUROCRYPT, ASIACRYPT, CCS, S&P.
We will offer a competitive package including attractive salary, housing and relocation allowances, research startup funding, and support for children's education.
To apply, please send brief CV to mmxy@sc.ecnu.edu.cn (Mrs. Zhang).
Closing date for applications:
Contact: Mrs. Zhang (mmxy@sc.ecnu.edu.cn)
Indian Institute of Information Technology Design & Manufacturing Kurnool (IIITDM Kurnool), India
Closing date for applications:
Contact: Dr. R. Kabaleeshwaran
More information: https://files.iiitk.ac.in/uploads/recruitment/2025/project/DASH-IBITH-RA-Recruitment_0725.pdf
Xi’an Jiaotong-Liverpool University, Suzhou, China
Topics of Interests
• Post-Quantum Cryptography
• Multi-Party Computation
• Zero-Knowledge Proofs
• Fully Homomorphic Encryption
Faculty Positions
Multiple faculty positions are open at all ranks: Professor, Associate Professor, and Assistant Professor. The positions are on three-year contract which is renewable and will be converted to long-term contract when renewed again after six-year service. Positions will remain open until filled.
What we offer:
• Opportunities to work in an excellent research environment and collaborate with global leaders in post-quantum cryptography, and with top financial institutions and industry partners.
• Internationally competitive salary and benefits such as housing allowance, travel allowance, education allowance, relocation support etc.
• Adequate research funds, and university’s supports to apply for national, provincial and municipal talent programs.
Requirements:
• Ph.D. in Computer Science, Mathematics, Cryptography, or closely related areas.
• Proven track record of research excellence in post-quantum cryptography or a closely related area.
• Demonstrated excellence in teaching and supervision of undergraduate/graduate students/post-docs.
How to Apply
Submit your application via: https://career15.sapsf.cn/sfcareer/jobreqcareer?jobId=4087&company=xjtlu.
Including,
• Cover letter
• Curriculum Vitae (CV)
• Three academic reference letters (two for research and one for teaching)
For Inquiries, you can contact HR: Ye.Lan@xjtlu.edu.cn.
Closing date for applications:
Contact: Mingwei.Sun@xjtlu.edu.cn
More information: https://career15.sapsf.cn/sfcareer/jobreqcareer?jobId=4087&company=xjtlu
Xi’an Jiaotong-Liverpool University
PQC-X maintains an internationally collaborative research environment and strong partnerships with leading scholars and top institutions worldwide, including:
• Prof. Johannes Buchmann (Fellow of the German Academy of Sciences)
• Prof. Tsuyoshi Takagi (University of Tokyo)
• Financial institutions, e.g., the Jiangsu Province Financial Society, China Construction Bank, and the Financial Research Institute of the People’s Bank of China
*About Prof. Jintai Ding
Prof. Jintai Ding is a globally recognized leader in post-quantum cryptography and currently the Dean of School of Mathematics and Physics at Xi’an Jiaotong-Liverpool University (XJTLU). He was one of the principal designers of ML-KEM (FIPS 203), the only quantum-resistant key establishment standard selected by the US National Institute of Standards and Technology (NIST). He is also the inventor and patent holder of the first quantum key exchange, which was among the two patents licensed to NIST for ML-KEM.
Prior to joining XJTLU, Prof. Ding was Full Professor in Tsinghua University; and the Distinguished Taft Professor in the University of Cincinnati for more than 20 years. Prof. Ding received his PhD from Yale University.
How to Apply
Submit your application via the Univiersity Website.
Including,
• Cover letter
• Curriculum Vitae (CV)
• Three academic reference letters (two for research and one for teaching)
For Inquiries, you can contact HR: Ye.Lan@xjtlu.edu.cn
Closing date for applications:
Contact: Mingwei.sun@xjtlu.edu.cn
More information: https://career15.sapsf.cn/sfcareer/jobreqcareer?jobId=4200&company=xjtlu
Brandenburg University of Technology, Chair of IT Security
- AI-based Network Attack Detection and Simulation.
- AI-enabled Penetration Testing.
- Privacy-Enhancing Technologies in Cyber-Physical Systems.
Closing date for applications:
Contact: Ivan Pryvalov (ivan.pryvalov@b-tu.de)
31 July 2025
Zhiyong Fang, Sanjam Garg, Bhaskar Roberts, Wenxuan Wu, Yupeng Zhang
In this paper, we propose a new collaborative zkSNARK scheme with $O(\frac{C}{n}\log\frac{C}{n})$ prover time and $O(1)$ proof size with $n$ servers for a circuit of size $C$. An adversary compromising less than $\frac{n}{4}$ servers cannot learn any information about the witness. The core of our technique lies in a new zkSNARK scheme for the Plonkish constraint system that is friendly to packed secret sharing. We utilize bivariate polynomials to avoid a large Fast Fourier Transform on the entire witness, which was the major bottleneck in prior work. We also construct permutation constraints based on logarithmic derivatives and univariate sumcheck to avoid the computation of prefix products. Finally, we build a bivariate polynomial commitment scheme that can be computed directly on packed secret shares. Experimental results show that for a circuit of size $2^{20}$, with 128 servers, our scheme can accelerate the proof generation by 36.2$\times$ compared to running the zkSNARK on a single server. The prover time of our system is 25.9$\times$ faster than the prior work of zkSaaS. The proof size of our scheme is only 960 Bytes.