IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
17 November 2025
Tingyu Ge, Mingqiang Wang, Xiaolei Wang, Xinyuan Zhao
Junqing Gong, Brent Waters, Hoeteck Wee, David J. Wu
In this work, we introduce a new algebraic framework for building pairing-based batched IBE. Our framework gives the following:
First, we obtain a selectively-secure batched IBE scheme under a $q$-type assumption in the plain model. Both the ciphertext and the secret key consist of a constant number of group elements. This is the first pairing-based batched IBE scheme in the plain model. Previous pairing-based schemes relied on the generic group model and the random oracle model.
Next, we show how to extend our base scheme to a threshold batched IBE scheme with silent setup. In this setting, users independently choose their own public and private keys, and there is a non-interactive procedure to derive the master public key (for a threshold batched IBE scheme) for a group of users from their individual public keys. We obtain a statically-secure threshold batched IBE scheme with silent setup from a $q$-type assumption in the plain model. As before, ciphertexts and secret keys in this scheme contain a constant number of group elements. Previous pairing-based constructions of threshold batched IBE with silent setup relied on the generic group model, could only support a polynomial number of identities (where the size of the public parameters scaled linearly with this bound), and ciphertexts contained $O(\lambda / \log \lambda)$ group elements, where $\lambda$ is the security parameter.
Finally, we show that if we work in the generic group model, then we obtain a (threshold) batched IBE scheme with shorter ciphertexts (by 1 group element) than all previous pairing-based constructions (and without impacting the size of the secret key).
Our constructions rely on classic algebraic techniques underlying pairing-based IBE and do not rely on the signature-based witness encryption viewpoint taken in previous works.
Dilip Kumar S. V., Benedikt Gierlichs, Ingrid Verbauwhede
Sven Bauer, Fabrizio De Santis, Kristjane Koleci
Parhat Abla
Mohammad Sadegh Ahmadi, Taraneh Eghlidos, Behzad Abdolmaleki, Ngoc Khanh Nguyen
Wei Huang, Shuming Jiao, Huichang Guan, Huisi Miao, Chao Wang
Javier Herranz, Hugo Louiso
Recent works are also studying hash-based signature schemes with additional properties, like group, ring, threshold, or aggregate signature schemes. In this work we do the same for the important case of blind signatures. We describe a possible hash-based instantiation of Fischlin's generic scheme, we motivate our choices and we finally give some benchmarks for running times and memory requirements, resulting from our C implementation.
Alexander Wagner, Marc Schink, Silvan Streit, Dominik Klein, Sven Freud
In practice, they are most applicable to verify the integrity and authenticity of data that rarely changes, such as the firmware of embedded devices. The verification procedure then takes place during a secure boot or firmware update process. In past works, the research community has investigated hardware and software optimizations for this use case and vendors brought forward products.
In this study, we practically evaluate a fault attack on the Winternitz One-Time Signature (WOTS) scheme. The attack can be mounted on different HBS schemes, such as LMS, XMSS, and SPHINCS+. Both, the verification as well as the signing operation can be targeted.
The study describes the preparation and implementation of the attack on a standard microcontroller as well as the difficulties the attacker has to overcome. Additionally it presents a countermeasure, which is easy to implement and can increase the effort for an attacker significantly.
Adithya Bhat, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Duc V Le, Mohsen Minaei
We present a flexible payment system where clients independently choose assumptions about (i) network timing (bounded or partial synchrony), (ii) corruption (static or adaptive), and (iii) faults (crash or Byzantine), supporting eight assumption combinations simultaneously. Unlike traditional systems requiring consensus, our approach uses a novel flexible variant of consistent broadcast where clients external to the protocol verify delivery through cryptographic proofs, eliminating the need for global ordering. We implemented our system in Rust and demonstrated that clients choosing partially synchronous network and crash assumptions achieve $+242.1\%$ higher throughput and $+70.4\%$ better latency compared to clients with synchronous network and Byzantine assumptions, confirming that our system enables users to optimize their individual security-performance trade-offs.
14 November 2025
Darya Kaviani, Srinath Setty
Zhongxiang Zheng, Anyu Wang, Chunhuan Zhao, Guangwu Xu, Zhengtao Jiang, Sibo Feng, Zhichen Yan, Shuang Sun, Xiaoyun Wang
Markku-Juhani O. Saarinen
We also outline some of the risks associated with the partially closed standardisation process, including active impact minimisation by vendors concerned with engineering costs, a lack of public review leading to lower technical quality, and an increased potential for backdoors.
The Cyber Resilience Act came into effect in December 2024, and its obligations will fully take effect for makers of ``products with digital elements'' from 2027. CRA compliance is a requirement for obtaining the CE mark and a prerequisite for selling products in the European Single Market, which comprises approximately 450 million consumers. The CRA has a wide-ranging set of security requirements, including security patching and the use of cryptography (data integrity, confidentiality for data at rest and data in transit). However, the Cyber Resilience Act itself is a legal text devoid of technical detail -- it does not specify the type of cryptography deemed appropriate to satisfy its requirements.
The technical implications of CRA are being detailed in approximately 40 new standards from the three European standardisation organisations, CEN, CENELEC, and ETSI. While the resulting ETSI standards can be expected to be available for free even in the drafting stage, the CEN and CENELEC standards will probably require a per-reader license fee. This, despite recent legal rulings asserting that product security and safety standards are part of EU law due to their legal effects.
Taking a recent (2024) example of cryptographic requirements in such standards, we observe that the definitions and language in the Radio Equipment Directive (RED DA) harmonised standard (EN 18031 series) may allow vendors to take an approach where weak cryptography is considered ``best practice'' right until exploitation is feasible.
Recognising recent developments such as the EU Post-Quantum Cryptography transition roadmap, many CRA standardisation working groups are moving towards a ``State-of-the-Art Cryptography'' (SOTA Cryptography) model where approved mechanism listings are published by the European Cybersecurity Certification Group (ECCG). CRA-compliant products may still support other cryptographic mechanisms, but only SOTA is permitted as a safe default for Internet-connected products.
Matthias Fitzi, Aggelos Kiayias, Laurent Michel, Giorgos Panagiotakos, Alexander Russell
The Ofelimos ``Proof-of-Useful-Work'' protocol (Fitzi et al., CRYPTO 2022) addressed this by establishing that useful combinatorial problems could replace the conventional hashing puzzles, yielding a provably secure blockchain that meaningfully utilizes the computational work that underlies the protocol. The usefulness to wastefulness ratio of Ofelimos hinges on the properties of its underlying generic distributed local-search algorithm---Doubly Parallel Local Search (DPLS). We observe that this search procedure is particularly wasteful when exploring steep regions of the solution space.
To address this issue, we introduce Frequently Rerandomized Local Search (FRLS), a new generic distributed local search algorithm that we show to be consistent with the Ofelimos architecture. While this algorithm retains ledger security, we show that it also provides compelling performance on benchmark problems arising in practice: Concretely, state-of-art local-search algorithms for cumulative scheduling and warehouse location can be directly adapted to FRLS and we experimentally demonstrate the efficiency of the resulting algorithms.
Hasan Ozgur Cildiroglu, Harun Basmaci, Oguz Yayla
13 November 2025
Hammamet, Tunisie, 8 July - 10 July 2026
Virtual event, Anywhere on Earth, -
Submission deadline: 30 June 2026
TU Darmstadt, Germany
Topics of particular interest include (but are not limited to):
- Distributed cryptography
- Cryptography for blockchains and cryptocurrencies
- Cryptography for privacy
- Completed Master's degree (or equivalent) with excellent grades in computer science, mathematics or a similar area.
- Strong mathematical and/or algorithmic/theoretical CS background
- Good knowledge of cryptography. Knowledge in concepts of provable security is a plus.
- Fluent written and verbal communication skills in English
Review of applications starts immediately until the position is filled. For further information please visit: https://www.informatik.tu-darmstadt.de/cac/cac/index.en.jsp
Please send your application including a CV, transcripts from your Bachelor and Master and a letter of motivation to: job@cac.tu-darmstadt.de
Closing date for applications:
Contact: Sebastian Faust
More information: https://www.informatik.tu-darmstadt.de/cac/cac/index.en.jsp
Princeton University
The DeCenter is a newly established interdisciplinary hub at Princeton University devoted to exploring the decentralization of power and trust through blockchain (and similar) technology.
We seek to create a truly interdisciplinary cohort of postdoctoral fellows to jointly lead research projects. Fellows' primary responsibilities will therefore be to conduct research and collaborate with others in cross-disciplinary research initiatives. We also seek to maintain a vibrant interdisciplinary community, and fellows will also be responsible for co-organizing weekly seminars, occasional workshops, etc. that are of interest to the broader DeCenter community. An ideal candidate would satisfy the following selection criteria:
A strong record of research in their primary discipline.
A demonstrated ability to lead independent projects.
A demonstrated ability (ideal) or demonstrated interest (necessary) in interdisciplinary engagements, and the ability to serve as a strong bridge between their primary discipline and others.
A strong record of research (ideal) or demonstrated interest (necessary) in foundational research concerning blockchain technology or similar technologies that support the decentralization of trust.
Closing date for applications:
Contact: Matt Weinberg, smweinberg@princeton.edu
More information: https://puwebp.princeton.edu/AcadHire/apply/application.xhtml?listingId=40762
Institute of Science and Technology Austria (ISTA), Klosterneuburg (close to Vienna), Austria
The Cryptography Group at ISTA invites applications for a Postdoctoral Researcher in theoretical and applied cryptography. For part (about one year) this position can be funded by the SPYCODE project (https://spycode.at/).
Potential research topics include:
- blockchain related topics, including consensus protocols, scaling.
- proofs of resources, like proofs of work, proofs of space, proofs of time (verifiable delay functions).
- public-key cryptography.
- lower bounds.
Position details:
- Full-time, fully funded.
- Initial term: 2 years, extendable.
- Flexible start (ideally asp).
- Working language: English (no German required).
About IST Austria:
The Institute of Science and Technology Austria, near Vienna, offers a vibrant, international research environment, strong interdisciplinary exchange, and competitive compensation.
Application:
Please send a CV and optionally a research statement and contact details of one or two referees to pietrzak@ista.ac.at with the subject Postdoc Application – SPYCODE.
Applications will be reviewed until the position is filled.
Closing date for applications:
Contact: pietrzak@ista.ac.at
More information: https://ist.ac.at/en/research/pietrzak-group