International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

13:17 [Pub][ePrint] A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem, by Jintai Ding

  We use a variant of learning with errors (LWE) problem, a simple and direct extension of the original LWE problem to the case of a small secret, which we call

a small LWE problem (SLWE), to build a new simple and provably secure key exchange scheme. The basic idea behind the construction can be viewed as certain type of bilinear pairing with errors (PE). We build a more efficient implementation of our scheme using a similar LWE problem but solely based on matrices, and we extend our construction further using the ring LWE problem, where the provable security is based on the hardness of the ring LWE problem.

13:17 [Pub][ePrint] Cryptography Using CAPTCHA Puzzles, by Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia

  A \\captcha is a puzzle that is easy for humans but hard to solve for computers.

A formal framework,

modelling \\captcha puzzles (as hard AI problems), was introduced by

Ahn, Blum, Hopper, and Langford (\\cite{AhnBHL03}, Eurocrypt 2003). Despite their

attractive features and wide adoption in practice, the use of \\captcha puzzles

for general cryptographic applications has been limited.

In this work, we explore various ways to formally model \\captcha puzzles and their human component


explore new applications for \\captcha. We show that by defining \\captcha with

additional (strong but realistic) properties,

it is possible to broaden \\captcha applicability, including using it to learning a machine\'s

``secret internal state.\'\'

To facilitate this, we introduce

the notion of an human-extractable \\captcha, which we believe may be of independent interest.

We show that this type of \\captcha yields a \\emph{constant round} protocol for \\emph{fully}

concurrent non-malleable zero-knowledge. To enable this we also define and

construct a \\captcha -based commitment scheme which admits ``straight line\'\' extraction.

We also explore

\\captcha definitions in the setting of Universal Composability (UC). We show that there are two (incomparable) ways to

model \\captcha within the UC framework that lead to different results.

In particular, we show that in the so called

\\emph{indirect access model}, for every polynomial time functionality $\\calf$

there exists a protocol that UC-realizes $\\calf$ using human-extractable \\captcha, while for the so-called

\\emph{direct access model}, UC is impossible, even with the help of human-extractable \\captcha.

The security of our constructions using human-extractable \\captcha

is proven against the (standard) class of

all polynomial time adversaries. In contrast, most previous works guarantee

security only against a very limited class of adversaries, called the

\\emph{conservative} adversaries.

13:17 [Pub][ePrint] The Weakness of Integrity Protection for LTE, by Teng Wu and Guang Gong

  In this paper, we concentrate on the security issues of the integrity protection of LTE and present two different forgery attacks. For the first attack, referred to as a {\\em linear forgery attack}, EIA1 and EIA3, two integrity protection algorithms of LTE, are insecure if the initial value (IV) can be repeated twice during the life cycle of an integrity key (IK). Because of the linearity of EIA1 and EIA3, given two valid Message Authentication Codes (MACs) our algorithm can forge up to $2^{32}$ valid MACs. Thus, the probability of finding a valid MAC is dramatically increased. Although the combination of IV and IK never repeats in the ordinary case, in our well-designed scenario, the attacker can make the same combination occur twice. The duplication provides the opportunity to conduct our linear forgery attack, which may harm the security of communication. To test our linear forgery attack algorithm, we generate two counter check messages and successfully forge the third one. We also examine the attack timing by simulating real communication. From the experimental results, our attack is applicable. The second attack is referred to as a {\\em trace extension forgery attack}, which works only in theory. However, this attack is more general than the linear forgery attack. Known only one MAC and message pair, we can construct a different message, who has the same MAC as the original one, with the probability $\\frac{1}{2^{16}}$. In this attack, trace function is applied to the message to shrink the guessing space.

13:17 [Pub][ePrint] Root Optimization of Polynomials in the Number Field Sieve, by Shi Bai and Richard P. Brent and Emmanuel Thom\\\'e

  The general number field sieve (GNFS) is the most efficient

algorithm known for factoring large integers. It consists of several

stages, the first one being polynomial selection. The quality of the

chosen polynomials in polynomial selection can be modelled in terms of

size and root properties. In this paper, we describe some algorithms for

selecting polynomials with very good root properties.

13:17 [Pub][ePrint] Integrated PKE and PEKS - Stronger Security Notions and New Constructions , by Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin

  In this paper we investigate the security for integrated public-key encryption (PKE)

and public-key encryption with keyword search (PEKS) schemes. We observe that the security

notions for integrated PKE and PEKS schemes considered in the existing literature are not strong

enough to capture practical attacks, thus define a new notion named joint CCA-security which is

shown to be stronger than the previous ones. We also propose two simple and efficient constructions

of jointly CCA-secure integrated PKE and PEKS schemes from anonymous (hierarchical) identity-

based encryption schemes. Besides, we review the consistency for PEKS schemes and improve

previous results.

22:30 [Job][New] Postdoctoral Research Fellow, Queensland University of Technology, Brisbane, Australia


The Information Security discipline at the Queensland University of Technology (QUT) in Brisbane, Australia, invites applications for a 2-year post-doctoral researcher position in cryptography starting in 2013. The focus of the position is on analyzing and characterizing the overall security of real-world cryptographic protocols such as TLS. We are looking for outstanding candidates with experience in cryptographic modelling, provable security, and key exchange protocols. The position is supported by an Australia Research Council (ARC) Discovery Project grant.

Applicants should have recently completed, be under examination for, or be close to submitting a PhD. Starting salary is between AUD$57,187 and $77,598 per annum, plus 17% pension contribution. Funds for relocation and travel will also be available.

QUT\'s Science and Engineering Faculty has an active and growing group with research strengths in cryptography, network security, and digital forensics, with a leading national profile and strong international links. QUT is investing heavily in science and technology research, with a new $240 million facility in the heart of Brisbane\'s central business district housing many interdisciplinary research groups, including information security. Brisbane is a city of 2 million people with a high quality of living, and many of Queensland\'s stunning beaches and wilderness are less than half an hour away.

10:05 [Event][New] CTCrypt 2013: 2nd Workshop on Current Trends in Cryptology

  Submission: 11 March 2013
Notification: 22 April 2013
From June 23 to June 24
Location: Ekaterinburg, Russia
More Information:

15:56 [Job][New] Two Ph.D. studentships, Royal Holloway, University of London, UK

  The Government Communications Headquarters (GCHQ) in Cheltenham, UK, has agreed in principle to sponsor two PhD/Doctoral Studentships to be held with the Information Security Group of Royal Holloway (University of London) in the area of cryptography. The studentships will be funded for a period of 3.5 years, starting in September 2013. The two studentships available are as follows:

A Computational Algebra Approach to Learning with Errors

Supervisors: Dr Carlos Cid and Prof. Sean Murphy

Randomness in Cryptography – Theory Meets Practice

Supervisor: Prof. Kenny Paterson

Note that the studentships are only open to UK nationals and the successful candidates will be required to spend in the region of 2 - 4 weeks per year at GCHQ headquarters in Cheltenham. To be considered for this studentship, candidates must therefore be prepared to undergo GCHQ\'s security clearance procedures.

15:56 [Job][New] Post-Doc in Security and Privacy, Technische Universität Darmstadt, Germany

  The Department of Computer Science, Chair for Security in Information Technology (Prof. Dr. Michael Waidner) is soliciting applications to fill the position of a

Post-doc in Security and Privacy

Code: 2013-01-491 (in PDF)

Deadline for applications: January 6th, 2013 (might be extended)

We are seeking highly motivated candidates with a strong background and interest in IT security and/or privacy who have finished or will finish soon their Doctorate/PhD in Computer Science or a related discipline.

Preference will be given to candidates with experience in at least one of these areas:

Application security, in particular web application security

Secure engineering, in particular software security, assurance for open source projects

Privacy and transparency enhancing technologies

Security, privacy and compliance management for cloud computing

We expect excellent research and contributions to our teaching program. The position will be part of the ongoing research activities at the Security in IT research group. We actively support publication and presentation of research at the top international conferences and offer an internationally well-connected, interdisciplinary and engineering-oriented work environment.

The position is funded by the university and not bound to a specific project (i.e., it is a \"Landesstelle\"). The position is initially limited to 2 years but may be extended. Compensation follows the Tarifvertrag für die Technische Universität Darmstadt (TV - TU Darmstadt). The Technische Universität Darmstadt aims at increasing the number of female researchers and therefore explicitly encourages women to apply. Severely handicapped will be preferred, given equal qualification.

Applications must include:

Professional CV

List of publications and copies of two selected publications


05:53 [Event][New] ACISP 2013: 18th Australasian Conference on Information Security and Privacy

  Submission: 15 February 2013
Notification: 12 April 2013
From July 1 to July 3
Location: Brisbane, Australia
More Information:

05:52 [Job][Update] Assistant Professor, Sejong University, Seoul, South Korea


The Department of Computer and Information Security at Sejong University is looking for an Assistant Professor, starting in March 2013. Applicants must have a Ph.D. in computer science, computer engineering, or applied mathematics and must have research experiences in one of the followings: computer network and system security, software security, information security or cryptography.

The successful candidate will be responsible for the followings: teaching at least 5 courses a year at both the undergraduate and graduate level, student consulting, research, and other professional services.

Candidates with strong research background in the area of security andcryptography are encouraged to apply.