*19:17* [Pub][ePrint]
Unprovable Security of Two-Message Zero Knowledge, by Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass
Goldreich and Oren (JoC\'94) show that only trivial languages have 2-message zero-knowledge arguments. In this note we consider weaker, \\emph{super-polynomial-time} simulation (SPS), notions of zero-knowledge. We present barriers to using black-box reductions for demonstrating soundness of 2-message protocols with efficient prover strategies satisfying SPS zero-knowledge. More precisely, we show that assuming the existence of $\\poly(T(n))$-hard one-way functions, the following holds:\\begin{itemize}

\\item For sub-exponential (or smaller) $T(\\cdot)$, \\emph{polynomial-time} black-box reductions cannot be used to prove soundness of 2-message $T(\\cdot)$-simulatable arguments based on any polynomial-time intractability assumption. This matches known 2-message quasi-polynomial-time simulatable arguments using a quasi-polynomial-time reduction (Pass\'03), and 2-message exponential-time simulatable proofs using a polynomial-time reduction (Dwork-Naor\'00, Pass\'03).

\\item $\\poly(T(\\cdot))$-time black-box reductions cannot be used to prove soundness of 2-message \\emph{strong} $T(\\cdot)$-simulatable (efficient prover) arguments based on any $\\poly(T(\\cdot))$-time intractability assumption; strong $T(\\cdot)$-simulatability means that the output of the simulator is indistinguishable also for $\\poly(T(\\cdot))$-size circuits. This matches known 3-message strong quasi-polynomial-time simulatable proofs (Blum\'86, Canetti et al\'00).

\\end{itemize}

*17:36* [Job][New]
Post-doc (three posts), *Centre for Cybercrime and Computer Security, Newcastle University, UK, EU*
You will join a vibrant and growing team of security researchers at the Centre for Cybercrime and Computer Security (CCCS) at Newcastle University. The aim of the project is to address one of the grand challenges in the real world: how to develop an e-voting system that is secure, dependable and usable for future elections.This is a five-year project, supported by the European Research Council (ERC) Starting Grant. The initial appointments will be three years. Further extension by another two years will be possible subject to the performance and available funding. The expected starting date is 1 March, 2013 (flexible)

To apply for the posts, you need to have a PhD in Computer Science, engineering or related discipline, with a solid background in security and an excellent track record. Expertise in one of the following areas is especially desirable: cryptography, dependability and usable security.

*12:54* [Job][Update]
PostDoc in Cryptography, *University of Bristol, UK, EU*
The Cryptography group within the Department of Computer Science has grown considerably in the last year and additional researchers are required in the following areas: - Analysis of “real world” protocols
- Formal Methods applied to security protocols
- Fully Homomorphic Encryption
- Lattice Based Cryptography
- Provable Security, i.e. Protocol and Mechanism design
- Multi-Party Computation

You will hold a PhD, or expect to be awarded soon, and have experience in one of the sub-areas of cryptography mentioned above.

You will have a good level of analytical skills and the ability to communicate complex information clearly, both orally and through the written word together with the ability to use personal initiative, and creativity, to solve problems encountered in the research context.

Ideally, you will also have a strong publication record in top relevant venues, such as the IACR conferences and journal, ACM-CCS, IEEE S&P, ESORICS, etc

Appointment may be made at the Research Assistant (grade I) or Research Associate (grade J) level depending on skills and experience and will be for 2 to 3 years in the first instance.

**Please Note:** This is a “rolling advert” with a nominal close date only. Applications are welcome at any time and the timing of the selection process will be dependent on the applications received.

*12:53* [Job][New]
PostDoc in Cryptography, *University of Bristol*
The Cryptography group within the Department of Computer Science has grown considerably in the last year and additional researchers are required in the following areas: - Analysis of “real world” protocols
- Formal Methods applied to security protocols
- Fully Homomorphic Encryption
- Lattice Based Cryptography
- Provable Security, i.e. Protocol and Mechanism design
- Multi-Party Computation

You will hold a PhD, or expect to be awarded soon, and have experience in one of the sub-areas of cryptography mentioned above.

You will have a good level of analytical skills and the ability to communicate complex information clearly, both orally and through the written word together with the ability to use personal initiative, and creativity, to solve problems encountered in the research context.

Ideally, you will also have a strong publication record in top relevant venues, such as the IACR conferences and journal, ACM-CCS, IEEE S&P, ESORICS, etc

Appointment may be made at the Research Assistant (grade I) or Research Associate (grade J) level depending on skills and experience and will be for 2 to 3 years in the first instance.

**Please Note:** This is a “rolling advert” with a nominal close date only. Applications are welcome at any time and the timing of the selection process will be dependent on the applications received.

*13:17* [Pub][ePrint]
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors, by Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
We discuss how to recover RSA secret keys from noisy key bits with erasuresand errors.

There are two known algorithms recovering original secret keys from noisy

keys.

At Crypto 2009, Heninger and Shacham proposed a method for the case

where an erroneous version of secret keys contains only erasures.

Subsequently, Henecka et al. proposed a method

for an erroneous version containing only errors at Crypto2010.

For physical attacks such as side-channel and cold boot attacks,

we need to study key recovery from a noisy secret key containing both erasures

and errors.

In this paper, we propose a method to recover a secret key from such an

erroneous version

and analyze the condition for error and erasure rates so that

our algorithm succeeds in finding the correct secret key in polynomial time.

We also evaluate a theoretical bound to recover the secret key

and discuss to what extent our algorithm achieves this bound.

*13:17* [Pub][ePrint]
Cryptanalysis of RAPP, an RFID Authentication Protocol, by Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
Tian et al. proposed a novel ultralightweightRFID mutual authentication protocol [4] that has recently

been analyzed in [1], [2], [5]. In this letter, we first propose

a desynchronization attack that succeeds with probability

almost 1, which improves upon the 0.25 given by the attack

in [1]. We also show that the bad properties of the proposed

permutation function can be exploited to disclose several

bits of the tag\'s secret (rather than just one bit as in [2]),

which increases the power of a traceability attack. Finally,

we show how to extend the above attack to run a full

disclosure attack, which requires to eavesdrop less protocol

runs than the attack described in [5] (i.e., 192

*13:17* [Pub][ePrint]
Profiled Model Based Power Simulator for Side Channel Evaluation, by Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks.This forces smart-card manufacturers to carefully consider development of security mechanisms.

To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time.

Based on a high level simulator, we propose to use profiled abstract models to gain accuracy on the simulated traces.

These abstract models are obtained by profiling some parts of the target device which is physically available by the evaluator.

*13:17* [Pub][ePrint]
On the Non-malleability of the Fiat-Shamir Transform, by Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi
The Fiat-Shamir transform is a well studied paradigm for removing interaction from public-coin protocols. We investigate whether the resulting non-interactive zero-knowledge (NIZK) proof systems also exhibit non-malleability properties that have up to now only been studied for NIZK proof systems in the common reference string model: first, we formally define simulation soundness and a weak form of simulation extraction in the random oracle model (ROM). Second, we show that in the ROM the Fiat-Shamir transform meets these properties under lenient conditions.A consequence of our result is that, in the ROM, we obtain truly efficient non malleable NIZK proof systems essentially for free. Our definitions are sufficient for instantiating the Naor-Yung paradigm for CCA2-secure encryption, as well as a generic construction for signature schemes from hard relations and simulation-extractable NIZK proof systems. These two constructions are interesting as the former preserves both the leakage resilience and key-dependent message security of the underlying CPA-secure encryption scheme, while the latter lifts the leakage resilience of the hard relation to the leakage resilience of the resulting signature scheme.