Lattice-Based Group Signatures with Logarithmic Signature Size, by Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
Group signatures are cryptographic primitives where users can
anonymously sign messages in the name of a population they belong
to. Gordon et al. (Asiacrypt 2010) suggested the first realization of group signatures based on lattice assumptions in the random oracle model. A significant drawback of their scheme is its linear signature size in the cardinality $N$ of the group. A recent extension proposed by Camenisch et al. (SCN 2012) suffers from the same overhead. In this paper, we describe the first lattice-based group signature schemes where the signature and public key sizes are essentially logarithmic in $N$ (for any fixed security level). Our basic construction only satisfies a relaxed definition of anonymity (just like the Gordon et al. system) but readily extends into a fully anonymous group signature (i.e., that resists adversaries equipped with a signature opening
oracle). We prove the security of our schemes in the random oracle
model under the SIS and LWE assumptions.
Bypassing Passkey Authentication in Bluetooth Low Energy, by Tomas Rosa
This memo describes new cryptographic weakness of the passkey-based pairing of Bluetooth Low Energy (also known as Bluetooth Smart). The vulnerability discussed here extends the set of possible attacking scenarios that were already elaborated before by Mike Ryan at Shmoocon 2013.
Instead of the passive sniffing attack on pairing secrets, we show how an active fraudulent Responder can gracefully bypass passkey authentication, despite it being possibly based on even one-time generated PIN.
Professor / Associate Professor in Information Security, Queensland University of Technology, Brisbane, Australia
The Queensland University of Technology (QUT) in Brisbane, Australia, is seeking to appoint a Professor or Associate Professor to play a senior leadership role in integrating research and teaching in the Information Security Discipline. The successful applicant will have an outstanding research publication and external funding track record. Women, Indigenous Australians and Torres Strait Islander people are strongly encouraged to apply.
The Information Security discipline undertakes research and teaching in the areas of cryptography, network security and digital forensics. The discipline group continues the 25 year pedigree of information security research excellence at QUT, and has a strong track record of success in competitive research funding, high quality publications and international collaboration.
Junior Professorship (W1), Carl von Ossietzky University Oldenburg
The Institute for Mathematics at the Carl von Ossietzky University invites applications for a Junior Professorship in Explicit Methods in Number Theory and Algebra (W 1) starting as soon as possible. The initial appointment will be for a duration of three years. Provided that her or his performance is thereafter evaluated positively, employment may be extended for three more years.
Appointment requirements are governed by Paragraph 30 Section 2 of the Lower Saxony Education Act (Niedersächsisches Hochschulgesetz). The successful applicant will be required to conduct research and teach in the area named above.
The job advertisement is intended for outstanding researchers in the area of Algebra/Number Theory. Knowledge in the following areas is desired: Algebraic Number Theory/Geometry, Computeralgebra, or applications thereof, e.g. Cryptography or Coding Theory.
Interested candidates should submit the usual (CV, publication record, research statement, teaching statement) to the Carl von Ossietzky University Oldenburg, Prof. Dr. Astrid Fischer, Institute for Mathematics, 26111 Oldenburg, Germany. A copy of the application in pdf-format should be sent to traute.lampke (at) uni-oldenburg.de. Deadline for applications is 27-May-2013 (post-marked).
2 Post-Doc, University of Luxembourg
The University of Luxembourg seeks to hire two outstanding post-doctoral researchers at its Interdisciplinary Centre for Security, Reliability and Trust (SnT) (http://wwwen.uni.lu/snt). One of the positions is within the ApSIA http://wwwen.uni.lu/snt/research/apsia) research group led by Prof. Dr. P.Y. Ryan and the second within the SaToSS research group (http://satoss.uni.lu/) led by Prof. Dr. Sjouke Mauw.
The post-docs will be working on formalizing and applying formal reasoning to real-world security problems and trust issues. The research topics will include: security protocols, security modeling, formal methods for security, socio-technical aspects of security, risk management, privacy, verification, etc. The positions will be partially funded by the national research project STAST: Socio-Technical analysis of Security and Trust, which aims to develop strategies and tools to detect and prevent attacks involving human, physical and digital elements.
PhD/MSc positions in Cryptography, Security, and Privacy, Koç University, Istanbul, Turkey
If you want to secure the cloud through the use of provable cryptographic techniques, then you should definitely apply to the Cryptography, Security & Privacy Research Group at Koç University. We have multiple openings for both M.Sc. and Ph.D. level applications. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc. The application deadline is 16th of June.
Koç University has a beautiful campus in the middle of a forest, with a nice view of the Black Sea and the Bosporus, and is close to the ?stanbul city center.
For more information about our group and projects, visit
For applying online, and questions about the application-process, visit
For summer internship opportunities, visit
For questions, contact Asst. Prof. Alptekin Küpçü