Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
The studentships are only open to UK nationals and the successful candidate will be required to spend in the region of 2 - 4 weeks per year at GCHQ headquarters in Cheltenham. To be considered for this studentship, candidates must therefore be prepared to undergo GCHQ\\\'s security clearance procedures.
The studentships will be funded for a period of 3.5 years. GCHQ will cover the costs of university fees (currently £ 3828 per annum) and will provide an annual stipend to the student corresponding to the National Minimum Stipend (currently £ 13,590 per annum) plus an additional stipend of £ 7,000 per annum. Making a total tax-free stipend of £ 20,590 per annum. A generous travel budget is also provided to enable attendance at international conferences and workshops.
More information on Coding and Crypto Research Group at Nanyang Technological University can be found at http://www1.spms.ntu.edu.sg/~ccrg/index.html
The applications will be considered immediately. The positions are for 1 year, but renewable up to 3 years.
respect to adversaries with auxiliary input is false in any group where computing discrete logarithms is intractable. The proof uses the \"punctured programs\" technique of [Sahai-Waters 2013].
- Our multiparty key exchange protocol does not require a trusted setup. Moreover, the size of the published value from each user is independent of the total number of users.
- Our broadcast encryption schemes support distributed setup, where users choose their own secret keys. The broadcast ciphertext size is independent of the number of users.
- Our traitor tracing system is fully collusion resistant and provides ciphertexts that are logarithmic in the number of users and constant-sized secret keys. This construction resolves an open problem relating to differential privacy.
Our proof of security for traitor tracing introduces a new tool for iO proofs: the construction makes use of a key-homomorphic symmetric cipher which plays a crucial role in the proof of security.