International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

09:17 [Pub][ePrint] Template Attacks Based On Priori Knowledge, by Guangjun Fan and Yongbin Zhou and Dengguo Feng

  Template Attacks consist of two stages, the profiling stage and the extraction stage. In order to improve the key-recovery efficiency of Template Attacks, a feasible way is to characterize signals and noises accurately. Under the assumption that a reference device is available, in the profiling stage, one can operate the reference device as many times as possible and samples a large number of power traces to help accurately characterize signals and noises at different interesting points. However, in some practical scenarios, it is not always the case and one can only record a limited number of power traces. In this paper, we show that one can still make Template Attacks practical and more powerful in the above scenario if he could obtain some kind of priori knowledge about the reference device. For example, the priori knowledge is some kind of priori distribution of the signal component in the instantaneous power consumption for fixed operation on fixed data. Evaluation results show that the priori knowledge poses potential threat to the physical security of cryptographic devices and this kind of threat can not be neglected.

09:17 [Pub][ePrint] Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay

  Membership encryption is a newly developed cryptographic primitive that combines membership proof and encryption into an unified setting. This paper presents a new flexible membership encryption scheme which is provably secure and significantly more efficient than the previous scheme. Further we apply our proposed membership encryption to construct a round optimal 1-out-of-$n$ priced oblivious transfer (POT) protocol which, unlike the existing 1-out-of-n POT schemes,is proven secure under the universally composable (UC) security model and thus preserves security when it is executed with multiple protocol instances that run concurrently in an adversarily controlled way. Moreover, using our membership encryption, the POT protocol exhibits constant

communication complexity on the buyer\'s side and $O(n)$ communication cost on the vendor\'s side, which is so far the best known in the literature.

09:17 [Pub][ePrint] The SPEKE Protocol Revisited, by Feng Hao and Siamak F. Shahandashti

  The SPEKE protocol is commonly considered one of the classic Password Authenticated Key Exchange (PAKE) schemes. It has been included in international standards (particularly, ISO/IEC 11770-4 and IEEE 1363.2) and has been deployed in commercial products. We observe that the original SPEKE specification is subtly different from those defined in the ISO/IEC 11770-4 and IEEE 1363.2 standards. We show that those differences have critical security implications. First of all, we present two new attacks on SPEKE: a relay attack and a key-malleability attack. The first attack allows an attacker to impersonate a user without knowing the password by engaging in two parallel sessions with the victim. The second attack allows an attacker to malleate the session key established between two honest users without being detected. Both attacks are applicable to the original SPEKE scheme. However, they are to some extent addressed in the ISO/IEC 11770-4 and IEEE 1363.2 standards, but in a vaguely defined manner. The vagueness makes it extremely difficult for a security-conscious developer to implement the protocol correctly. We propose countermeasures and suggest concrete changes to the standards.

09:17 [Pub][ePrint] An Algebraic Approach to Non-Malleability, by Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald

  In their seminal work on non-malleable cryptography, Dolev, Dwork and Naor, showed how to construct a non-malleable commitment with logarithmically-many \"rounds\"/\"slots\", the idea being that any adversary may successfully maul in some slots but would fail in at least one. Since then new ideas have been introduced, ultimately resulting in constant-round protocols based on any one-way function. Yet, in spite of this remarkable progress, each of the known constructions of non-malleable commitments leaves something to be desired.

In this paper we propose a new technique that allows us to to construct a non-malleable protocol with only a single ``slot\", and to improve in at least one aspect over each of the previously proposed protocols. Two direct byproducts of our new ideas are a four round non-malleable commitment and a four round non-malleable zero-knowledge argument, the latter matching the round complexity of the best known zero-knowledge argument (without the non-malleability requirement). The protocols are based on the existence of one-way permutations (or alternatively one-way functions with an extra round) and admit very efficient instantiations via standard homomorphic commitments and sigma protocols.

Our analysis relies on algebraic reasoning, and makes use of error correcting codes in order to ensure that committers\' tags differ in many coordinates. One way of viewing our construction is as a method for combining many atomic sub-protocols in a way that simultaneously amplifies soundness and non-malleability, thus requiring much weaker guarantees to begin with, and resulting in a protocol which is much trimmer in complexity compared to the existing ones.

09:17 [Pub][ePrint] Non-interactive zero-knowledge proofs in the quantum random oracle model, by Dominique Unruh

  We present a construction for non-interactive zero-knowledge proofs of

knowledge in the random oracle model from general sigma-protocols. Our

construction is secure against quantum adversaries. Prior

constructions (by Fiat-Shamir and by Fischlin) are only known to be

secure against classical adversaries, and Ambainis, Rosmanis, Unruh

(FOCS 2014) gave evidence that those constructions might not be secure

against quantum adversaries in general.

To prove security of our constructions, we additionally develop new

techniques for adaptively programming the quantum random oracle.

09:17 [Pub][ePrint] A Punctured Programming Approach to Adaptively Secure Functional Encryption, by Brent Waters

  We propose a new construction for achieving adaptively secure functional encryption for poly-sized circuits from indistinguishability obfuscation. Our reduction has polynomial loss to the underlying primitives. We develop a punctured programming approach to constructing and proving systems where outside of obfuscation we rely only on primitives constructable from pseudo random generators.

09:17 [Pub][ePrint] Authenticated Key Exchange from Ideal Lattices, by Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook

  In this paper, we propose an authenticated key exchange (AKE) protocol

from Ideal lattices. The protocol

is simple since it does not involve any other cryptographic primitives

to achieve authentication (e.g., signatures). This allows us

to establish a security proof solely based on the hardness of

the well-known ring-LWE problems, thus on some hard lattice problems in the worst-case (e.g., SVP and SIVP). We give the security proof of the proposed

AKE protocol in an enhanced variant of the original

Bellare-Rogaway (BR) model,

which additionally captures weak Perfect Forward Secrecy (wPFS),

in the random oracle (RO) model.

18:09 [Job][New] Research Associate, Faculty of Computer Science, University of New Brunswick, Fredericton, Canada

  The Information Security Centre of Excellence (ISCX) at the Faculty of Computer Science, University of New Brunswick’s Fredericton Campus invites application for a Research Associate in the field of Cyber Security. The successful candidate will work with the members of ISCX to conduct original research, design, and development for the Intelligent Tools for an Automated Security Analysis and Risk Management for Large-Scale Systems project. This project will be carried out in collaboration with IBM Security Division and is mainly funded under the Atlantic Innovation Foundation (AIF) program. For more information on the project and ISCX, please see

To be considered for the position the applicant should have a PhD degree in Computer Science. Some postdoctoral research experience is an asset. Good oral and written communication skills and the ability to work on a team project are essential.

This is a full-time position, available as of October 1, 2014 and will initially be for one year, with the possibility of renewal for three more years. Salary will depend upon the qualifications and experience of the successful applicant.

Interested applicants should submit a covering letter, along with a resume, and the name, address, phone and e-email addresses of three academic references. Review of applications will begin in August 1, 2014 and will continue until the position is filled.

03:52 [Event][New] ICCICS2014: The International Conference on Cyber-Crime Investigation and Cyber Securit

  Submission: 17 October 2014
From November 17 to November 19
Location: Kuala Lumpur, Malaysia
More Information:

03:52 [Event][New] EECEA2014: The International Conference on Electrical, Electronics, Computer Engineeri

  Submission: 17 October 2014
From November 17 to November 19
Location: Kuala Lumpur, Malaysia
More Information:

09:57 [Job][New] Post-Doc, HASLab, INESC TEC, Braga, Portugal

  The High Assurance Software Laboratory (HASLab) at INESC TEC has an opening for a 2 year Post-Doc position.

The position is within the cryptography and information security group in the HASLab.

The group is actively working on: provable security, domain-specific languages and software development tools for cryptography, efficient implementation of cryptographic software, and formal verification of cryptographic proofs and implementations.

We are looking for a highly motivated researcher with a recent Ph.D. and background in at least one of the following fields:

provable security,

efficient implementation of cryptography,

programming languages and verification,

and an interest in carrying out research at their intersection.

The position starts from November 2014. The salary is around 18K euros per year after tax. The working language is English.

Applications should arrive no later than September 19, 2014 and should include a CV, a cover letter, and the names and contact details for two references.