On the Correlation Intractability of Obfuscated Pseudorandom Functions, by Ran Canetti and Yilei Chen and Leonid Reyzin
A family of hash functions is called ``correlation intractable\'\' if it is hard to find, given a random function in the family, an input-output pair that satisfies any ``sparse\'\' relation, namely any relation that is hard to satisfy for truly random functions. Correlation intractability captures a strong and natural Random Oracle-like property. However, it is widely considered to be unobtainable. Indeed, it was shown that correlation intractable functions do not exist for some length parameters [Canetti, Goldreich and Halevi, J.ACM 04]. Furthermore, no candidate constructions have been proposed in the literature for any setting of the parameters.
We construct a correlation intractable function ensemble that withstands all relations with a priori bounded polynomial complexity. We assume the existence of sub-exponentially secure indistinguishability obfuscators, puncturable pseudorandom functions, and input-hiding obfuscators for evasive circuits. The existence of the latter is implied by Virtual-Grey-Box obfuscation for evasive circuits [Bitansky et al, CRYPTO 14].
Arithmetic Cryptography, by Benny Applebaum and Jonathan Avron and Christina Brzuska
We study the possibility of computing cryptographic primitives in a fully-black-box arithmetic model over a finite field $\\F$. In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits which make only a black-box use of the underlying field, and the adversary has a full (non-black-box) access to the field. This model captures many standard information-theoretic constructions.
We prove several positive and negative results in this model for various cryptographic tasks. On the positive side, we show that, under reasonable assumptions, computational primitives like commitment schemes, public-key encryption, oblivious transfer, and general secure two-party computation can be implemented in this model. On the negative side, we prove that garbled circuits, multiplicative-homomorphic encryption, and secure computation with low online complexity cannot be achieved in this model. Our results reveal a qualitative difference between the standard Boolean model and the arithmetic model, and explain, in retrospect, some of the limitations of previous constructions.
Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers - 2 posts), Ruhr-University Bochum
The Cryptology Group and the Embedded Security Group at Ruhr-University Bochum (Horst-Goertz Institute) are seeking to recruit two Marie Sklodowska-Curie Research Fellows in Cryptography to start in September 2015, as part of the ECRYPT-NET project.
ECRYPT-NET is a research network of six universities and two companies that intends to develop advanced cryptographic techniques for the Internet of Things and the Cloud, and to create efficient and secure implementations of those techniques on a broad range of platforms. ECRYPT-NET is funded by a prestigious Marie Sklodowska-Curie ITN (Integrated Training Network) grant. The network will educate a group of 15 PhD students with a set of interdisciplinary skills in the areas of mathematics, computer science and electrical engineering. The training will be provided in an international context that include Summer Schools, workshops and internships. Participants are expected to spend at least six months abroad with a network partner or in one of the seven associated companies. We are looking for highly motivated candidates, ideally with background on cryptology and with proven research abilities.
Two of the ECRYPT-NET ESR (Early Stage Researcher) positions will be based at Ruhr-University Bochum, to work on the following projects:
- Fully Homomorphic Encryption - Design and Analysis
- Post-Quantum Cryptosystems on Embedded Platforms
Marie Curie ITN eligibility criteria apply to both of these positions.
Founded in 2001, the Horst-Görtz Institute at Ruhr-University Bochum is a world-leading interdisciplinary research center dedicated to research and education covering all aspects of IT security, with an excellent record of research in cryptography. The Horst-Görtz Institute has 15 professors and over 80 PhD students. It hosts the only German Research Training Group for Doctoral students in Cryptology.
Post-Doc, Zhejiang University City College, Hangzhou, CHINA
We are looking for postdoc fellow with expertise on Cryptographic Protocols (UC-security, multi-party computations), Information Security, Cloud Computing and Big Data Analytics. The candidates should have PhD in Cryptography and Information Security or Cloud Computing or Database Engineering with track record of strong R&D capability.
Please contact with Dr. Huafei Zhu (zhuhf (at) zucc.edu.cn) if you are interested in these positions
Three senior lectureships or lectureships (associate/assistant professor), University of Birmingham, UK
Two or three of the posts are research-focussed. Candidates are expected to have established research careers, demonstrating sustained excellent publication record and some ability to attract research funding. No particular research areas within cyber security are sought, although we particularly encourage candidates whose research complements and extends the current capabilities of the group**.
One of the posts may be a teaching-focussed position, and would suit someone with significant industry experience who is able to authoritatively teach topics related to cyber security in industry. Applicants for this position are not expected to have a research track record, but should have a track record of achievement in industry.
Ph.D. student in Security and Privacy of Cyber-Physical Systems, University College Cork, Ireland
Project: Secure and Privacy-Preserving Cyber-Physical Systems
Subject to approval from funding agency, the research project will investigate security and privacy issues in Cyber-Physical Systems. A team of 5 researchers will work on the project, including 3 Ph.D. students.
Applications are invited for fixed-term studentships (annual value of €18K, plus fees) from suitably qualified candidates who wish to undertake a PhD within the Department of Computer Science. Applicants should have a Masters degree in computer science or a closely related discipline, although applications from truly exceptional students with a honours bachelor\'s degree will be considered. Ideally, applicants will have some project experience in the areas of network security (intelligent transportation systems or industrial control systems would be a plus), privacy, or more generally computer security. Applicants must have very good mathematical ability and an interest in systems programming and experimental computer science.
Applicants must demonstrate good inter-personal skills, and a high standard of spoken and written English. The positions are open to applicants of any nationality. Non-EU applicants should visit http://www.ucc.ie/en/international/noneu-pg/english/ for UCC English Language Requirements.
How to apply:
Applications by email to Mary Noonan m.noonan (at) cs.ucc.ie and must include “PhD Studentship CyPS” in the subject line. Applications must include, in PDF format only:
1. 300 word personal statement explaining your interest in the project and computer security&privacy research;
2. full CV;
3. copy of transcript(s) showing names of all courses taken and grades achieved;
4. summaries of projects (BSc/MSC), internships and relevant work experience completed.
5. names and contact information of at least one reference.
For further information about the position, p