International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

09:17 [Pub][ePrint] High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer, by Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orl

  We present a unified view of the two-party and multi-party computation protocols based on oblivious transfer first outlined in Nielsen et al and Larraia et al. We present a number of modifications and improvements to these earlier presentations, as well as full proofs of the entire protocol. Improvements include a unified pre-processing and online MAC methodology, mechanisms to pass between different MAC methodologies, fixing a minor bug in the protocol of Larraia et al in relation to a selective failure attack.

23:14 [Conf][Crypto] CRYPTO 2015 list of accepted papers


The list of papers accepted to CRYPTO 2015 is now up:

09:17 [Pub][ePrint] The Oblivious Machine - or: How to Put the C into MPC, by Marcel Keller

  We present the oblivious machine, a concrete notion for multiparty

random access machine (RAM) computation and a toolchain to allow the

efficient execution of general programs written in a subset of C that

allows RAM-model computation over integers. The machine only leaks the

list of possible instructions and the running time. Our work is based

on the oblivious array for secret-sharing-based multiparty computation

by Keller and Scholl (Asiacrypt `14). This means that we only incur a

polylogarithmic overhead over the execution on a normal CPU.

We implemented our construction using the clang compiler from the LLVM

project and the SPDZ protocol by Damgård et al. (Crypto `12). The

latter provides active security against a dishonest majority and works

in the preprocessing model. The online phase clock rate of the

resulting machine is 41 Hz for a memory size of 1024 64-bit integers

and 2.2 Hz for a memory of 2^20 integers. Both timings have been taken

for two parties in a local network.

To further showcase our toolchain, we implemented and benchmarked

private regular expression matching. Matching a string of length 1024

against a regular expression with 69270 transitions as a finite state

machine takes seven hours online time, of which more than six hours

are devoted to loading the reusable program.

09:17 [Pub][ePrint] Practical Fully Homomorphic Encryption without Noise Reduction, by Dongxi Liu

  We present a new fully homomorphic encryption (FHE) scheme that is efficient for practical applications. The main feature of our scheme is that noise reduction considered essential in current FHE schemes, such as boot strapping and modulus switching, is not needed in our scheme, because it allows arbitrarily large noises in its ciphertexts.

A ciphertext in our scheme is a vector with its dimension specified as a security parameter of the encryption key. The dimension of ciphertexts does not change with homomorphic operations and all ciphertext elements are in a finite domain, so our scheme is compact. In addition, our scheme can directly encrypt big integers, rather than only bit messages.

We proved the hardness of recovering encryption keys from any number of ciphertexts with chosen plaintexts and then the semantic security of our scheme. The hardness of recovering keys from ciphertexts is based on the approximate greatest common divisors problem.

We implemented a prototype of our scheme and evaluated its concrete performance extensively from the aspects of encryption, decryption, homomorphic operations,

and bitwise operators over ciphertexts.

The efficiency of our scheme is confirmed by the evaluation result.

09:17 [Pub][ePrint] Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies, by Florian Tschorsch and Björn Scheuermann

  Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital currencies and influenced many adjacent areas. This also induced significant scientific interest. In this survey, we unroll and structure the manyfold results and research directions. We start by introducing the Bitcoin protocol and its building blocks. From there we continue to explore the design space by discussing existing contributions and results. In the process, we deduce the fundamental structures and insights at the core of the Bitcoin protocol and its applications. As we show and discuss, many key ideas are likewise applicable in various other fields, so that their impact reaches far beyond Bitcoin itself.

09:17 [Pub][ePrint] Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation, by Hwajeong Seo and Zhe Liu and Howon Kim

  Advanced modern processors support Single Instruction Multiple Data (SIMD) instructions (e.g. Intel-AVX, ARM-NEON) and a massive body of

research on vector-parallel implementations of modular arithmetic, which are crucial components for modern public-key cryptography ranging from RSA, ElGamal, DSA and ECC, have been conducted.

In this paper, we introduce a novel Double Operand Scanning (DOS) method to speed-up multi-precision squaring with non-redundant representations on SIMD architecture.

The DOS technique partly doubles the operands and computes the squaring operation without Read-After-Write (RAW) dependencies between source and destination variables.

Furthermore, we presented Karatsuba Cascade Operand Scanning (KCOS) multiplication and Karatsuba Double Operand Scanning (KDOS) squaring by adopting additive and subtractive Karatsuba\'s methods, respectively.

The proposed multiplication and squaring methods are compatible with separated Montgomery algorithms and these are highly efficient for RSA crypto system.

Finally, our proposed multiplication/squaring, separated Montgomery multiplication/squaring and RSA encryption outperform the best-known results by 22/41\\%, 25/33\\% and 30\\% on the Cortex-A15 platform.

09:17 [Pub][ePrint] Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process, by Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang

  Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully homomorphic encryption schemes share two common flaws that they all use large-scale secret keys and some operations inefficient. In this paper, the \"special b\" variant of the Learning With Errors problem (bLWE) is presented, and helps us construct the first circularly secure key switching process which can replace the key switching process and similar re-linearization process used by the existing FHE schemes. Then, we present an efficient FHE. Compared with Brakerski\'s scheme, our scheme reduces L secret keys to one and is more efficient. Finally, we prove the chosen-plaintext attack (CPA) security of the fully homomorphic scheme and the circular security of key switching process in standard model under the learning with errors problem (LWE) assumption.

16:28 [Event][New] TRUDEVICE: 4th Workshop on Secure Hardware and Security Evaluation

  Submission: 31 May 2015
Notification: 13 July 2015
From September 17 to September 17
Location: Saint-Malo, France
More Information:

09:17 [Pub][ePrint] Accelerating SWHE based PIRs using GPUs, by Wei Dai, Yarkın Dor\\\"{o}z and Berk Sunar

  In this work we focus on tailoring and optimizing the computational Private Information Retrieval (cPIR) scheme proposed in WAHC 2014 for efficient execution on graphics processing units (GPUs). Exploiting the mass parallelism in GPUs is a commonly used approach in speeding up cPIRs. Our goal is to eliminate the efficiency bottleneck of

the Dor\\\"{o}z et al construction which would allow us to take advantage of its excellent bandwidth performance. To this end, we develop custom code to support polynomial ring operations and extend them to realize the evaluation functions in an optimized manner on high end GPUs. Specifically, we develop optimized CUDA code to support large degree/large

coefficient polynomial arithmetic operations such as modular multiplication/reduction, and modulus switching. Moreover, we choose same prime numbers for both the CRT domain representation of the polynomials and for the modulus switching implementation of the somewhat homomorphic encryption scheme. This allows us to combine two arithmetic domains, which reduces the number of domain conversions and permits us to perform faster arithmetic. Our implementation achieves 14-34 times speedup for index comparison and 4-18 times speedup for data aggregation compared to a pure CPU software implementation.

tion compared to a pure CPU software implementation.

09:17 [Pub][ePrint] Multilinear Maps Using Random Matrix, by Gu Chunsheng

  Garg, Gentry and Halevi (GGH) described the first candidate multilinear maps using ideal lattices. However, Hu and Jia presented an efficient attack on GGH map, which breaks two applications of multipartite key exchange (MPKE) and witness encryption (WE) based on the hardness of 3-exact cover problem by using GGH. We describe a new construction of multilinear map using random matrix, which supports the applications for public tools of encoding in the origin GGH, such as MPKE and WE. The security of our construction depends upon new hardness assumption. Furthermore, our construction removes the special structure of the ring element in the principal ideal lattice problem, and avoids potential attacks generated by algorithm of solving short principal ideal lattice generator.

17:16 [Job][New] Senior Software / Principal - Security, Apcera - Hybrid Cloud Start-Up San Francisco, CA

  Apcera is disrupting the world of IT with the world’s first OS for the Hybrid Cloud. Our Hybrid Cloud OS has policy and governance built in at the core, allowing IT organizations and developers alike to safely and easily develop, deploy, orchestrate and govern any imaginable workload — apps, services, Docker containers, OS’s — either on premise or in any cloud, public or private, in a friction-free and trusted fashion.

Based in SOMA in SF and led by CEO Derek Collison, Apcera has substantial backing from Ericsson, the global technology, cloud and mobile giant headquartered in Sweden. Join us and help build the world\'s first Hybrid Cloud OS.

As a Security Architect at Apcera, you will oversee the security protocols in use inside and outside the Continuum platform, inform choices for security technologies and policies and review code for secure practices and patterns. You will lead efforts to infiltrate Apcera’s security controls, you will work within the Go community, the open source cryptographic community and with security leaders in the industry to improve and harden the Continuum platform.


Bachelor’s degree in Computer Science or equivalent experience with security technologies

Minimum of 7 years software development experience in a combination of any of the following languages: GO, C, C++, Java, C#, Python or Ruby

Minimum of 5 years’ experience working with Linux operating system development

Minimum 2 years in security engineering, crypto, policy, auth or related technologies

Understanding of the basic underpinnings of cryptographic technologies, authentication, authorization and distributed trust

Understanding about how Kerberos authentication works

Experience with techniques for escalating privilege

Knowledge about how basic cryptographic technologies relate to the design of OpenPGP and X.509 PKIX

In-depth knowledge of security