Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.
We show the first MIQ-secure protocol with worst-case per-session guarantee. Specifically, we show a protocol for any functionality that matches the [GJ13] bound: The simulator makes only a constant number of ideal queries in every session. The constant depends on the adversary but is independent of the security parameter.
As an immediate corollary of our main result, we obtain the first password authenticated key exchange (PAKE) protocol for the fully concurrent, multiple password setting in the standard model with no set-up assumptions.
focused on confidentiality issues. That is, the untrusted Aggregator learns only the aggregation result without divulging individual data inputs. In this paper we extend the existing models with stronger security requirements. Apart from the privacy requirements with respect to the individual inputs we ask for unforgeability for the aggregate result. We first define the new security requirements of the model. We also instantiate a protocol for private and unforgeable aggregation for a non-interactive multi-party environment. I.e, multiple unsynchronized users owing to personal sensitive information without interacting with each other contribute their values in a secure way: The Aggregator learns the result of a function without learning individual values and moreover it constructs a proof that is forwarded to a verifier that will let the latter be convinced for the correctness of the computation. The verifier is restricted to not communicate with the users. Our protocol is provably secure in the random oracle model.
The PhD student will join the Chalmers Systems Security group, working in the area of information and communication security with a focus on security and privacy issues in wearable computing devices. More precisely, the student shall be working on investigating efficient authentication mechanisms for wearable computing devices (RFID tags, sensors connected with mobile phones or other wireless devices) that provide: i) accurate and transparent authentication, ii) rigorous privacy guarantees, even if multiple wearable devices are involved in the authentication. The overall aim of the announced PhD position will be to develop nearly optimal algorithms for achieving security while minimising resource use and guaranteeing privacy-preservation.
More concretely, part of the research will involve the analysis and development of authentication protocols in specific settings. This will include investigating resistance of both existing and novel protocols against different types of attacks, theoretically and experimentally. The project should result in the development of theory and authentication mechanisms for noisy, constrained settings that strike an optimal balance between reliable authentication, privacy-preservation and resource consumption.
The PhD student will be supervised by Prof. Katerina Mitrokotsa. Some previous research related to this research project can be found here: http://www.cse.chalmers.se/~aikmitr/
The aim of the project is to develop new quantum-cryptographic protocols (beyond the task of key distribution) and explore their limitations. An example of an active research is position-based quantum cryptography. Another aspect is to investigate the security of classical cryptographic schemes against quantum adversaries (post-quantum cryptography).
The full-time appointment (38 hours per week) will be on a temporary basis, initially for one year with an extension for a further two years on positive evaluation. Depending on experience, the gross monthly salary will range from €2,476 to €3,908 (scale 10), excl. 8% holiday allowance and 8,3% annual bonus.
Prospective candidates should:
The aim of the PhD project is to develop new quantum-cryptographic protocols (beyond the task of key distribution) and explore their limitations. An example of an active research is position-based quantum cryptography. Another aspect is to investigate the security of classical cryptographic schemes against quantum adversaries (post-quantum cryptography).
The full-time appointment at ILLC will be on a temporary basis for a maximum period of four years (18 months plus a further 30 months after a positive evaluation) and should lead to a dissertation (PhD thesis). On the basis of a full-time appointment (38 hours per week), the gross monthly salary amounts to €2,125 during the first year, rising to €2,717 during the fourth year.