IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
13 November 2025
Hammamet, Tunisie, 8 July - 10 July 2026
Virtual event, Anywhere on Earth, -
Submission deadline: 30 June 2026
TU Darmstadt, Germany
Topics of particular interest include (but are not limited to):
- Distributed cryptography
- Cryptography for blockchains and cryptocurrencies
- Cryptography for privacy
- Completed Master's degree (or equivalent) with excellent grades in computer science, mathematics or a similar area.
- Strong mathematical and/or algorithmic/theoretical CS background
- Good knowledge of cryptography. Knowledge in concepts of provable security is a plus.
- Fluent written and verbal communication skills in English
Review of applications starts immediately until the position is filled. For further information please visit: https://www.informatik.tu-darmstadt.de/cac/cac/index.en.jsp
Please send your application including a CV, transcripts from your Bachelor and Master and a letter of motivation to: job@cac.tu-darmstadt.de
Closing date for applications:
Contact: Sebastian Faust
More information: https://www.informatik.tu-darmstadt.de/cac/cac/index.en.jsp
Princeton University
The DeCenter is a newly established interdisciplinary hub at Princeton University devoted to exploring the decentralization of power and trust through blockchain (and similar) technology.
We seek to create a truly interdisciplinary cohort of postdoctoral fellows to jointly lead research projects. Fellows' primary responsibilities will therefore be to conduct research and collaborate with others in cross-disciplinary research initiatives. We also seek to maintain a vibrant interdisciplinary community, and fellows will also be responsible for co-organizing weekly seminars, occasional workshops, etc. that are of interest to the broader DeCenter community. An ideal candidate would satisfy the following selection criteria:
A strong record of research in their primary discipline.
A demonstrated ability to lead independent projects.
A demonstrated ability (ideal) or demonstrated interest (necessary) in interdisciplinary engagements, and the ability to serve as a strong bridge between their primary discipline and others.
A strong record of research (ideal) or demonstrated interest (necessary) in foundational research concerning blockchain technology or similar technologies that support the decentralization of trust.
Closing date for applications:
Contact: Matt Weinberg, smweinberg@princeton.edu
More information: https://puwebp.princeton.edu/AcadHire/apply/application.xhtml?listingId=40762
Institute of Science and Technology Austria (ISTA), Klosterneuburg (close to Vienna), Austria
The Cryptography Group at ISTA invites applications for a Postdoctoral Researcher in theoretical and applied cryptography. For part (about one year) this position can be funded by the SPYCODE project (https://spycode.at/).
Potential research topics include:
- blockchain related topics, including consensus protocols, scaling.
- proofs of resources, like proofs of work, proofs of space, proofs of time (verifiable delay functions).
- public-key cryptography.
- lower bounds.
Position details:
- Full-time, fully funded.
- Initial term: 2 years, extendable.
- Flexible start (ideally asp).
- Working language: English (no German required).
About IST Austria:
The Institute of Science and Technology Austria, near Vienna, offers a vibrant, international research environment, strong interdisciplinary exchange, and competitive compensation.
Application:
Please send a CV and optionally a research statement and contact details of one or two referees to pietrzak@ista.ac.at with the subject Postdoc Application – SPYCODE.
Applications will be reviewed until the position is filled.
Closing date for applications:
Contact: pietrzak@ista.ac.at
More information: https://ist.ac.at/en/research/pietrzak-group
New Jersey Institute of Technology, Department of Computer Science, USA
NJIT is a Carnegie R1 Doctoral University (Very High Research Activity), with $178M research expenditures in FY24. The Computer Science Department has 34 tenured/tenure track faculty, with nine NSF CAREER, one DARPA Young Investigator, and one DoE Early Career awardees. The Computer Science Department enrolls over 2,000 students at all levels across six programs of study and is part of the Ying Wu College of Computing (YWCC), alongside the Departments of Informatics and Data Science. YWCC has an enrollment of more than 3,800 students in computing disciplines and is the largest producer of computing talent in the tri-state (NY, NJ, CT) area.
To formally apply for the position, please submit your application materials at https://academicjobsonline.org/ajo/jobs/30654. Applications received by December 31, 2025 will receive full consideration. However, applications are reviewed until all the positions are filled. Contact address for inquiries: cs-faculty-search@njit.edu.
At NJIT, diversity is a core value. We foster a sense of belonging by celebrating individual differences and ensuring that every member of our community feels included and empowered.
Closing date for applications:
Contact: cs-faculty-search@njit.edu
More information: https://cs.njit.edu/open-faculty-positions
Rittwik Hajra, Subha Kar, Pratyay Mukherjee, Soumit Pal
We first introduce the notion of traceable BUSS, which allows tracing colluders by accessing a reconstruction box. Then, extending the work of Boneh et al. [CRYPTO 2024], we propose the first traceable BUSS construction. Finally, we show how to generically use a traceable BUSS scheme to construct a traceable SKR in the aforementioned community setting. Overall, this is the first scheme combining decentralized key management with traceability, marrying BUSS’s scalability with the deterrence of traceable secret sharing.
Jorge Andresen, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Eric Landthaler, Elena Micheli, Maximilian Orlt, Pajam Pauls, Kathrin Wirschem, Liang Zhao
In this work, we present provably secure advancements regarding this state-of-the-art scheme in both computational and randomness efficiency, reducing the randomness complexity by up to 50% and the computational complexity even more by going from a quadratic term to a linear one for many parameters. Moreover, we present the first implementation of a polynomial masking scheme against combined attacks along with an extensive experimental evaluation for a wide range of parameters and configurations as well as a statistical leakage detection to evaluate the security of the implementation on an Arm Cortex-M processor. Our implementation is publicly available to encourage further research in practical combined resilience.
Qiang Liu, JaeYoung Bae, JoonWoo Lee
We employ a combination of oblivious pseudorandom function (OPRF) and shuffling to mitigate the potential privacy leakage that arises when directly applying the hash-to-bin within the framework of Tu et al. (USENIX Security 2025). Building upon this, we further optimize their balanced ePSU protocol by leveraging a bidirectional oblivious key-value store (OKVS). Compared with the corrected version of Tu et al.'s balanced ePSU, ours achieves a $1.1-3.0\times$ shrinking in communication and a $1.2-1.6\times$ speedup in runtime.
We design the first unbalanced ePSU whose communication is linear solely in the smaller set size. Since no hash-to-bin is used, it is inherently free from the associated privacy leakage. With the smaller set size fixed at $2^{10}$, ours reduces communication by $1.5-45.8\times$ compared with corrected version of Tu et al.'s unbalanced ePSU, while achieving $1.3-6.7\times$ runtime speedups.
Matteo Campanelli, Dario Fiore, Mahak Pancholi
Marshall Ball, Clément Ducros, Saroja Erabelli, Lisa Kohl, Nicolas Resch
In this work, we initiate the study of low-complexity strong PRFs under a refined framework that separates adversary query complexity from running time, and observe that distinguishing algorithms for $AC^0[2]$ do not apply if the number of queries is below the threshold implied by the Razborov–Smolensky approximation bound.
We propose the first candidate strong PRF in $AC^0[2]$, which plausibly offers subexponential security against adversaries limited to a fixed quasipolynomial number of queries. We show that our candidate lacks heavy Fourier coefficients, resists a natural class of adaptive attacks, has high rational degree, is non-sparse over $\mathbb{F}_2$ in expectation, and has low correlation with fixed function families.
Finally, we show that if any strong PRF exists in $AC^0[2]$ (or a superclass), then we can construct a universal PRF, i.e., a single, fixed function which is guaranteed to be a strong PRF in the same class.
Amir Moradi
Mike Hamburg
Our first application is modular square roots. It is straightforward to take square roots modulo primes $p\equiv \{3,5,7\}$ mod 8. When $p\equiv 1$ mod 8, and especially when $p-1$ is divisible by many powers of 2, Müller's algorithm and Kim-Koo-Kwon are attractive options. Both of these use Lucas sequences. Here we show how to simplify and speed up Kim-Koo-Kwon. We also show a variant on Müller's algorithm which works even when $p\equiv 3$ mod 4, which would be useful if $p$ were secret.
Our second application is heuristic primality testing. The Baillie-PSW primality test combines a strong Fermat test with a strong Lucas test. The recent Baillie-Fiori-Wagstaff variant strengthens Baillie-PSW. Here we show an improved variant, $\mathtt{SuperBFPSW}$, which is stronger than Baillie-Fiori-Wagstaff, but also faster than the original Ballie-PSW.
Akif Mehmood, Nicola Tuveri
Charanjit S. Jutla, Rohit Nema, Arnab Roy
We present two main applications. First, we construct a key-value commitment scheme where a dictionary is represented as a linear combination of partial fractions. Our scheme achieves constant-size commitments (a single group element) and proofs, supports homomorphic updates enabling stateless operation, and provides efficient membership and non-membership proofs through simple pairing equations. We also introduce Credential-based Key-Value Commitments, where keys are registered via Boneh-Boyen signatures, enabling applications in permissioned settings.
Second, we construct a dynamic threshold encryption scheme leveraging the linear independence of partial fraction products. Our scheme achieves compact ciphertexts, supports public preprocessing of public keys to a succinct encryption key, enables dynamic threshold selection at encryption time, and provides robustness through share verification without random oracles. In particular, we achieve the shortest CPA-secure ciphertext size of 3 group elements, given logarithmic size preprocessed encryption key.
We prove security of our constructions in the standard model under new $q$-type assumptions and establish their generic hardness in the generic bilinear group model. Our work demonstrates that working directly with the algebraic structure of rational fractions, rather than converting to polynomial representations, yields elegant and efficient cryptographic constructions with concrete advantages over prior work.
Jonathan Katz, Marek Sefranek
In some natural applications of anonymous credentials, it is beneficial to hide even the issuer of a credential, beyond revealing the fact that the issuer is in some pre-determined set specified by a verifier. Sanders and Traore recently showed a construction of such issuer-hiding anonymous credentials based on the Pointcheval-Sanders signature scheme.
In this work we show how to achieve issuer hiding for BBS-based anonymous credentials. Our construction satisfies a notion of everlasting issuer-hiding anonymity, and is unforgeable in the generic group model. It can be integrated into existing standards, and has several efficiency advantages compared to prior work.
Eugene Lau, Laura Shea, Nadia Heninger
We give an efficient algorithm to factor an RSA modulus $N$ given an integer $a$ that is "close" to a multiple of $\varphi(N)$. That is, we can factor $N$ in polynomial time given $\varphi(N) < a \le N^{3/2}$ if there is an integer $y$ with $|y| \le a N^{-3/4}$ such that $a - y \equiv 0 \bmod \varphi(N)$. Our attack is a special case of Blömer and May's 2004 algorithm using Coppersmith's method that enables us to give stronger bounds for our application range of interest.
We instantiate our attack against several constructions and exhibit families of weak public exponents that do not appear to have been analyzed in the literature. In particular, the Joye and Michalevsky exponent transform permits full key recovery if used for small public exponents. While it is well known that RSA is vulnerable for small private exponent $d$, our work suggests that care must also be taken when generating large public exponents, or when publishing transformed exponents.
Gabriel Dettling, Elisaweta Masserova, Chen-Da Liu-Zhang, Matthieu Rambaud, Antoine Urban
While this assumption is partly justified due to the seminal work of Garay [WDAG'94] stating that deterministic broadcast with dynamic committees is impossible, it is open whether there are randomized solutions.
We answer this question in the affirmative, by providing a complete characterization of broadcast with dynamic committees. We use the formalization introduced in the Layered MPC setting and achieve the following results for layered broadcast: %first, a protocol for $t
Pedro Capitão, Hila Dahari-Garbian, Lisa Kohl, Zhe Li
Lucjan Hanzlik, Eugenio Paracucchi, Riccardo Zanotto
Non-interactive blind signatures for random messages were introduced by Hanzlik (Eurocrypt'23). They allow a signer to create a pre-signature with respect to a particular public key, while the corresponding secret key can later be used to finalize the signature. This non-interaction allows for more applications than in the case of blind signatures. In particular, the author suggested using regular PKI keys as the recipient public key, allowing for a distribution of one-time tokens to users outside the system, e.g., to public keys of GitHub users, similar to airdropping of cryptocurrencies. Unfortunately, despite introducing this concept, the paper fails to provide schemes that work with keys used in the wild.
We solve this open problem. We introduce a generic construction of non-interactive blind signatures that relies on Yao's garbled circuit techniques and provide particular improvements to this generic setting. We replace oblivious transfer with their non-interactive variant and show how to construct them so that the recipient's public key, encoding the $\mathsf{OT}$ choice, is a standard RSA public key $(e,N)$. To improve the efficiency of the garbling, we show how to garble the signing algorithm of the pairing-based Pointcheval-Sanders (PS) signatures and the RSA-based signature scheme with efficient protocols by Camenisch and Lysyanskaya. Our technique also apply to the well-known BBS signatures. All our improvements are of independent interest and are central to our contribution.