IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 April 2018
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
We study an attractive cryptographic property for PRE, namely that of forward secrecy. In our forward-secret PRE (fs-PRE) definition, the proxy periodically evolves the re-encryption keys and permanently erases old versions while the delegator's public key is kept constant. As a consequence, ciphertexts for old periods are no longer re-encryptable and, in particular, cannot be decrypted anymore at the delegatee's end. Moreover, delegators evolve their secret keys too, and, thus, not even they can decrypt old ciphertexts once their key material from past periods has been deleted. This, as we will discuss, directly has application in short-term data/message-sharing scenarios.
Technically, we formalize fs-PRE. Thereby, we identify a subtle but significant gap in the well-established security model for conventional PRE and close it with our formalization (which we dub fs-PRE^+). We present the first provably secure and efficient constructions of fs-PRE as well as PRE (implied by the former) satisfying the strong fs-PRE^+ and PRE^+ notions, respectively. All our constructions are instantiable in the standard model under standard assumptions and our central building block are hierarchical identity-based encryption (HIBE) schemes that only need to be selectively secure.
08 April 2018
Stefan Dziembowski, Sebastian Faust, Kristina Hostakova
07 April 2018
Kanpur, India, 17 December - 19 December 2018
Submission deadline: 20 July 2018
Notification: 31 August 2018
05 April 2018
- Juan Garay: For fundamental contributions at the interface of cryptography and distributed computing, and for service to the cryptographic research community.
- Yuval Ishai: For essential contributions to the theory of cryptographic protocols, low-complexity cryptography, and other foundations of cryptography.
- Paul Kocher: For fundamental contributions to the study of side-channel attacks and countermeasures, cryptography in practice, and for service to the IACR.
- Stafford Tavares: For significant contributions to the design and analysis of block ciphers, for founding the SAC conference, and for service to the IACR.
Graz University of Technology
The position, initially restricted to six years and offering the possibility of a qualification agreement for a tenured position, is 40 hours per week and the successful candidate is expected to start on September 1, 2018, at the Institute of Applied Information Processing and Communications. Upon agreement on a qualification agreement, the candidate will be appointed as assistant professor. As soon as the qualification agreement has been fulfilled, the position will be converted into a tenured position as associate professor.
Required academic qualification:
PhD or equivalent in computer science
The successful candidate should also possess the following qualifications:
- Research focus on an area of cybersecurity that fits and strengthens the existing research at the institute
- Excellent scientific track record with publications at international top conferences/journals
- Motivation, experience and didactic skills for teaching in English
- Experience in the acquisition of research projects
- Network in the international scientific community
The position will involve the following duties:
- Research on cybersecurity
- Scientific publications at international top conferences/journals
- Acquisition and management of third party funding for research (EU, FFG, FWF, industrial projects)
- Supervision of students
- Independent teaching in the bachelor and master programs
- Service in the academic administration
Closing date for applications: 30 April 2018
Contact: Stefan Mangard
More information: https://www.iaik.tugraz.at/content/about_iaik/jobs/tenure_track/
04 April 2018
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
Ward Beullens, Simon R. Blackburn
Dor Fledel, Avishai Wool
National Sun Yat-sen University, Taiwan
Postdoctoral research fellow position to work on Applied Cryptography, 5G, Wireless, and IoT Security is available in the Department of Computer Science and Engineering at National Sun Yat-sen University. Welcome the fresh Ph.D., who is going to build strong publication for pursuing the faculty position.
The publication of research works will focus on the prestigious international journals and security conferences as the following shortlists.
Journals:
IEEE or ACM Transactions journals with top ranking or high impact factor.
Conferences:
IEEE S&P, Usenix Sec, ACM CCS, Crypto, Eurocrypt, Asiacrypt, NDSS, FC, PETS, FSE, ESORICS, PKC, ACNS, AsiaCCS, TCC, CT-RSA, ACM WiSec, IEEE CSF, etc.
Qualification:
- Candidates should have a Ph.D. Degree (CS or EE), and strong background in applied cryptography, wireless and 5G security, IoT security, and authentication protocol.
- Strong publication record (major journals or top security conference papers).
- Good written and oral communication skills.
- Work experience in relevant research projects is preferable.
KPI: The number of submissions to the shortlisted journals and conferencesper year.
The initial appointment will be until the end of this year(2018) but renewable depending on the availability of funding and the candidate\'s performance(at most 2 to 3years). The travel support will also be provided to attend international conferences or to visit overseas universities. The candidate will have the chance to work together with the most active and strong security research team at National Sun Yat-sen University (NSYSU, one of seven top research universities in Taiwan).
How to apply:
Interested candidates kindly send their CV to Prof. Chun-I Fan(email: cifan (at) mail.cse.nsysu.edu.tw). Initial screening of applications will begin immediately and the position will remain open until filled. Only shortlist will be notified.
Closing date for applications: 30 June 2018
Contact: Prof. Chun-I Fan, Email: cifan (at) mail.cse.nsysu.edu.tw
More information: https://www.researchgate.net/publication/324202444_Call_for_Postdoc_Position
03 April 2018
Vipul Goyal, Ashutosh Kumar
Our first result is the construction of a t-out-of-n non-malleable secret sharing scheme against an adversary who arbitrarily tampers each of the shares independently. Our construction is unconditional and features statistical non-malleability.
As our main technical result, we present t-out-of-n non-malleable secret sharing scheme in a stronger adversarial model where an adversary may jointly tamper multiple shares. Our construction is unconditional and the adversary is allowed to jointly-tamper subsets of up to (t-1) shares. We believe that the techniques introduced in our construction may be of independent interest.
Inspired by the well studied problem of perfectly secure message transmission introduced in the seminal work of Dolev et. al (J. of ACM'93), we also initiate the study of non-malleable message transmission. Non-malleable message transmission can be seen as a natural generalization in which the goal is to ensure that the receiver either receives the original message, or, the original message is essentially destroyed and the receiver receives an ''unrelated'' message, when the network is under the influence of an adversary who can byzantinely corrupt all the nodes in the network. As natural applications of our non-malleable secret sharing schemes, we propose constructions for non-malleable message transmission.