IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 April 2018
Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
ePrint ReportJoppe W. Bos, Simon Friedberger
ePrint ReportSecondly, we investigate if it is beneficial to use other curve models to speed-up the elliptic curve scalar multiplication. The use of twisted Edwards curves allows one to search for efficient addition-subtraction chains for fixed scalars while this is not possible with the differential addition law when using Montgomery curves. Our preliminary results show that despite the fact that we found such efficient chains, using twisted Edwards curves does not result in faster scalar multiplication arithmetic in the setting of SIDH.
Zvika Brakerski, Yael Tauman Kalai
ePrint ReportIn this work we present two results, which we believe to be of individual interest even regardless of the above application, and show how to combine them to achieve a succinct single-round private access control protocol. That is, a verifier can be convinced that an approved user (i.e. one which holds an approved set of attributes) is accessing the system, without learning any additional information about the user or the set of attributes.
First, assuming a computational PIR scheme (which can be based, for example, on the polynomial hardness of the LWE assumption), we construct for any $NP$ language $L$, a succinct single-round (2-message) protocol for delegating \monotone batch $L$ computations. Explicitly, for every $N\in \mathbb{N}$, every $x_1,\ldots,x_N\in \{0,1\}^n$, and every monotone formula $F:\{0,1\}^N\rightarrow \{0,1\}$, a prover can succinctly prove that $F(1_{x_1\in L},\ldots,1_{x_N\in L})=1$, where $1_{x_i\in L}=1$ if and only if $x_i\in L$, and where the communication complexity is $m \cdot polylog(N)$ where $m$ is the length of a single witness.
Second, assuming a quasi-polynomially secure two-message oblivious transfer scheme with statistical sender privacy (which can be based on quasi-polynomial hardness of the DDH, QR or DCR assumptions), we show how to convert any single-round protocol into a witness indistinguishable one, with similar communication complexity.
Zhenzhen Bao, Jian Guo, Lei Wang
ePrint ReportWe look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively evaluating the mapping. These attacks essentially exploit properties of the functional graph. We map the utilization space of those properties from numerous proposed known attacks, draw a comparison among classes of attacks about their advantages and limitations.
We provide a systematic exposition of concepts of cycles, deep-iterate images, collisions and their roles in cryptanalysis of iterated hash constructions. We identify the inherent relationship between these concepts, such that case-by-case theories about them can be unified into one knowledge system, that is, theories on the functional graph of random mappings. We show that the properties of the cycle search algorithm, the chain evaluation algorithm and the collision search algorithm can be described based on statistic results on the functional graph. Thereby, we can provide different viewpoints to support previous beliefs on individual knowledge.
In that, we invite more sophisticated analysis of the functional graph of random mappings and more future exploitations of its properties in cryptanalysis.
Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
ePrint ReportOur construction follows the hierarchical approach to ORAM design and relies on two main building blocks of independent interest: a new oblivious hash table construction with improved amortized $O(\log N + poly(\log \log \lambda))$ communication overhead for security parameter $\lambda$ and $N = \mathsf{poly}(\lambda)$, assuming its input is randomly shuffled; and a complementary new oblivious random multi-array shuffle construction, which shuffles N blocks of data with communication $O(N \log \log \lambda + \frac{N \log N}{\log \lambda})$ when the input has a certain level of entropy. We combine these two primitives to improve the shuffle time in our hierarchical ORAM construction by avoiding heavy oblivious shuffles and leveraging entropy remaining in the merged levels from previous shuffles. As a result, the amortized shuffle cost is asymptotically the same as the lookup complexity in our construction.
Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
ePrint ReportPrior solutions, starting with $n$-bit leaky shares, either used 4 messages or enabled the secure computation of only sub-linear size circuits. Our work presents the first 2-message secure computation protocol for 2-party functionalities that have $\Theta(n)$ circuit-size despite $\Theta(n)$-bits of leakage, a qualitatively optimal result. We compose a suitable 2-message secure computation protocol in parallel with our new 2-message correlation extractor. Correlation extractors, introduced by Ishai, Kushilevitz, Ostrovsky, and Sahai (FOCS--2009) as a natural generalization of privacy amplification and randomness extraction, recover ``fresh'' correlations from the leaky ones, which are subsequently used by other cryptographic protocols. We construct the first 2-message correlation extractor that produces $\Theta(n)$-bit fresh correlations even after $\Theta(n)$-bit leakage.
Our principal technical contribution, which is of potential independent interest, is the construction of a family of multiplication-friendly linear secret sharing schemes that is simultaneously a family of small-bias distributions. We construct this family by randomly ``twisting then permuting'' appropriate Algebraic Geometry codes over constant-size fields.
29 April 2018
Fuzhou, China, 14 December - 16 December 2018
Event CalendarSubmission deadline: 14 August 2018
Notification: 14 October 2018
28 April 2018
Barcelona, Spain, 6 September - 7 September 2018
Event CalendarSubmission deadline: 11 June 2018
Notification: 18 July 2018
Nanyang Technological University, Singapore
Job PostingThe Ph.D. program at NTU is usually for 4 years, which comprises some coursework in the first year and intensive research for all years. The research scholarship offers full coverage of tuition fees, support of conference trips, tax-free living allowance of 2000 SGD/month for the first year, and 2500 SGD/month for the subsequence years after passing the Ph.D candidate qualification examination, further top-up is possible for exceptional good candidates, Singapore citizens and permanent residents. For more information about the requirements of admission and application procedure, refer to here: http://admissions.ntu.edu.sg/graduate/Pages/home.aspx
These positions will be available until filled. For the Jan 2019 intake, submit by 30th September 2018, and by 31st March 2019 for the August 2019 intake. More information about the CATF research team can be found here: http://catf.crypto.sg
Closing date for applications: 31 December 2019
Contact: Jian Guo, Assistant Professor, guojian (at) ntu.edu.sg for more information.
Ant Financial Service Group
Job PostingAnt Financial is dedicated to bringing the world more equal opportunities through building a technology-driven open ecosystem and working with other financial institutions to support the future financial needs of society.
We are hiring:
- Applied Cryptography
- Crypto-currencies, smart-contracts, financial cryptography
- Privacy enhancing technologies
- Distributed consensus protocols
- Cybersecurity
Requirements:
- M.S. or Ph.D. in Cryptographic, System Security, Computer Science or related field, or equivalent experience.
- Good programming skills - C/C++, Go
- Good knowledge in Blockchain technology
- Chinese Mandarin can be used as work language
Interested candidates kindly contact Email: lewis.ls (at) antfin.com
Closing date for applications: 31 October 2018
More information: https://www.antfin.com/index.htm?locale=en_US
China, Guangzhou, 8 October - 12 October 2018
Event CalendarSubmission deadline: 8 June 2018
Notification: 8 July 2018
Chengdu, China, 5 November - 7 November 2018
Event CalendarSubmission deadline: 10 June 2018
Notification: 10 August 2018
27 April 2018
University of Surrey, Surrey Centre for Cyber Security, UK
Job PostingA fully-funded PhD in contactless electronic payments and their security.
Tax-free stipend of 22,000 GBP per year + annual increments. UK citizenship is required.
The project focuses on the cryptographic design and provable security of extensions of the contactless version of the EMV (Europay, Mastercard and Visa) protocol-suite. The main aim is to protect against threats linked to impersonation and therefore fraudulent payments, stemming from relay attacks, but it is not restricted to this. A second goal is that this EMV-enhancement also gives a second authentication-factor to the payment procedure. The project has Consult Hyperion as an industrial partner, which is a company with world-class experience in EMV security.
To apply, please contact Dr Ioana Boureanu, at i.boureanu (at) surrey.ac.uk
Closing date for applications: 25 May 2018
Contact: Ioana Boureanu, at i.boureanu (at) surrey.ac.uk
More information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=007318
26 April 2018
Input Output
Job PostingJob Description
We are looking for a talented, specialised Security Manager to join our growing in-house Security team. The prospective candidate will oversee and coordinate the security process, from research to product development, and will be working with internal teams on embedding Security across IOHK’s project line.
The prospective candidate will be expected to assemble a team and work directly with research, engineering and Project Management (BA’s, Test and Quality, Cryptography and management teams throughout the current and future set of projects
The individual should have an excellent understanding of Security requirements in the Development lifecycle and have an excellent and detailed understanding of the threats and risks that need to be addressed in the development life cycle, specifically in the blockchain / cryptocurrency area.
Closing date for applications: 24 June 2018
Contact: David Rountree
Technical Recruiter
david.rountree (at) iohk.io
More information: https://iohk.io/careers/#op-250078-security-team-manager
Sapienza University of Rome (Italy)
Job PostingProfile
Candidates will hold a PhD from a leading research university, an established teaching experience, an appropriate record of publications in highly ranked international journals and conferences, an appropriate record of national and international grants as principle investigator, and an adequate record of supervision of PhD students or similar experience in leading research teams in industrial research. Candidates will also have either a tenured position status in a university or have recently obtained the appropriate national qualification (ASN) in the Academic Discipline ``Information Processing Systems´´ (ING-INF/05) of the Italian University System.
Position
Successful candidates will be engaged in first-class research in the area of Cyber Security, will supervise Master Thesis and PhD students in their fields, will contribute to the Master degree in Cyber Security at Sapienza University of Rome, and will be involved in collaborations with industry and public bodies. Appointments are full-time. The salary is competitive. We especially welcome expressions of interests from female scholars.
Expression of Interest
Application to be sent at recruitment (at) diag.uniroma1.it must contain the following:
1. Curriculum vitae
2. 3-page (max) research and teaching statement including the candidate research program that intends to pursue while at Sapienza.
Expressions of interest should preferably be sent before the end of May 2018. For further information, please consult recruitment (at) diag.uniroma1.it
Closing date for applications: 31 May 2018
Contact: recruitment (at) diag.uniroma1.it
Norwegian University of Science and Technology (NTNU)
Job Posting
The research will be carried out within a program of 6 PhD projects under the heading of Trust and Transparency in Digital Society Through Blockchain Technology. This multi-disciplinary program includes technological aspects (cryptographic mechanisms, networking requirements, identity management), societal aspects and application areas. The program team involves 12 professors across several different departments and faculties. It is expected that the PhD fellow for this project will collaborate actively with other PhD fellows involved in the overall program and contribute to plenary meetings of the program. This program forms part of the NTNU Digital Transformation initiative.
Closing date for applications: 27 May 2018
Contact: For further information about the position, please contact Professor Kristian Gjøsteen (kristian.gjosteen (at) ntnu.no), or Professor Colin Boyd (colin.boyd (at) ntnu.no) for information about the Trust and Transparency in Digital Society Through Blockchain Technology project.
More information: https://www.jobbnorge.no/en/available-jobs/job/151330/
University of South Florida, Tampa, FL, USA
Job PostingTrustworthy Unmanned Aerial Systems
• New cryptographic frameworks to protect aerial drones
Trustworthy Machine Learning (TML)
• Privacy-Preserving Machine Learning
• Adversarial Machine Learning
Breach-Resilient Cyber-Infrastructures:
• New searchable encryption and Oblivious RAM schemes
• Augmentation of privacy enhancing technologies with trusted execution environments
Secure and Reliable IoT and Cryptocurrencies
• Post-Quantum public key infrastructure for IoT
• Use of Blockchain for Cyber Security
Requirements:
• A BS degree in computer science, electrical engineering or mathematics with a high-GPA.
• Very good programming skills (e.g., C, C++), familiarity with OS/Systems.
• Good Academic Writing and Presentation Skills.
• MS degree in computer science, electrical engineering or mathematics is a big plus. Publications in security and privacy are highly desirable.
Please send (by e-mail): (i) Transcripts, (ii) Curriculum vitae, (iii) Three reference letters, (iv) Research statement, (v) GRE and TOEFL scores
Closing date for applications: 15 September 2018
Contact: Dr. Attila A. Yavuz
attila.yavuz (at) gmail.com
More information: http://web.engr.oregonstate.edu/~yavuza/article/PositionDescrption_at_USF.pdf
CRYPTO
25 April 2018
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
ePrint ReportWe show that conjugacy classes of maximal orders have a representative of polynomial size, and we define a way to represent endomorphism ring generators in a way that allows for efficient valuation at points on the curve. We relate these problems to the security of the Charles-Goren-Lauter hash function. We provide a collision attack for special but natural parameters of the hash function and prove that for general parameters its preimage and collision resistance are also equivalent to the endomorphism ring computation problem.