International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News

If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.

Here you can see all recent updates to the IACR webpage. These updates are also available:

email icon
via email
RSS symbol icon
via RSS feed

15 November 2018

Qipeng Liu, Mark Zhandry
ePrint Report ePrint Report
A $k$-collision for a compressing hash function $H$ is a set of $k$ distinct inputs that all map to the same output. In this work, we show that for any constant $k$, $\Theta\left(N^{\frac{1}{2}(1-\frac{1}{2^k-1})}\right)$ quantum queries are both necessary and sufficient to achieve a $k$-collision with constant probability. This improves on both the best prior upper bound (Hosoyamada et al., ASIACRYPT 2017) and provides the first non-trivial lower bound, completely resolving the problem.
Expand
Wen-Ran Zhang
ePrint Report ePrint Report
Whereas it is widely deemed an impossible task to scale One-Time Pad (OTP) without sacrificing information theoretic security or network traffic, this paper presents a paradigm of Scalable OneTime Pad (S-OTP) ciphers based on information conservational computing/cryptography (ICC). Applicability of the new paradigm is analysed. It is shown that ICC enables data compression with quantumfuzzy collective precision to reduce key length to a minimum that used to be deemed impossible. Based on ICC, it is shown that, with a local IEEE binary64 standard computer associated with quantum key distribution (QKD), S-OTP enables secure transmission of long messages or large data sets with significant traffic reduction for post-quantum cryptography. Quantum crypto machinery is proposed. Some open topics are identified for further investigation
Expand

14 November 2018

Microsoft Redmond, WA
Job Posting Job Posting
The Cryptography Research Group at Microsoft Research seeks outstanding graduate students for summer internships in Redmond in the areas of Homomorphic Encryption, Compilers, Verifiable Computation, Oblivious RAM, Zero-knowledge Proofs, Private Set Intersection, Privacy for ML, Blockchain based applications, privacy preserving systems, applied Secure Multi Party Computation, Differential Privacy, and other areas of applied cryptography.

Interested candidates please send cover letter and resume to CryptIntCV@microsoft.com. Applications will be considered through the spring until all positions are filled, but for full consideration please apply by January 15, 2019.

Closing date for applications: 1 June 2019

Contact: CryptIntCV@microsoft.com

Expand
University of Bergen, Norway
Job Posting Job Posting
There is vacancy for four PhD positions in computer science at the Department of Informatics. The positions are for a fixed-term period of 3 years with the possibility of a 4th year. A PhD degree in computer science is highly requested by corporate organizations and academia.

Although the positions are intended for the whole department, the Reliable and Secure Communication group is interested in candidates in domains of cryptography and cryptographic Boolean functions.

For more information check

https://www.jobbnorge.no/en/available-jobs/job/160197/phd-position-4-in-computer-science

Closing date for applications: 9 December 2018

Contact: For applicants in cryptography please contact Prof. Tor Helleseth tor.helleseth (at) uib.no

For applicants in cryptographic Boolean functions please contact Dr. habil. Lilya Budaghyan lilya.budaghyan (at) uib.no

More information: https://www.jobbnorge.no/en/available-jobs/job/160197/phd-position-4-in-computer-science

Expand
University of Bergen
Job Posting Job Posting
There is a vacancy for a position as a researcher in Cryptology at the Department of Informatics in the Selmer Center for secure and reliable communications. The position is for a period of 2 years and is connected to the project Modern Methods and Tools for Theoretical and Applied Cryptology (CryptoWorld) funded by the Norwegian Research Council.

For more details see

https://www.jobbnorge.no/en/available-jobs/job/160195/researcher-position-in-cryptology

Closing date for applications: 1 December 2018

Contact: Prof. Tor Helleseth

More information: https://www.jobbnorge.no/en/available-jobs/job/160195/researcher-position-in-cryptology

Expand
CISPA Helmholtz Center for Information Security
Job Posting Job Posting
The Information Security & Cryptography Group led by Prof. Michael Backes at the CISPA Helmholtz Center for Information Security is looking for multiple fully-funded Ph.D. students working on machine learning privacy and/or biomedical privacy.

The Information Security & Cryptography group is one of the world-leading research groups concentrating on cutting-edge research in security and privacy. As part of CISPA, the group is located at Saarbruecken, Germany. CISPA is the newest member of the Helmholtz Association, the largest scientific organization in Germany fully committed to scientific excellence and to tackling the grand research challenges in their respective fields. CISPA as the first investment of Helmholtz in computer science is one of the top research centers in information security, it is constantly ranked top-3 in the field worldwide, see, e.g., CSrankings.org (http://csrankings.org/#/index?sec&world).

Requirements:

  • A bachelor/master degree in Computer Science, Information Security, Mathematics with excellent grades
  • Excellent English
  • Excellent programming skills
  • Good knowledge about machine learning and/or cryptography

What we offer:

  • Full-time working contract
  • Excellent research environment
  • Strong supervision
  • World-class collaborations

To apply, please send your

  • CV
  • Transcripts
  • Motivation letter
  • Contact information of two references

to yang.zhang (at) cispa.saarland

Closing date for applications: 1 April 2019

Contact: Yang Zhang, yang.zhang (at) cispa.saarland

Expand
University of South Florida, Tampa, FL 33620, USA
Job Posting Job Posting
We are looking for hardworking and self-driven PhD students to work in the areas of applied cryptography beginning from Fall 2019 (August 2019). University of South Florida is a Rank 1 Research University and offers a competitive salary with an excellent working environment, all within a close proximity of high-tech industry and beautiful beaches of Sunny Florida. Tampa/Orlando area is a key part of Florida High Technology Corridor, and harbors major tech and research companies. The qualified candidate will have opportunities for research internship and joint-projects with lead-industrial companies.

Topics: Secure and Reliable Blockchain and Cryptocurrencies

• Post-quantum secure blockchains

• Use of blockchains to enhance cyber-security of critical infrastructures

Secure and Reliable Internet of Things and Systems

• Post-quantum secure IoTs and secure voting systems

• Cryptographic primitives for IoTs

Trustworthy Machine Learning (TML)

• Privacy-preserving machine learning

• Adversarial machine learning

Breach-Resilient Cyber-Infrastructures:

• New searchable encryption and Oblivious RAM schemes

• Privacy Enhancing Technologies for genomic and medical data

Requirements:

• A BS degree in computer science, electrical engineering or mathematics with a high-GPA.

• Very good programming skills (e.g., C, C++), familiarity with OS/Systems.

• Good Academic Writing and Presentation Skills.

• MS degree in computer science, electrical engineering or mathematics is a big plus. Publications in security and privacy are highly desirable.

Please send (by e-mail): (i) Transcripts, (ii) Curriculum vitae, (iii) Three reference letters, (iv) Research statement, (v) GRE and TOEFL scores,

Closing date for applications: 1 February 2019

Contact: Dr. Attila A. Yavuz is an Assistant Professor and the Director of Applied Cryptography Research Laboratory in the Department of Computer Science and Engineering at University of South Florida.

http://www.csee.usf.edu/~attilaayavuz/

attilaayavuz (at) usf.edu

More information: http://www.csee.usf.edu/~attilaayavuz/article/PositionDescrption_at_USF_Fall2019.pdf

Expand
Singapore University of Technology and Design (SUTD)
Job Posting Job Posting
Singapore University of Technology and Design (SUTD) is a young university which was established in collaboration with MIT. I am looking for promising PhD students who are interested in working in the area of cyber security. The position is fully funded up to 4 years with very competitive scholarship and overseas research attachment opportunities.

Candidates should have an excellent background (with Bachelor or Master degree and CGPA>80%) in mathematics or computer science/engineering and the ability to work on inter-disciplinary research projects. Acquaintance with cryptography and network/system security concepts as well as some programming skills will be considered as strong assets.

For the Sept 2019 intake, the application deadline is 31st Dec 2018. More information of the PhD program is available at https://istd.sutd.edu.sg/phd/phd-overview/.

Interested candidates please send your CV to Prof. Jianying Zhou

Closing date for applications: 31 December 2018

Contact: Jianying Zhou

More information: http://jianying.space/

Expand
University of Twente, Netherlands
Job Posting Job Posting
Within the Faculty of Electrical Engineering, Mathematics and Computer Science, the Services and Cyber-Security (SCS) research group is looking for a highly motivated Assistant Professor in Digital Security & Privacy (broadly conceived).

For more information, please check the link provided below.

Closing date for applications: 1 December 2018

More information: https://www.utwente.nl/en/organization/careers/vacancy/!/562764/assistant-professor-in-digital-security-privacy

Expand
University of Warsaw
Job Posting Job Posting
The Faculty of Mathematics, Informatics and Mechanics at University of Warsaw (MIM UW) invites applications for assistant professor (“adiunkt” in Polish) positions in computer science with specialization “computer systems”, starting on 1st Feb 2019 or on 1st Oct 2019.

The successful candidate will be required to conduct research and teach in some of the following areas: concurrent programming, operating systems, computer networks, web applications, security of computer systems or cryptography. The contract is for 4 years, with a possible extension to indefinite employment after a positive result of an employee evaluation.

MIM UW is one of the strongest computer science faculties in Europe. It is known for talented students (e.g., two wins and 13 times in top ten at the ACM International Collegiate Programming Contest) and strong research teams, especially in theoretical aspects of computer science like algorithms, logic and automata, cryptography (e.g., 9 ERC grants in these fields). For an overview of research areas represented in the Faculty, see http://www.mimuw.edu.pl/en/dziedziny-badan

Requirements:

- PhD degree in computer science or mathematics

- Strong publication record in international computer science journals/conferences

- Teaching experience

- Mobility record (participation in conferences, postdoc positions, etc.)

Deadline for applications: 30th November 2018.

Closing date for applications: 30 November 2018

Contact: Lukasz Kowalik (kowalik (at) mimuw.edu.pl) or Aleksy Schubert (alx (at) mimuw.edu.pl)

More information: https://www.mimuw.edu.pl/rozne/konkursy-pliki/2018/praca-adiunkt-nauk-sys-komp-II-30-11-2018-en.pdf

Expand
Tampere University of Technology, Tampere, Finland
Job Posting Job Posting

The Network and Information Security Group (NISEC) is currently looking for up to 2 motivated and talented researchers (Postdoctoral Researchers) to contribute to research projects related to applied cryptography, security and privacy.

The successful candidates will be working on the following topics (but not limited to):

  • Analysis and design of Searchable Encryption schemes and data structures enabling efficient search operations on encrypted data;
  • Restricting the type of access given when granting access to search over one\'s data;
  • Processing of encrypted data in outsourced and untrusted environments;
  • Applying encrypted search techniques to SGX environments;
  • Revocable Attribute-Based Encryption schemes and their application to cloud services;
  • Privacy-Preserving Analytics;
  • IoT Security.

The positions are strongly research focused. Activities include conducting both theoretical and applied research, the design of secure and/or privacy-preserving protocols, software development and validation, reading and writing scientific articles, presentation of the research results at seminars and conferences in Finland and abroad, acquiring (or assisting in acquiring) further funding.,

Closing date for applications: 20 November 2018

Contact:

Antonis Michalas

antonis.michalas (at) tut.fi

www.amichalas.com

Expand
University of Manchester, School of Computer Science
Job Posting Job Posting
Project Description

In the last decade, the energy sector has been undertaking a significant shift in the way electricity is generated, traded and consumed. With the introduction of smart meters - devices that can measure and communicate users\' electricity consumption every several minutes - more and more innovative services become available to users.

One of these services is the peer-to-peer (p2p) electricity trading that allows users to trade electricity among themselves (via trading platforms), rather than buying from (or selling to) their suppliers. For example, a user with a solar panel can sell directly his/her excess electricity to another user, and vice versa. Such markets have huge potentials as, apart from bringing extra profit to their participants, they can also contribute to increasing the uptakes of renewables.

However, such p2p trading requires complex interactions and data exchanges among various existing and new market players, inevitably introducing several security and privacy issues. Considering the time and computational constraints of the market operations, as well as the interconnectedness and interdependence between different market players, ensuring secure data exchanges in p2p markets is not trivial. Entities need to authenticate each other and be assured of the integrity of the messages they receive. Similarly, ensuring that personal data of users are not revealed to any party is not straightforward. Examples of personal data are users\' names, addresses, electricity consumption, preferences, monthly bills, etc.

The aim of this project is to apply (a combination of) various (computationally-demanding) advanced cryptographic technologies, such as blockchain, smart contracts and secure multiparty computation, to design p2p electricity trading solutions that achieve a good balance between security, user privacy, usability and energy efficiency.

Funding

Fully funded PhD opportunity for an UK/EU student: untaxed stipend of £14,777 per annum + tuition fees

Closing date for applications: 30 November 2018

Contact: Dr Mustafa A. Mustafa email: mustafa.mustafa(at)manchester.ac.uk

More information: http://www.cs.manchester.ac.uk/study/postgraduate-research/projects/description/?projectid=18311

Expand
Kanazawa University, Japan
Job Posting Job Posting
Kanazawa University, Japan, invites applications for an associate professor position or a tenure-track assistant professor position in advanced research area of information security, such as IT Security and Cryptography.

An appointee is expected on duty on April 1st, 2019 or at an early possible time after that.

Research budget: In case of tenure-track assistant professor, Kanazawa University plans to provide a start-up research fund of approximately 800,000 JPY in the first year in addition to faculty research expense.

Closing date for applications: 4 January 2019

Contact: Masahiro Mambo (Contact information can be found below.)

More information: http://www.t.kanazawa-u.ac.jp/collegeschool/20_se/en/position/20190104_ec_tt_en.pdf

Expand

12 November 2018

Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
ePrint Report ePrint Report
We introduce a new form of encryption that we name matchmaking encryption (ME). Using ME, sender S and receiver R, each characterized by its own attributes, can both specify policies the other party must satisfy in order for the message to be revealed. The main security guarantee is that of privacy-preserving policy matching: During decryption nothing is leaked beyond the fact that a match occurred/did not occur. ME opens up new and innovative ways of secretly communicating, and enables several new applications where both participants can specify fine-grained access policies to encrypted data. For instance, in social matchmaking, S can encrypt a file containing his/her personal details and specify a policy so that the file can be decrypted only by his/her ideal partner. On the other end, a receiver R will be able to decrypt the file only if S corresponds to his/her ideal partner defined through a policy. On the theoretical side, we put forward formal security definitions for ME, as well as generic frameworks for constructing ME from functional encryption. These constructions need to face the main technical challenge of simultaneously checking the policies established by S and R to avoid any leakage. On the practical side, we construct an efficient scheme for the identity-based setting, with provable security in the random oracle model under the standard BDH assumption. We implement and evaluate our scheme and provide experimental evidence that our construction is practical. We also apply identity-based ME to a concrete use case, in particular for creating an anonymous bulletin board over a Tor network.
Expand
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
ePrint Report ePrint Report
This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standard computational assumptions in bilinear groups. Our main result is a simulation-based adaptively strongly partially-hiding PE (PHPE) scheme for predicates computing arithmetic branching programs (ABP) on public attributes, followed by an inner-product predicate on private attributes. This simultaneously generalizes attribute-based encryption (ABE) for boolean formulas and ABP’s as well as strongly attribute-hiding PE schemes for inner products. The proposed scheme is proven secure for any a priori bounded number of ciphertexts and an unbounded (polynomial) number of decryption keys, which is the best possible in the simulation-based adaptive security framework. This directly implies that our construction also achieves indistinguishability-based strongly partially-hiding security against adversaries requesting an unbounded (polynomial) number of ciphertexts and decryption keys. The security of the proposed scheme is derived under (asymmetric version of) the well-studied decisional linear (DLIN) assumption. Our work resolves an open problem posed by Wee in TCC 2017, where his result was limited to the semi-adaptive setting. Moreover, our result advances the current state of the art in both the fields of simulation-based and indistinguishability-based strongly attribute-hiding PE schemes. Our main technical contribution lies in extending the strong attribute hiding methodology of Okamoto and Takashima [EUROCRYPT 2012, ASIACRYPT 2012] to the framework of simulation-based security and beyond inner products.
Expand
Felix Wegener, Christian Baiker, Amir Moradi
ePrint Report ePrint Report
Threshold Implementations are well-known as a provably firstorder secure Boolean masking scheme even in the presence of glitches. A precondition for their security proof is a uniform input distribution at each round function, which may require an injection of fresh randomness or an increase in the number of shares. However, it is unclear whether violating the uniformity assumption causes exploitable leakage in practice. Recently, Daemen undertook a theoretical study of lossy mappings to extend the understanding of uniformity violations. We complement his work by entropy simulations and practical measurements of Keccak’s round function. Our findings shed light on the necessity of mixing operations in addition to bit-permutations in a cipher’s linear layer to propagate randomness between S-boxes and prevent exploitable leakage. Finally, we argue that this result cannot be obtained by current simulation methods, further stressing the continued need for practical leakage measurements.
Expand
Kuala Lumpur, Malaysia, 26 November - 28 November 2019
Event Calendar Event Calendar
Event date: 26 November to 28 November 2019
Submission deadline: 8 June 2019
Notification: 29 July 2019
Expand
Copenhagen, Denmark, 17 July - 19 July 2019
Event Calendar Event Calendar
Event date: 17 July to 19 July 2019
Submission deadline: 12 January 2019
Notification: 1 March 2019
Expand

11 November 2018

Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
ePrint Report ePrint Report
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of the receivers and get their secret keys and plaintexts. Security against RSO attacks for a PKE scheme ensures confidentiality of ciphertexts of uncorrupted receivers. Simulation-based RSO security against chosen ciphertext attacks (SIM-RSO-CCA) is the strongest security notion in all RSO attack scenarios. Jia, Lu, and Li (INDOCRYPT 2016) proposed the first SIM-RSO-CCA secure PKE scheme. However, their scheme used indistinguishablility obfuscation, which is not known to be constructed from any standard computational assumption. In this paper, we give two contributions for constructing SIM-RSO-CCA secure PKE from standard computational assumptions. Firstly, we propose a generic construction of SIM-RSO-CCA secure PKE using an IND-CPA secure PKE scheme and a non-interactive zero-knowledge proof system satisfying one-time simulation soundness. Secondly, we propose an efficient and concrete construction of SIM-RSO-CCA secure PKE based on the decisional Diffie-Hellman (DDH) assumption. Moreover, we give a method for efficiently expanding the plaintext space of the DDH-based construction. By applying this method to the construction, we obtain the first DDH-based SIM-RSO-CCA secure PKE scheme supporting a super-polynomially large plaintext space with compact ciphertexts.
Expand
Tetsu Iwata
ePrint Report ePrint Report
Inoue and Minematsu [Cryptology ePrint Archive: Report 2018/1040] presented efficient forgery attacks against OCB2, and Poettering [Cryptology ePrint Archive: Report 2018/1087] presented a distinguishing attack. In this short note, based on these results, we show a plaintext recovery attack against OCB2 in the chosen plaintext and ciphertext setting.
Expand
◄ Previous Next ►