IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 February 2019
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
Hongbing Wang, Yunlei Zhao
In this work, we propose the first identity-based higncryption(IBHigncryption, for short). We present formal security model for IBHigncryption, under which security proof of the proposed scheme is conducted. The most impressive feature of IBHigncryption, besides other desirable properties it offers, is its simplicity and efficiency, which might be somewhat surprising in retrospect. Our IBHigncryption has a much simpler setup stage with smaller public parameters and particularly no need of computing master public key. It is essentially as efficient as (if not more than) the fundamental CCA-secure Boneh-Franklin identity-based encryption scheme, and has significant efficiency advantage over the IEEE 1363.3 standard of identity-based signcryption.
Antonio Faonio, Daniele Venturi
-) Continuous non-malleability: No computationally-bounded adversary tampering independently with all the shares can produce mauled shares that reconstruct to a value related to the original secret. This holds even in case the adversary can tamper *continuously*, for an *unbounded* polynomial number of times, with the same target secret sharing, where the next sequence of tampering functions, as well as the subset of shares used for reconstruction, can be chosen *adaptively* based on the outcome of previous reconstructions. -) Resilience to noisy leakage: Non-malleability holds even if the adversary can additionally leak information independently from all the shares. There is no bound on the length of leaked information, as long as the overall leakage does not decrease the min-entropy of each share by too much. -) Improved rate: The information rate of our final scheme, defined as the ratio between the size of the message and the maximal size of a share, asymptotically approaches 1 when the message length goes to infinity.
Previous constructions achieved information-theoretic security, sometimes even for arbitrary access structures, at the price of *at least one* of the following limitations: (i) Non-malleability only holds against one-time tampering attacks; (ii) Non-malleability holds against a bounded number of tampering attacks, but both the choice of the tampering functions and of the sets used for reconstruction is non-adaptive; (iii) Information rate asymptotically approaching zero; (iv) No security guarantee in the presence of leakage.
Naomi Farley, Robert Fitzpatrick, Duncan Jones
Threshold schemes offer a halfway house between traditional HSM-based key protection and native cloud-based usage. Threshold signature schemes allow a set of actors to share a common public key, generate fragments of the private key and to collaboratively sign messages, such that as long as a sufficient quorum of actors sign a message, the partial signatures can be combined into a valid signature.
However, threshold schemes, while being a mature idea, suffer from large protocol transcripts and complex communication-based requirements. This consequently makes it a more difficult task for a user to verify that a public key is, in fact, a genuine product of the protocol and that the protocol has been executed validly. In this work, we propose a solution to these auditability and verication problems, reporting on a prototype cloud-based implementation of a threshold RSA key generation and signing system tightly integrated with modern distributed ledger and consensus techniques.
Albany, USA, 4 June - 6 June 2019
Submission deadline: 15 February 2019
Notification: 15 March 2019
04 February 2019
Samuel Jaques, John M. Schanck
TU Wien, Security & Privacy Group
• systems security and privacy
• distributed systems
• malware and mobile app analysis
Research topics may cover (but are not limited to):
• detection and prevention of novel attacks against smartphones and users’ privacy
• large-scale static and dynamic analysis of mobile apps
For our previous research in this area see https://martina.lindorfer.in.
The employment is a full-time position (40 hrs/week) with an internationally competitive salary. The working language is English, knowledge of German is not required.
Interested candidates should provide:
• a motivation letter
• a transcript of records
• a curriculum vitae
• a publication list (if applicable)
• contact information for two referees
TU Wien offers an outstanding research environment and numerous professional development opportunities. The Faculty of Informatics is the largest of its kind in Austria and is consistently ranked among the best in Europe. The city of Vienna features a vibrant and excellence-driven research landscape. The candidate will have the opportunity to collaborate with several other leading research institutes (e.g., IST, AIT, SBA Research, ABC). Finally, Vienna has been consistently ranked by Mercer over the last years as the best city for quality of life worldwide.
Review of expressions of interest will start immediately and continue until the position is filled.
Closing date for applications: 31 March 2019
Contact: Martina Lindorfer (martina.lindorfer (at) tuwien.ac.at)
More information: https://secpriv.tuwien.ac.at/thesis_and_job_opportunities
Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany
Closing date for applications: 28 February 2019
Contact: Dr. Patrick Schulte
RUHR-UNIVERSITÄT BOCHUM
Exzellenzcluster CASA / Horst Görtz Institut für IT-Sicherheit
Geschäftsführer / General Manager
ID 2 / 142
Universitätsstr. 150
44780 Bochum, Germany
Tel: +49-(0)234-32-27722
Email: patrick.schulte (at) rub.de
More information: https://twitter.com/HGI_Bochum/status/1087703387343331329
Brandenburg University of Technology, Cottbus, Germany
Closing date for applications: 14 February 2019
Contact: Professor Dr.-Ing. Andriy Panchenko
Tel.: +49 355 69 2236
itsec-jobs.informatik@lists.b-tu.de
More information: https://www.informatik.tu-cottbus.de/~andriy/phd-ad-btu_en.pdf
Norwegian University of Science and Technology (NTNU)
Closing date for applications: 1 March 2019
Contact: Colin Boyd: colin.boyd (at) ntnu.no or Danilo Gligoroski: danilo.gligoroski (at) ntnu.no or Stig Frode Mjølsnes: stig.mjolsnes (at) ntnu.no
More information: https://www.jobbnorge.no/en/available-jobs/job/163765/
31 January 2019
Dakar, Senegal, 5 December - 7 December 2019
Submission deadline: 1 May 2019
Notification: 31 July 2019
Bucharest, Romania, 16 September - 18 September 2019
Submission deadline: 28 June 2019
Notification: 31 July 2019
Hisham S. Galal, Amr M. Youssef
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
Methods The HE Track of iDash 2018 competition focused on solving an important problem in practical machine learning scenarios, where a data analyst that has trained a regression model (both linear and logistic) with a certain set of features, attempts to find all features in an encrypted database that will improve the quality of the model. Our solution is based on the hybrid framework Chimera that allows for switching between different families of fully homomorphic schemes, namely TFHE and HEAAN.
Results Our solution is one of the finalist of Track 2 of iDash 2018 competition. Among the submitted solutions, ours is the only bootstrapped approach that can be applied for different sets of parameters without re-encrypting the genomic database, making it practical for real-world applications.
Conclusions This is the first step towards the more general feature selection problem across large encrypted databases.
Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
Here we describe a zero-knowledge SNARK, Sonic, which supports a universal and continually updateable structured reference string that scales linearly in size. Sonic proofs are constant size, and in the batch verification context the marginal cost of verification is comparable with the most efficient SNARKs in the literature. We also describe a generally useful technique in which untrusted ``helpers'' can compute advice which allows batches of proofs to be verified more efficiently.
Pedro Branco
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
These attacks, however, were generally ad-hoc and did not enjoy a wide applicability. As our main contribution, we propose a generic and efficient algorithm to recover affine encodings, for any Substitution-Permutation-Network (SPN) cipher, such as AES, and any form of affine encoding. For AES parameters, namely 128-bit blocks split into 16 parallel 8-bit S-boxes, affine encodings are recovered with a time complexity estimated at $2^{32}$ basic operations, independently of how the encodings are built.
This algorithm is directly applicable to a large class of schemes. We illustrate this on a recent proposal due to Baek, Cheon and Hong, which was not previously analyzed. While Baek et al. evaluate the security of their scheme to 110 bits, a direct application of our generic algorithm is able to break the scheme with an estimated time complexity of only $2^{35}$ basic operations.
As a second contribution, we show a different approach to cryptanalyzing the Baek et al. scheme, which reduces the analysis to a standalone combinatorial problem, ultimately achieving key recovery in time complexity $2^{31}$. We also provide an implementation of the attack, which is able to recover the secret key in about 12 seconds on a standard desktop computer.
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
In this work, we search how one could design a key schedule to maximize the number of active S-boxes in the related-key model. However, we also want this key schedule to be efficient, and therefore choose to only consider permutations. Our target is AES, and along with a few generic results about the best reachable bounds, we found a permutation to replace the original key schedule that reaches a minimal number of active S-boxes of 20 over 6 rounds, while no differential characteristic with a probability larger than $2^{-128}$ exists. We also describe an algorithm which helped us to show that there is no permutation that can reach 18 or more active S-boxes in 5 rounds. Finally, we give several pairs $(P_s, P_k)$, replacing respectively the ShiftRows operation and the key schedule of the AES, reaching a minimum of 21 active S-boxes over 6 rounds, while again, there is no differential characteristic with a probability larger than $2^{-128}$.