IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 February 2019
McLean, VA, USA, 25 September - 27 September 2019
Submission deadline: 8 April 2019
Notification: 10 June 2019
NEW YORK, United States, 31 May - 2 June 2019
Submission deadline: 1 April 2019
Notification: 22 April 2019
17 February 2019
University of Bergen, Bergen
We are particularly interested in applicants who are highly motivated to contribute to cryptographic privacy-enhancing technologies, blockchain technology, lattice/code-based cryptography, and coding theory.
We can offer:
- a good and professionally challenging working environment
- salary at pay grade 51 (Code 1017/Pay range 20, alternative 9) in the state salary scale. This constitutes a gross annual salary of NOK 449 400. Further promotions are made according to the length of service in the position.
- enrolment in the Norwegian Public Service Pension Fund
- Good welfare benefits (https://www.uib.no/en/foremployees/30808/welfare)
Closing date for applications: 10 March 2019
Contact: Chunlei Li (chunlei.li (at) uib.no)
More information: https://www.jobbnorge.no/en/available-jobs/job/165213/phd-position-in-cryptography-and-data-security
CISPA Helmholtz Center for Information Security
Yang (https://yangzhangalmo.github.io/) is a research group leader at CISPA Helmholtz Center for Information Security. Previously, he was a postdoc working with Michael Backes at CISPA from January 2017 to December 2018. CISPA located at Saarbruecken, Germany, is the newest member of the Helmholtz Association, the largest scientific organization in Germany fully committed to scientific excellence and to tackling the grand research challenges in their respective fields. CISPA as the first investment of Helmholtz in computer science is one of the top research centers in information security, it is constantly ranked top-3 in the field worldwide, see csrankings.org.
Requirements:
- A bachelor/master degree in Computer Science, Information Security, Mathematics with excellent grades
- Excellent programming skills
- Excellent English
- Good knowledge about machine learning
What we offer:
- Full-time working contract (E13 level salary)
- Excellent research environment
- Strong supervision
To apply, please send your CV to yang.zhang (at) cispa.saarland
Closing date for applications: 1 June 2019
Contact: Yang Zhang, research group leader, yang.zhang (at) cispa.saarland
Royal Holloway University of London
The PDRA will work alongside Prof. Carlos Cid, Dr. Martin Albrecht and other cryptographic researchers at Royal Holloway on topics connected to the design and analysis of cryptographic key exchange protocols that support incorporating key material from diverse sources. This post is part of the AQuaSec project, a Innovate UK-funded research project with 17 partners from industry and academia, aiming to develop technologies for quantum-safe communications by integrating post-quantum cryptography with techniques from quantum cryptography.
Applicants for this role should have already completed, or be close to completing, a PhD in a relevant discipline, with an outstanding research track record in cryptography. Experience in cryptographic protocol design is a plus.
Established in 1990, the Information Security Group at Royal Holloway was one of the first dedicated academic groups in the world to conduct research and teaching in information security. The ISG is today a world-leading interdisciplinary research group with 20 full-time members of staff, several postdoctoral research assistants and over 50 PhD students working on a range of subjects in cyber security, in particular cryptography. The post is based in Egham, Surrey where Royal Holloway is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London.
Closing date for applications: 12 March 2019
Contact: Informal enquiries about this position can be made to Prof. Carlos Cid (carlos.cid AT rhul.ac.uk)
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0219-048
TU Wien
Candidates with a research background in the following areas are particularly invited to apply:
- Formal methods for security and privacy;
- Intersection between Machine Learning and security and privacy;
- Blockchain technologies;
- Web security.
TU Wien has about 20,000 students and a heavy emphasis on research. The Faculty of Informatics comprises about 3,000 students and is the largest one in Austria. Vienna hosts several outstanding research institutes (including IST Austria, AIT, SBA, RIAT) with a strong focus on security and privacy and a long-standing collaboration track.
The postdoctoral researcher salary is highly competitive and ruled by level B1 of the Austrian Collective Agreement for the university staff, currently amounting to EUR 3.711,10 per/month/gross (14 times a year).
Finally, Vienna has repeatedly been ranked number 1 worldwide in the Mercer Quality of Living Survey.
TU Wien is committed to increasing female employment in leading scientific positions. Female applicants are explicitly encouraged to apply, and preference will be given to female applications when scientifically equally qualified.
Expressions of interest should be submitted by e-mail to christopher.vomastek (at) tuwien.ac.at and include in a single pdf
• A cover letter stating the candidate\'s motivation to apply, and the reason(s) why they should be selected for the position;
• A CV;
• A short research statement;
• Three most significant publications;
• The contact details of two referees.
Expressions of interest submitted by February 25, 2019 will receive full consideration.
Closing date for applications: 25 February 2019
Contact: Univ.-Prof. Dr. Matteo Maffei, matteo.maffei (at) tuwien.ac.at
14 February 2019
Ling Song, Xianrui Qin, Lei Hu
Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
We describe a method using homomorphic encryption (HE) to perform GWAS in a secure and private setting. This work is based on a semi-parallel logistic regression algorithm proposed to accelerate GWAS computations. Our solution involves homomorphically encrypted matrices and suitable approximations that adapts the original algorithm to be HE-friendly. Our best implementation took $24.70$ minutes for a dataset with $245$ samples, $4$ covariates and $10643$ SNPs.
We demonstrate that it is possible to achieve GWAS with homomorphic encryption with suitable approximations.
Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
Matteo Campanelli, Dario Fiore, Anaïs Querol
Our contribution is LegoSNARK, a "toolbox" (or framework) for commit-and-prove zkSNARKs (CP-SNARKs) that includes:
1) General composition tools: build new CP-SNARKs from proof gadgets for basic relations simply. 2) A "lifting" tool: add commit-and-prove capabilities to a broad class of existing zkSNARKs efficiently. This makes them interoperable (linkable) within the same computation. For example, one QAP-based scheme can be used prove one component; another GKR-based scheme can be used to prove another. 3) A collection of succinct proof gadgets for a variety of relations.
Additionally, through our framework and gadgets, we are able to obtain new succinct proof systems. Notably:
LegoGro16, a commit-and-prove version of Groth16 zkSNARK, that operates over data committed with a classical Pedersen vector commitment, and that achieves a 5000X speed in proving time. LegoUAC, a pairing-based SNARK for arithmetic circuits that has a universal, circuit-independent, CRS, and proving time linear in the number of circuit gates (vs. the recent scheme of Groth et al. (CRYPTO'18) with quadratic CRS and quasilinear proving time).
Christina Boura, Anne Canteaut, Daniel Coggia
Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
Hai Zhou, Yuanqi Shen, Amin Rezaei
13 February 2019
Auckland, New Zealand, 7 July 2019
Submission deadline: 10 March 2019
Notification: 15 April 2019
Oxford, United Kingdom, 16 December - 18 December 2019
Submission deadline: 14 July 2019
Notification: 5 September 2019
Beer Sheva, Israel, 5 May - 7 May 2019
Submission deadline: 21 March 2019
Dahmun Goudarzi, Ange Martinelli, Alain Passelègue, Thomas Prest
In this work, we provide new strategies to prove the security of masked implementations and start by unifying the different noisiness metrics used in prior works by relating all of them to a standard notion in information theory: the pointwise mutual information. Based on this new interpretation, we define two new natural metrics and analyze the security of known compilers with respect to these metrics. In particular, we prove (1) a tighter bound for reducing the noisy leakage models to the probing model using our first new metric, (2) better bounds for amplification-based security proofs using the second metric.
To support that the improvements we obtain are not only a consequence of the use of alternative metrics, we show that for concrete representation of leakage (e.g, "Hamming weight + Gaussian noise''), our approach significantly improves the parameters compared to prior works. Finally, using the Rényi divergence, we quantify concretely the advantage of an adversary in attacking a block cipher depending on the number of leakage acquisitions available to it.
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Florian Bourse, Olivier Sanders
In this work, we study the links between divisible e-cash and constrained pseudo-random functions (PRFs), a primitive recently formalized. We show that one can construct divisible e-cash systems from constrained PRFs achieving some specific properties that we identify. Actually, we provide two frameworks for divisible e-cash that essentially differ in the kind of properties expected from the PRFs. We prove the security of our generic frameworks and provide examples of constrained PRFs satisfying our requirements. Finally, we exhibit a problem in many e-cash systems that invalidates some of their security proofs.