IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 March 2019
Sergei Bauer, Martin Brunner, Peter Schartner
Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede, Frederik Vercauteren
Daniel J. Bernstein, Bo-Yin Yang
Rami Khalil, Arthur Gervais, Guillaume Felley
We propose TEX, a front-running resilient, non-custodial centralized exchange. Our matching system enforces the trade order sequence provided by traders, i.e. is resilient against trade sequence alteration by the exchange operator. As such the matching system can operate in conjunction with a blockchain based settlement layer (as proposed in the following), or make custodian exchanges provably accountable for their matching process. Our layer-two settlement system executes a trade without holding the assets, and allows to reach similar scales as traditional exchanges (trading volume in USD, number of trades/second), despite a slow underlying ledger. TEX might become a point of availability-failure, but we show how the settlement system's security properties would not compromise the trader's assets, even if the centralized operator is compromised and/or colludes with all other traders. We provide an evaluation on a PoW blockchain.
Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
Jiaping Wang, Hao Wang
In this paper, we introduce the Asynchronous Consensus Zones, which scales blockchain system linearly without compromising decentralization or security. We achieve this by running multiple independent and parallel instances of single-chain consensus systems termed as zones. The consensus happens independently within each zone with minimized communication, which partitions the workload of the entire network and ensures a moderate burden for each individual node as the network grows. We propose eventual atomicity to ensure transaction atomicity across zones, which achieves the efficient completion of transactions without the overhead of a two-phase commit protocol. Additionally, we propose Chu-ko-nu mining to ensure the effective mining power in each zone to be at the same level of the entire network, making an attack on any individual zone as hard as that on the full network. Our experimental results show the effectiveness of our work: on a testbed including 1,200 virtual machines worldwide to support 48,000 nodes, our system delivers 1,000x throughput and 2,000x capacity over the Bitcoin and Ethereum networks.
Qipeng Liu, Mark Zhandry
In this work, we show how to overcome the limitations above in many settings. In particular, we give mild conditions under which Fiat-Shamir is secure in the quantum setting. As an application, we show that existing lattice signatures based on Fiat-Shamir are secure without any modifications.
Manu Drijvers, Gregory Neven
Eduard Hauck, Eike Kiltz, Julian Loss
SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
Joseph Jaeger, Stefano Tessaro
This paper initiates the study of time-memory trade-offs for basic symmetric cryptography. We show that schemes like counter-mode encryption, which are affected by the Birthday Bound, become more secure (in terms of time complexity) as the attacker's memory is reduced.
One key step of this work is a generalization of the Switching Lemma: For adversaries with $S$ bits of memory issuing $q$ distinct queries, we prove an $n$-to-$n$ bit random function indistinguishable from a permutation as long as $S \times q \ll 2^n$. This result assumes a combinatorial conjecture, which we discuss, and implies right away trade-offs for deterministic, stateful versions of CTR and OFB encryption.
We also show an unconditional time-memory trade-off for the security of randomized CTR based on a secure PRF. Via the aforementioned conjecture, we extend the result to assuming a PRP instead, assuming only one-block messages are encrypted.
Our results solely rely on standard PRF/PRP security of an underlying block cipher. We frame the core of our proofs within a general framework of indistinguishability for streaming algorithms which may be of independent interest.
Atlanta, USA, 24 August 2019
Submission deadline: 25 May 2019
02 March 2019
Prague, Czech Republic, 26 July - 28 July 2019
Submission deadline: 15 April 2019
Notification: 23 May 2019
Darmstadt, Germany, 17 May - 18 May 2019
Submission deadline: 18 March 2019
Notification: 25 March 2019
Kanazawa University, Japan
An appointee is expected on duty on July 1st, 2019 or at an early possible time after that.
Research budget:: In case of tenure-track assistant professor, Kanazawa University plans to provide a start-up research fund of approximately 800,000 JPY in the first year in addition to faculty research expense.
Closing date for applications: 15 March 2019
Contact: Masahiro Mambo (Contact information can be found below.)
More information: https://www.se.kanazawa-u.ac.jp/en/researchers/pdf/20190315_ec_tt_en.pdf
Simula UiB
- algorithmic and theoretical aspects of side-channel security
- cryptographic protocols for privacy-preserving applications
- privacy-preserving pairing-based and lattice-based protocols for applications like blockchain
The PhD students will enter the PhD program of the Department of informatics at the University of Bergen. Applications must be submitted via https://www.simula.no/about/job/call-phd-students-cryptography-simula-uib
Closing date for applications: 30 April 2019
Contact: For questions and inquiries, please contact
Martijn Stam, email: martijn (at) simula.no
or
Helger Lipmaa, email: helger.lipmaa (at) gmail.com
More information: https://www.simula.no/about/job/call-phd-students-cryptography-simula-uib
Information Security Group, Royal Holloway, University of London, UK
The postdoc will work alongside Martin Albrecht and other cryptographic researchers in the ISG on topics in lattice-based cryptography and related fields. One post is funded by a joint grant between Royal Holloway and Imperial College (Cong Ling) for bridging the gap between lattice-based cryptography and coding theory (starting date: 15 April or later). The second post is funded by an EPSRC grant on investigating the security of lattice-based and post-quantum cryptographic constructions (starting date: 1 June or later). Applicants with a strong background in all areas of cryptography are encouraged to apply.
Applicants should have already completed, or be close to completing, a PhD in a relevant discipline. Applicants should have an outstanding research track record in cryptography. Applicants should be able to demonstrate scientific creativity, research independence, and the ability to communicate their ideas effectively in written and verbal form.
The ISG is one of the largest departments dedicated to information security in the world with 21 core academic staff in the department, as well as research and support staff. We work with many research partners in other departments and have circa 90 PhD students working on a wide range of security research, many of whom are fully funded through our Centre for Doctoral Training in Cyber Security. We have a strong, vibrant, embedded and successful multi-disciplinary research profile spanning from cryptography to systems security and social aspects of security. This vibrant environment incorporates visiting researchers, weekly research seminars, weekly reading groups, PhD seminars and mini conferences, the WISDOM group (Women in the Security Domain Or Mathematics) and we are proud of our collegial atmosphere and approach.
Closing date for applications: 5 April 2019
Contact: Martin Albrecht, martin.albrecht _AT_ royalholloway.ac.uk
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0219-081
IMDEA Software Institute, Madrid, Spain
Who should apply: Applicants should be MSc or PhD students in computer science, mathematics or a related discipline. Strong knowledge of cryptography and solid programming skills are required. Familiarity with cryptographic protocols, cryptography implementation libraries or C++ will be considered as a plus.
Working at IMDEA Software: The position is based in Madrid, Spain, where the IMDEA Software Institute is situated. The institute provides for travel expenses and an internationally competitive stipend. The working language at the institute is English.
Dates: The internship duration is intended to be for 4-6 months (with some flexibility). The ideal starting period is from May 2019.
How to apply: Applicants interested in the position should submit their application at https://careers.imdea.org/software/ using reference code 2019-02-intern-crypto. Deadline for applications is April 15, 2019. Review of applications will begin immediately.
Closing date for applications: 15 April 2019
Contact: For enquiries about the position, please contact:
Dario Fiore, dario.fiore (at) imdea.org
Matteo Campanelli, matteo.campanelli (at) imdea.org
More information: https://software.imdea.org/open_positions/2019-02-intern-crypto.html
Institute for Quantum Computing at University of Waterloo
https://uwaterloo.ca/institute-for-quantum-computing/positions/open-quantum-safe-liboqs-cryptographic-research-architect
Closing date for applications: 30 August 2019
Contact: Michele Mosca: michele.mosca (at) uwaterloo.ca
Douglas Stebila: dstebila (at) uwaterloo.ca
More information: https://uwaterloo.ca/institute-for-quantum-computing/positions/open-quantum-safe-liboqs-cryptographic-research-architect
University of Surrey, UK
The Department has a large secure systems research group, led by Professor Steve Schneider, with expertise in security by design, cryptography, authentication, verification, distributed ledger technologies, trusted systems, IoT security, program analysis and cloud security. Professor Yaochu Jin also leads a research group specialising in machine learning, complex systems and networks, Bayesian learning, neuroscience, evolutionary computation and applications of machine learning.
Closing date for applications: 17 March 2019
Contact: Helen Treharne
More information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=010019