IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
29 March 2019
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Joaquín Garcia-Alfaro, Cristina Pérez-Solà
Gembu Ito, Tetsu Iwata
In this paper, we show a polynomial time quantum distinguishing attack against the $(3d-3)$-round version, i.e., we improve the number of rounds by $(d-2)$. We also show a quantum distinguishing attack against the $(d^2-d+1)$-round version in the quantum chosen-ciphertext setting. We apply these quantum distinguishing attacks to obtain key recovery attacks against Type-1 generalized Feistel ciphers.
Alonso González, Carla Ràfols
An additional contribution of the paper is to obtain a very efficient argument for verifiable computation using the same design principles which is based on weaker assumptions. The communication is approximately 4d group elements and verifying a proof requires computing around 4d pairings and O(n+d) exponentiations, where n is the input size and d the circuit depth. While the argument for the quadratic constraints is based on standard falsifiable assumptions, the argument for the linear constraints is based on a very ad-hoc assumption about certain properties of arguments of membership in linear spaces.
Hiroki Sudo, Koji Nuida, Kana Shimizu
Pedro Branco, Paulo Mateus
Sabyasachi Dutta, Kouichi Sakurai
Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
In this paper, we give techniques to implement Gaussian sampling over general lattices without using FPA. To this end, we revisit the approach of Peikert, using perturbation sampling. Peikert's approach uses the Cholesky decomposition $\mathbb{\Sigma} = \mathbb{A} \mathbb{A}^t$ of the target covariance matrix $\mathbb{\Sigma}$, giving rise to a square matrix $\mathbb{A}$ with real (not integer) entries. Our idea, in a nutshell, is to replace this decomposition by an integral one. While there is in general no integer solution if we restrict $\mathbb{A}$ to being a square matrix, we show that such a decomposition can be efficiently found by allowing $\mathbb{A}$ to be wider (say $n \times 9n$). This can be viewed as an extension of Lagrange's four-square theorem to matrices. In addition, we adapt our integral decomposition algorithm to the ring setting: for power-of-2 cyclotomics, we can exploit the tower of rings structure for improved complexity and compactness.
Yu Chen, Xuecheng Ma
Despite strong privacy is promising, it might be overkilled or even could be abused in some cases. In particular, anonymity seems contradict to accountability, which is a crucial property for scenarios requiring disputes resolving mechanism, e.g. e-commerce.
To address the above issues, we introduce accountability to blockchain-based confidential transaction system for the first time. We first formalize a general framework of confidential transaction system with accountability from digital signature, homomorphic public-key encryption and non-interactive zero-knowledge arguments, then present a surprisingly simple and efficient realization called PGC. To avoid using general-purpose zero-knowledge proofs (such as zk-SNARK and zk-STARK), we twist the ElGamal encryption as the underlying homomorphic PKE and develop ciphertext-refreshing approach. This not only enables us to prove transaction validity/correctness by using efficient Sigma protocols and zero-knowledge range proofs, but also makes PGC largely compatible with Bitcoin and Ethereum, which could be used as a drop-in to provide confidential enforcements with accountability.
Boyu Ni, Xiaoyang Dong
In this paper, we give more improved polynomial-time quantum distinguishers on Type-1 GFS in quantum chosen-plaintext attack (qCPA) setting and quantum chosen-ciphertext attack (qCCA) setting. In qCPA setting, we give new quantum polynomial-time distinguishers on $(3d-3)$-round Type-1 GFS with branches $d\geq3$, which gain $d-2$ more rounds than the previous distinguishers. Hence, we could get better key-recovery attacks, whose time complexities gain a factor of $2^{\frac{(d-2)n}{2}}$. In qCCA setting, we get $(3d-3)$-round quantum distinguishers on Type-1 GFS, which gain $d-1$ more rounds than the previous distinguishers.
In addition, we give some quantum attacks on CAST-256 block cipher. We find 12-round and 13-round polynomial-time quantum distinguishers in qCPA and qCCA settings, respectively, while the best previous one is only 7 rounds. Hence, we could derive quantum key-recovery attack on 19-round CAST-256. While the best previous quantum key-recovery attack is on 16 rounds. When comparing our quantum attacks with classical attacks, our result also reaches 16 rounds on CAST-256 with 128-bit key under a competitive complexity.
Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
Marcus Brinkmann
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
University of Warsaw
MIM UW is one of the strongest computer science faculties in Europe. It is known for talented students (e.g., two wins and 13 times in top ten at the ACM International Collegiate Programming Contest) and strong research teams, especially in theoretical aspects of computer science like algorithms, logic and automata, cryptography (e.g., 8 ERC grants in these fields, 4 of them running at the moment). For an overview of research areas represented in the Faculty, see http://www.mimuw.edu.pl/en/dziedziny-badan
Requirements:
- PhD degree in computer science or mathematics achieved during the last 10 years
- Strong publication record in international computer science journals or conferences
- Teaching experience
- Mobility record (participation in conferences, research visits, postdoc positions, etc.)
The position is for 4 years, with the possibility of extending for an indefinite period of time after a positive result of employee evaluation. The position comes with teaching load of 210 hrs/year.
Deadline for applications: 25th April 2019.
More details, including application procedure can be found under the following link:
https://www.mimuw.edu.pl/rozne/konkursy-pliki/2019/assistant-professor-comp-systems-2019-04-25.pdf
For more information about the procedure, requirements, conditions, etc. please contact a vice-director of Institute of Informatics, Lukasz Kowalik (kowalik (at) mimuw.edu.pl).
Closing date for applications: 25 April 2019
Contact: Lukasz Kowalik (kowalik (at) mimuw.edu.pl)
More information: https://www.mimuw.edu.pl/rozne/konkursy-pliki/2019/assistant-professor-comp-systems-2019-04-25.pdf
University of Manchester, UK
Project Description
Since the privatisation of the energy market in the UK, the inefficiency of its structures have resulted in unaffordable energy for micro consumers such as households and SMEs. Similar market structures distributed worldwide have also experienced the same issue. A few contributing factors leading to this issue are complicated switching process between suppliers, current high-cost technical infrastructure for administration and billing purposes and fixed rate supply system. With the use of blockchain as an infrastructure, there is a significant opportunity to disrupt the current energy market with automation and integration of services, provide savings in the energy provision process and reduce energy bills for end users. However, little scientific information is available regarding the costs associated with running a blockchain-based energy market and the best methods for scaling up such a platform.
eChain is a blockchain-based energy trading platform developed by UrbanChain, which uses hyperledger as a building block. The embedded features of the platform are real-time switching, automated billing and administration, P2P trading between energy generators and consumers, and demand side management.
Funding note
The candidate must be a UK/EU national as required by the funding agency.
Person Specification
Candidates must hold a minimum of an upper Second Class UK Honours degree or international equivalent in a relevant science or engineering discipline.
Skills and Qualifications
- A passion for blockchain technology, preferably concerning the energy sector
- Enthusiasm for working with cloud services and virtual machines
- Capable of producing highly original work and an enquiring mind with well-developed analytical and investigative skills
- A track record in software and/or electronic engineering, distributed ledger systems and/or system security
Closing date for applications: 15 April 2019
Contact: Candidates are encouraged to send their CV, a transcript with a list of courses and grades, and a description of their research interests to Dr Mustafa A. Mustafa as soon as possible for informal discussion about their suitability.
https://www.research.manchester.ac.uk/portal/mustafa.mustafa.html
More information: http://www.cs.manchester.ac.uk/study/postgraduate-research/projects/description/?projectid=20154
Cairns, Australia, 1 October - 4 October 2019
Submission deadline: 31 May 2019
Notification: 5 July 2019
27 March 2019
- Jonathan Katz, for broad contributions, especially in public-key encryption and cryptographic protocols, and for dedication to service and education.
- Kaoru Kurosawa, for seminal contributions spanning anonymity, e-voting, and public-key cryptography, and for service to the Japanese and international communities.
- Daniele Micciancio, for pioneering work on lattice-based cryptography and the complexity of lattice problems, and for service to the IACR.
- Vincent Rijmen, for co-designing AES, contributions to the design and cryptanalysis of symmetric primitives, and service to the IACR.
- Amit Sahai, for fundamental contributions, including to secure computation, zero knowledge, and functional encryption, and for service to the IACR.
- Xiaoyun Wang, for essential contributions to the cryptanalysis and design of hash functions, and for service to the IACR.
26 March 2019
Ruhr University Bochum, Bochum, Germany
We offer a three-year position with salary according to the remuneration group E 12/13 TV-L (39,83 Wochenstunden). The position is based in Bochum, Germany and will involve international travel to conduct and present research.
The load of teaching will be calculated according to §3 of Lehrverpflichtungsverordnung (state of North Rhine-Westphalia).
If you are interested, send your complete application documents in one single pdf file (max. 10 MB) with subject line *Application for PhD* directly to Nils Fleischhacker. ( nils.fleischhacker (at) rub.de )
Required documents are:
- Letter of motivation
- Curriculum vitae (including a list of publications if appropriate)
- Master\'s certificate and transcript of records
At Ruhr-Universität Bochum, we wish to promote careers of women in areas in which they have been underrepresented, and we would therefore like to encourage female candidates to send us their applications. Applications by suitable candidates with severe disabilities and other applicants with equal legal status are likewise most welcome.
Closing date for applications: 14 April 2019
Contact: Nils Fleischhacker, nils.fleischhacker (at) rub.de
More information: https://goo.gl/FSxDbC
University of Birmingham
The main goal of this studentship is to develop optimized, side-channel protected hardware implementations of isogeny-based protocols.
The student will be integrated within the University of Birmingham’s Centre for Cyber Security and Privacy and they will collaborate with more experienced researchers on this research program. They will be supervised by Dr. Sujoy Sinha Roy, Dr. Christophe Petit and Dr. Flavio Garcia. All three are members of Birmingham’s Academic Center of Excellence in Cyber security.
Person specification:
2:1 Honours undergraduate degree and/or postgraduate degree with Distinction (or an international equivalent) in Electrical and Electronics Engineering, Computer Science, Mathematical Engineering or closely related discipline. The ideal candidate for this position will be familiar with low-level programming, hardware architecture design and cryptography, but other candidates with a strong academic record will also be considered.
Funding Notes: The candidate must be a UK national as required by the funding agency.
Total stipend to student: £22,000 (year1), £22,500 (year2), £23,000 (year3), £11,750 (6 months of year4). The stipend is tax free. This is a research position with limited or no teaching requirements.
Application link: https://sits.bham.ac.uk/lpages/EPS003.htm
Closing date for applications: 15 May 2019
Contact: Candidates are encouraged to send their CV, a transcript with a list of courses and grades, and a description of their research interests to Sujoy Sinha Roy and Christophe Petit and Flavio Garcia as soon as possible for informal discussion about their suitability.
https://www.cs.bham.ac.uk/~sinharos/
https://www.cs.bham.ac.uk/~petitcz/
http://www.cs.bham.ac.uk/~garciaf/