IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
02 May 2019
Ulm University, Institute of Distributed Systems, Germany
Ulm University is a young research university with a focus on natural sciences, medicine and technology. Located in an economically strong region, the University with its more than 10,000 students offers a dynamic work environment with attractive networking and development prospects. The Institute of Distributed Systems is a leading research group in areas like automotive security and privacy engineering.
Closing date for applications: 30 June 2019
Contact: Interested candidates should send their application to vs-jobs (at) uni-ulm.de.
More information: https://www.uni-ulm.de/in/vs/
DarkMatter Group - Abu Dhabi
- Analyze, evaluate and target any weaknesses security systems which range from single crypto-primitives to entire protocols, from classical ciphers to the newest lightweight or post-quantum schemes.
- Develop mathematical and statistical models to analyze and solve security data problems.
- Be involved in the analysis of developed cryptosystems within DarkMatter products.
- Collaborate with skillful software, hardware, and telecommunication engineers.
- Work closely with the secure communications team and other teams in the organization.
- Work with latest software and test your code on state-of-the-art High-Performance Devices.
- Conduct research in theoretical and practical cryptanalysis.
- Attend personalized in-house trainings with top cryptographers and international conferences and workshops.
*To bring your dream to life, you’ll need:
- PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics, Computer Science or any relevant Engineering degree.
- Extensive experience in theoretical and practical cryptanalysis
Valuable publications in the field of cryptanalysis
- Extensive experience in performing side-channel attacks.
- Deep understanding of various hardware security vulnerabilities and threats.
Closing date for applications: 29 July 2019
Contact: Mehdi Messaoudi
Talent Acquisition Specialist
mehdi.messaoudi (at) darkmatter.ae
More information: https://boards.greenhouse.io/darkmatter/jobs/1090184
DarkMatter Group - Abu Dhabi
- Design, implement and deploy quantum-safe cryptographic algorithms covering both but not limited to: key exchange algorithms and digital signature schemes.
- Conduct research and development in lattice-based, code-based or hash-based cryptosystems.
- Perform security assessments of either crypto-primitives or cryptosystems at the theoretical and implementation level.
- Work closely with the secure communications team and other teams in the organization to design end-to-end secure communication protocols using state-of-the art and customized cryptographic algorithms and primitives.
- Be involved in the integration of developed cryptosystems within DarkMatter products.
To bring your dream to life, you’ll need:
- PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics or Computer Science.
- Extensive experience developing in various programming languages.
Closing date for applications: 29 August 2019
Contact: Mehdi Messaoudi
Talent Acquisition Specialist
mehdi.messaoudi (at) darkmatter.ae
More information: https://boards.greenhouse.io/darkmatter/jobs/1030431
Cosmian, Paris, France
Our ambition is to solve the Private Data paradox: how to provide data intelligence to a rapidly rising data economy without compromising privacy.
Job Description
Your main responsibility will be to lead our cryptographic research and development. Cosmian implements the latest research in fully-homomorphic encryption, functional encryption and secure MPC, to provide better protection of privacy.
Your daily mission will include
- managing the collaborations with the academic and research worlds, working with some of the best world cryptographers including the crypto team from École Normale Supérieure Paris,
- understand how their latest research can be leveraged,
- design new implementation algorithms with Cosmian Rust/C++ developers,
- lead certification and/or patenting where appropriate,
- and more generally get our work known and recognized by a larger cryptography community.
The job is full-time and located in Paris, France. Remote work may be envisaged with specific requirements. The package includes stock options.
Required skills/qualifications
You must have a strong background in maths and in cryptography (Master and/or PhD) and must demonstrate
the ability to communicate complex ideas to a less maths-savvy audience.
A working command of French is not mandatory.
Closing date for applications: 1 October 2019
Contact: Bruno GRIEDER, bruno.grieder (at) cosmian.com, +33 6 33 27 46 85
or
Raphaël AUPHAN, raphael.auphan (at) cosmian.com
More information: https://cosmian.com/chief_scientist/
Pompeu Fabra University and Nokia Bell Labs
We are looking for highly motivated young researchers with a Master degree (or equivalent) in Computer Science, Engineering, Mathematics, Economics or related disciplines, willing to study and do research at the leading edge of blockchain technologies.
PhD students will be appointed for 36 months. All the fellowships provide a highly competitive remuneration package, complemented by mobility and family allowances (for eligible candidates).
The evaluation committee will assess candidates on a continuous basis until the positions are filled. First evaluation will be at the end of May , and afterwards regularly at the end of every month until all candidates are selected. Once evaluated will be contacted, and if pre-selected interviews will be arranged either via telco or by inviting you to one of the partners. Selected ESRs will be published on the website.
Closing date for applications:
Contact: bandit (at) upf.edu
More information: https://www.upf.edu/web/bandit
01 May 2019
Kaliningrad, Russia, 15 July - 19 July 2019
29 April 2019
Jeju, South Korea, 21 August - 24 August 2019
Submission deadline: 31 May 2019
Notification: 30 June 2019
Gandhinagar, India, 3 December - 7 December 2019
Submission deadline: 30 June 2019
Notification: 1 August 2019
28 April 2019
Yue Qin, Chi Cheng, Jintai Ding
Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
Julien Lavauzelle, Julian Renner
27 April 2019
Aurore Guillevic, Simon Masson, Emmanuel Thomé
Guangpu Gao, Dongdai Lin, Wenfen Liu , Yongjuan Wang
Harsh Chaudhari, Arpita Patra, Ajith Suresh
In the semi-honest setting, our protocol requires communication of $2$ ring elements for a ring of integers modulo $2^l$ per multiplication gate during the online phase, attaining a per-party cost of less than one element. This is achieved for the first time in the regime of 3PC. In the malicious setting, our protocol requires communication of $4$ elements per multiplication gate during the online phase, beating the state-of-the-art protocol by $5$ elements. We boost the security of our protocols in the malicious setting to achieve fairness without affecting the stated online complexity.
We apply our techniques from $3$PC in the regime of secure server-aided machine-learning (ML) inference for a range of prediction functions-- linear regression, linear SVM regression, logistic regression, and linear SVM classification. Our setting considers a model-owner with trained model parameters and a client with a query, with the latter willing to learn the prediction of her query based on the model parameters of the former. The inputs and computation are outsourced to a set of three non-colluding servers. Our constructions catering to both semi-honest and the malicious world, invariably perform better than the existing constructions.
Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
Subsequently, we use our game-playing framework to prove quantum indifferentiability of the sponge construction, assuming a random internal function or a random permutation. Our results upgrade post-quantum security of SHA-3 to the same level that is proven against classical adversaries.
Florian Bourse, Olivier Sanders, Jacques Traoré
In this paper, we present new solutions for the problem of secure integer comparison in both of these settings. The underlying idea for both schemes is to avoid decomposing the integers in binary in order to improve the performances. Our fully homomorphic based solution is inspired by Bourse et al, and makes use of the fast bootstrapping techniques recently developpedto obtain scalability for large integers while preserving high efficiency. On the other hand, our solution to the original Millionaires' problem is inspired by the protocol of Carlton et al, based on partially homomorphic encryption. We tweak their protocol in order to minimize the number of interactions required, while preserving the advantage of comparing non-binary integers.
Both our techniques provide efficient solutions to the problem of secure integer comparison for large (even a-priori unbounded in our first scenario) integers with minimum interaction.
Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
We adapt this method to train many models simultaneously using the SIMD capabilities of the CKKS scheme. We also performed a thorough validation of this iterative method and evaluated its suitability both as a generic method for computing logistic regression models, and specifically for GWAS.
Raghvendra Rohit
In particular, if $2n$ is the squeezing rate then the preimage security is approximately $(\text{log\textsubscript{2}}(\frac{3}{4}))^{-n} \times 2^{\frac{3n}{4}} \times (\text{log\textsubscript{2}}(3))^{\frac{n}{2}}$. For $n = 64$, 96 and 128, the former bound translates to $2^{125.28}$, $2^{187.92}$ and $2^{250.57}$, respectively.