IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
17 January 2020
Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
ePrint ReportPascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
ePrint ReportPratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
ePrint ReportWe design, implement, and evaluate Delphi, a secure prediction system that allows two parties to execute neural network inference without revealing either party's data. Delphi approaches the problem by simultaneously co-designing cryptography and machine learning. We first design a hybrid cryptographic protocol that improves upon the communication and computation costs over prior work. Second, we develop a planner that automatically generates neural network architecture configurations that navigate the performance-accuracy trade-offs of our hybrid protocol. Together, these techniques allow us to achieve a 22x improvement in online prediction latency compared to the state-of-the-art prior work.
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
ePrint ReportChangshe Ma, Yiping Gu, Hongfei Li
ePrint ReportTianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
ePrint ReportOrhun Kara, Muhammed F. Esgin
ePrint ReportHaibat Khan, Benjamin Dowling, Keith M. Martin
ePrint ReportAlexander Chepurnoy, Amitabh Saxena
ePrint ReportIn this work, we propose a concrete example of such a mechanism which is using collateralized smart contracts. Our approach allows miners to bypass non-outsourceable Proof-of-Work schemes if the underlying blockchain platform supports smart contracts in a sufficiently advanced language. In particular, the language should allow access to the PoW solution.
At a high level, our approach requires the miner to lock collateral covering the reward amount and protected by a smart contract that acts as an escrow. The smart contract has logic that allows the pool to collect the collateral as soon as the miner collects any block reward. We propose two variants of the approach depending on when the collateral is bound to the block solution. Using this, we show how to bypass previously proposed non-outsourceable Proof-of-Work schemes (with the notable exception for strong non-outsourceable schemes) and show how to build mining pools for such schemes.
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
ePrint Report16 January 2020
CYBERCRYPT: Copenhagen, Zurich or Munich
Job PostingWe are an international company with branches in Copenhagen, Zurich and Munich. We are looking to strengthen our team of in-house cryptographic experts in either of our locations.
The right person will work on internal and external high-end projects in the area of cryptology. This will involve cutting-edge cryptographic design, cryptanalysis, software development, contributions to product development, customer trainings, security evaluations, etc.
A PhD degree in symmetric-key cryptology (block ciphers, stream ciphers, MACs or hash functions) or a closely related area is a requirement. Proficiency in the efficient software implementations of cryptographic algorithms for such platforms as modern Intel or ARM CPUs is a plus. Postdoctoral research experience in symmetric-key cryptology as well as teaching experience is also an advantage.
We expect that our new Senior Cryptographer can generate value for the company and for our customers. An important part of your job is to take technical responsibility for projects and to be a great team player who is a pleasure to work with. You take the initiative, provide high quality and always deliver on time.
We offer a highly attractive compensation, a permanent contract, a dynamic international working environment, a conference travel package, relocation benefits, an employee success participation plan, as well as significant time and budget to conduct cryptologic research.
Applications will be reviewed on the ongoing basis. Planned target date for employment is 1 April 2020 or sooner.
Please send your CV incl. the list of publications and a motivational letter to jobs@cyber-crypt.com. You can also use this email address if you have any questions about the position.
Closing date for applications:
Contact: Dr. Andrey Bogdanov
More information: https://www.cyber-crypt.com/company/#team
15 January 2020
Queen's University Belfast, Center for Secure Information Techonlogies; Belfast, UK
Job PostingClosing date for applications:
Contact: Dr. Jinguang Han (j.han@qub.ac.uk)
More information: https://www.qub.ac.uk/courses/postgraduate-research/phd-opportunities/post-quantum-anonymous-credential.html
CNRS, IRISA, Rennes, France
Job PostingResearch topic While malware detection and mitigation research are now trending, a lot of challenges and unsolved problems still remain. Recently, sophisticated malware designers invented techniques to circumvent software detection techniques. A new direction consists in using unintentionally emitted hardware side-channel information. The big advantage of this information is the non-detection by malware designers. Still, those approaches have to be established in real-world scenarios and efficient analysis techniques developed and implemented. We are currently building up a realistic IoT malware side-channel analysis platform which gives us first interesting new insights.
Joining our team you will
- infect IoT devices with malware samples,
- be responsible for the maintenance of the side-channel workbench,
- derive and develop efficient implementations of analysis algorithms,
- drive top-quality research and publish in A*/A-class security and malware conferences.
Prerequisites We are looking for team players who are motivated and able to drive top-quality research. The area of research lies between several fields and we expect at least competences in one of them:
- embedded devices/side-channel analysis, and/or
- statistics, machine learning, deep learning, and/or
- malware analysis.
Additionally, an ideal candidate should have:
- Research engineer: MS degree in a related field, with 1-3 years of work experience,
- PostDoc: Ph.D. in a related field
- good programming skills,
- good level in written and spoken English,
- motivation to save the world.
Closing date for applications:
Contact: Annelie Heuser (annelie.heuser@irisa.fr) with a CV, cover letter, and references.
Arpita Patra, Ajith Suresh
ePrint ReportAn extensive benchmarking of BLAZE for the aforementioned ML algorithms over a 64-bit ring in both WAN and LAN settings shows massive improvements over ABY3. Concretely, we observe improvements up to $\mathbf{333\times}$ for Linear Regression, $\mathbf{146 \times}$ for Logistic Regression and $\mathbf{301\times}$ for Neural Networks over WAN. Similarly, we show improvements up to $\mathbf{2610\times}$ for Linear Regression, $\mathbf{820\times}$ for Logistic Regression and $\mathbf{303\times}$ for Neural Networks over LAN.
Aggelos Kiayias, Saad Quader, Alexander Russell
ePrint ReportPedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
ePrint ReportD. Robissout, G. Zaid, B. Colombier, L. Bossuet, A. Habrard
ePrint ReportMichail Moraitis, Elena Dubrova
ePrint ReportMatthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
ePrint ReportYupu Hu, Siyue Dong, Xingting Dong
ePrint ReportAccording to the assumptions above, Aigis-Enc designers claim that the CPA security of Aigis-Enc is approximately equal to that of the symmetrical LWE scheme in the same scale, and the decryption failure probability of Aigis-Enc is far below that of the symmetrical LWE scheme in the same scale.
In this paper, we make a thorough comparison between Aigis-Enc (with the recommended parameters) and the symmetrical LWE encryption scheme in the same scale. Our conclusion is as followed:
(1) The comparison on CPA security. The formers is 160.898, and the latters is 161.836.
(2) The comparison on computation complexity. In key generation phase, the ratio of the former and the latter on sampling amount of distribution \(\left[ {\begin{array}{*{20}{c}} 0&1\\ {\frac{1}{2}}&{\frac{1}{2}} \end{array}} \right]\) is 5:4; In encryption phase, that ratio is 19:14. The other computations remain the same.
(3) The comparison on decryption failure probability. The formers is $2^{-128.699}$, the latter's is $2^{-67.0582}$. The comparison seems to be dramatic. But in fact, we can slightly increase some traffic to keep failure probability unchanged. In other words, by compressing less to keep decryption failure probability unchanged. In specific: we change the parameters \(\left( {{d_1},{d_2},{d_3}} \right)\) from \(\left( {9,9,4} \right)\) to \(\left( {10,10,4} \right)\), which means a large part of the public key remains the same, the small part of the public key changes from 9 bits per entry into 10bits. A large part of the ciphertext changes from 9 bits per entry into 10 bits, the small part of the ciphertext remains the same. As thus, the communication traffic increases less than $\frac{1}{9}$, while the decryption failure probability is lower than $2^{-128.699}$.
We generalize those attacks presented by designers of Aigis-Enc, including primal attacks and dual attacks. More detailedly, our attacks are more extensive, simpler, and clearer. With them, we obtain the optimal attacks and the optimal-optimal attack on Aigis-Enc and the symmetrical LWE scheme in the same scale.