IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
26 March 2020
Steve Thakur
ePrint ReportHongda Li, Peifang Ni, Dongxue Pan
ePrint ReportIn this paper, we focus on zero-knowledge protocols for NP with low round complexity under the augmented black-box simulation technique, in which the simulator has access to the verifier's secret information, and obtain positive results on 3-round zero-knowledge proofs and 2-round zero-knowledge arguments and proofs. More precisely, our contributions are five-fold: (i) we propose the notion of generalized claw-free function and the notion of trapdoor generalized claw-free function, and then we show a construction of trapdoor generalized claw-free function under the discrete logarithm assumption and the knowledge of exponent assumption, (ii) we propose the notion of completely extractable bit-commitment and give a construction of it from trapdoor generalized claw-free functions, (iii) we present a 3-round zero-knowledge proof for NP based on the completely extractable bit-commitment schemes and Yao's garbling circuit technique, (iv) we show a 2-round zero-knowledge argument for NP based on indistinguishable obfuscator, (v) we transform the basic 2-round honest verifier zero-knowledge proof protocol for quadratic non-residue into a 2-round zero-knowledge proof protocol.
Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
ePrint ReportFengrong Zhangand Nastja Cepak, Enes Pasalicand Yongzhuang Wei
ePrint ReportYibin Xu, Yangyu Huang, Jianhua Shao
ePrint ReportHowever, most cryptocurrencies fail to show inimitability and their meanings in the real world. As a result, they usually start off as favourites but quickly become the outcasts of the digital asset market.
The blockchain society attempts to anchor the value of cryptocurrency with real values by employing smart contracts and link it with computation resources and the digital-productivity that have value and demands in the real world. But their attempts have some undesirable effects due to a limited number of practical applications. This limitation is caused by the dilemma between high performance and decentralisation (universal joinability). The emerging of blockchain sharding models, however, has offered a possible solution to address this dilemma.
In this paper, we explore a financial model for blockchain sharding that will build an active link between the value of cryptocurrency and computation resources as well as the market and labour behaviours. Our model can adjust the price of resources and the compensation for maintaining a system based on those behaviours. We anchor the value of cryptocurrency by the amount of computation resources participated in and give the cryptocurrency a meaning as the exchange between computation resources globally. Finally, we present a working example which, through financial regularities, regulates the behaviour of anonymous participants, also incents/discourages participation dynamically.
Hiro Midas
ePrint Report24 March 2020
Ruhr-Universität Bochum, Germany
Job PostingThe successful applicant is expected to cooperate with the Horst Görtz IT Security Research Department (HGI) and especially with the recently granted Cluster of Excellence CASA. The recently founded Max Planck Institute for Cybersecurity and Privacy offers additional possibilities for collaboration.
International visibility through publications and projects and above-average third-party funding are expected, as well as the willingness and ability to lead and participate in large collaborative projects. Positive evaluation as a junior professor or equivalent academic achievement (e.g. Habilitation) or significant post-doctoral research contributions and teaching experience is as much required as the willingness to participate in the self-governing bodies of the RUB. Furthermore, a strong commitment to academic teaching, the readiness to participate in interdisciplinary research and the proven experience in successful acquisition of third-party funds are expected. Ruhr-Universität Bochum is an equal opportunity employer and offers a dual career program (see https://www.dcnruhr.de/en for details).
Closing date for applications:
Contact: Applications including a CV, copies of academic certificates, list of publications, list of self-raised third-party funds, teaching record, and a statement of research interests should be sent by email to Prof. Dr.-Ing. Thomas Musch
Bewerbung-dds@ei.rub.de
More information: https://casa.rub.de/ and https://www.ei.rub.de/
Ruhr University Bochum, Germany
Job PostingIn the context of the Cluster of Excellence CASA (Cyber-Security in the Age of Large-ScaleAdversaries), the Department of Electrical Engineering and Information Sciences at Ruhr-Universität Bochum invites applications for the position of an Assistant Professor (W1) for Software Security with Tenure Track to start as soon as possible.
The candidate is expected to establish an excellent research program, to conduct and publish innovative research, be an effective lecturer and mentor of both undergraduate and graduate students, and have an interest to participate in institutional and professional processes. We are looking for scientists with an internationally visible research profile in computer security, in at least one of the following subfields:
The successful applicant is expected to cooperate with the Horst Görtz IT Security Research Department (HGI) and especially with the recently granted Cluster of Excellence CASA. The recently founded Max Planck Institute for Cybersecurity and Privacy offers additional possibilities for collaboration.
We expect:
The position includes a tenure track option, after a positive evaluation the position will be turned into a tenured professorship (W2). Complete applications including CV, copies of academic certificates, list of publications, list of self-raised third-party funds, teaching record, and a statement of research interests should be sent by email to the
Closing date for applications:
Contact: Dean of the Faculty of Electrical Engineering and Information Technology Prof. Dr.-Ing. Thomas Musch
Bewerbung-sosi@ei.rub.de
More information: https://www.stellenwerk-bochum.de/jobboerse/professuren-w1-assistant-professor-software-security-tenure-track-bo-2020-03
Cybernetica AS, Information Security Research Institute, Tartu, Estonia
Job PostingClosing date for applications:
Contact: Jan Willemson, PhD - jan.willemson@cyber.ee
More information: https://cyber.ee/careers/vacancies/#researcher-in-remote-electronic-voting
University of Exeter, UK
Job PostingTwo fully funded PhD scholarships for EU/UK applicants are available in the Security and Trust of Advanced Systems Group (Prof. Achim Brucker and Dr. Diego Marmsoler) at the Department of Computer Science of the University of Exeter, UK.
We are looking for enthusiastic and outstanding Computer Science or Mathematics students with a strong background in some of the following topics:
- safety or security of (software) systems,
- formal modelling or formal reasoning/verification,
- program analysis or program verification,
- language-based security
- semantics of programming languages,
- theorem proving, model checking,
- cryptographic protocols,
- distributed systems (e.g., blockchain),
- specification-based testing, and
- design and implementation of security architectures.
This award provides annual funding to cover UK/EU tuition fees and a tax-free stipend. For students who pay UK/EU tuition fees the award will cover the tuition fees in full, plus at least £15,009 per year tax-free stipend. The studentship will be awarded on the basis of merit for 3.5 years of full-time study.
For more details, please consult the official advertisement. The closing date for applications is midnight on 1 May 2020.
Closing date for applications:
Contact: Achim Brucker (http://emps.exeter.ac.uk/computer-science/staff/ab1185)
More information: http://www.exeter.ac.uk/studying/funding/award/?id=3887
University of Exeter, UK
Job PostingAs part of the expansion of the Department of Computer Science at the University of Exeter [1], we are recruiting for a Lecturer in Cybersecurity. The lecturer will be part of the newly formed Security and Trust of Advanced Systems Group [2].
We are looking for a candidate with an outstanding research record in any area related to cyber security (information security) such as (but not limited to):
- access control
- usable security
- software/application security
- formal methods for security
- language-based security/privacy
- secure programming
- information flow
- security protocols
- network security
- security of distributes systems
- human aspects of security
- hardware security
- security economics
- security-by-design
- applied cryptography
- privacy-enhancing technologies
- threat hunting, security analytics
- threat modelling
- forensics, reverse engineering
- trustworthy AI/ML
- security/penetration testing
You will have a PhD or equivalent in Cybersecurity, Computer Science, Mathematics, Engineering or a related area. Please refer to the job description for full details.
We understand security and safety entangled concepts: in most modern systems one cannot be achieved without the other. Hence, we encourage also candidates working in related domains such as safety, dependability, resilience, or reliability to apply.
Please apply by 8th of April 2020! See the full announcement and application details at
https://jobs.exeter.ac.uk/hrpr_webrecruitment/wrd/run/ETREC107GF.open?VACANCY_ID=803965SHQd&WVID=3817591jNg&LANG=USA
We are happy to do online/remote interviews. Feel free to contact me for informal inquiries about the post.
Closing date for applications:
Contact: Achim Brucker (http://emps.exeter.ac.uk/computer-science/staff/ab1185)
More information: https://jobs.exeter.ac.uk/hrpr_webrecruitment/wrd/run/ETREC107GF.open?VACANCY_ID=803965SHQd&WVID=3817591jNg&LANG=USA
Lochau, Austria, 6 October - 9 October 2020
Event CalendarSubmission deadline: 15 May 2020
Notification: 24 June 2020
Singapore, Singapore, 22 September - 25 September 2020
Event CalendarSubmission deadline: 5 June 2020
Notification: 22 July 2020
London, United Kingdom, 21 May 2020
Event Calendar22 March 2020
Estuardo Alpirez Bock, Alexander Treff
ePrint ReportDaniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
ePrint ReportOnur Gunlu, Efe Bozkir, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
ePrint Report20 March 2020
George Teseleanu
ePrint Report19 March 2020
UC Berkeley
Job PostingClosing date for applications:
Contact: raluca.popa@berkeley.edu
Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
ePrint ReportOur edaBits are similar to the daBits technique introduced by Rotaru et al. (Indocrypt 2019). However, our main observations are that (1) applications that benefit from daBits can also benefit from edaBits in the same way, and (2) we can generate edaBits directly in a much more efficient way than computing them from a set of daBits. Technically, the second contribution is much more challenging, and involves a novel cut and choose technique that may be of independent interest, and requires taking advantage of natural tamper-resilient properties of binary circuits that occur in our construction to obtain the best level of efficiency. Finally, we show how our edaBits can be applied to efficiently implement various non-linear protocols of interest, and we thoroughly analyze their correctness for both signed and unsigned integers.
The results of this work can be applied to any corruption threshold, although they seem best suited to dishonest majority protocols such as SPDZ. We implement and benchmark our constructions, and experimentally verify that our technique yield a substantial increase in efficiency. Our edaBits save in communication by a factor that lies between 2 and 170 for secure comparisons with respect to a purely arithmetic approach, and between 2 and 60 with respect to using daBits. Improvements in throughput per second are more subdued but still as high as a factor of 47. We also apply our novel machinery to the tasks of biometric matching and convolutional neural networks, obtaining a noticeable improvement as well.