IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
03 June 2020
Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo , Fatemeh Shirazi, Alistair Stewart, Gavin Wood
Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
Anne Broadbent, Raza Ali Kazmi
Jeffrey Burdges, Luca De Feo
We give an instantiation of Delay Encryption by modifying Boneh and Frankiln's IBE scheme, where we replace the master secret key by a long chain of isogenies, as in the isogeny VDF of De Feo, Masson, Petit and Sanso. Similarly to the isogeny-based VDF, our Delay Encryption requires a trusted setup before parameters can be safely used; our trusted setup is identical to that of the VDF, thus the same parameters can be generated once and shared for many executions of both protocols, with possibly different delay parameters.
We also discuss several topics around delay protocols based on isogenies that were left untreated by De Feo et al., namely: distributed trusted setup, watermarking, and implementation issues.
Anish Saxena, Biswabandan Panda
Erik-Oliver Blass, Florian Kerschbaum
Pedro Branco, Nico Döttling, Paulo Mateus
In this work, we present efficient two-round protocols for OLE based on the Learning with Errors (LWE) assumption. Our first protocol for OLE is secure against malicious unbounded receivers and semi-honest senders. The receiver's first message is reusable, meaning that it can be reused over several executions of the protocol, and it may carry information about a batch of inputs, and not just a single input. We then show how we can extend the above protocol to provide malicious security for both parties, albeit at the cost of reusability.
David Knichel, Pascal Sasdrich, Amir Moradi
In this work, we present a new framework to analyze and verify masked implementations against various security notions using different security models as reference. In particular, our framework - which directly processes the resulting gate-level netlist of a hardware synthesis - particularly relies on Reduced Ordered Binary Decision Diagrams (ROBDDs) and the concept of statistical independence of probability distributions. Compared to existing tools, our framework captivates due to its simplicity, accuracy, and functionality while still having a reasonable efficiency for many applications and common use-cases.
Péter Kutas, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
Zhiguo Wan, Xiaotong Liu
In this paper, we propose ContactChaser, a simple but effective contact tracing scheme based on group signature, to achieve strong security and privacy protection for users. ContactChaser only requires a health authority to issue group private keys to users for only once, without frequently updating keys with the authority. It helps the authority to find out the close contacts of infected people, but just leaks the minimum information necessary for contact tracing to the health authority. Specially, the contact relationship is protect against the authority, which only knows the close contacts of infected people. ContactChaser is able to prevent most attacks, especially relay and replay attacks, so that it can effectively avoid false alerts and reduce unreported contacts. We give a detailed analysis of ContactChasers security and privacy properties as well as its performance. It is expected ContactChaser can contribute to the design and development of contact tracing schemes.
Vivek Arte, Mihir Bellare
Daniele Di Tullio, Manoj Gyawali
Duke Leto, The Hush Developers
In privacy zdust we trust. If dust can attack us, dust can protect us. Sietch Mottos
Paolo Zappalà, Marianna Belotti , Maria Potop-Butucaru , Stefano Secci
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
Marek Wójtowicz
02 June 2020
The IACR and PKC Steering Committee are pleased to announce the 2020 Test-of-Time award for papers published PKC.
PKC is the International Conference on Practice and Theory in Public Key Cryptography, which was founded in 1998 and became an official IACR event in 2003. The Test-of-Time award recognizes outstanding papers, published in PKC about 15 years ago, making a significant contribution to the theory and practice of public key cryptography, preferably with influence either on foundations or on the practice of the field.
The 2020 award will be given on Wednesday June 3rd at PKC in a virtual Award Ceremony, for papers published in the conference's initial years of early 2000s and late 1990s. In the first few years a number of papers from a few different initial years of PKC can be recognized. Thereafter, the award will typically recognize one year at a time with one or two papers.
The recipients of the 2020 award are:
- On the Security of ElGamal Based Encryption , by Yiannis Tsiounis, and Moti Yung, PKC 1998.
- A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System, by Ivan Damgård, and Mads Jurik, PKC 2001.
- Threshold Signatures , Multisignatures and Blind Signatures based on the Gap-Diffie-Hellman-Group Signature Scheme, by Alexandra Boldyreva, PKC 2003.
Congratulations to these authors for their impactful work! More information about the award can be found at https://iacr.org/meetings/pkc/test_of_time_award/
30 May 2020
Hvar, Croatia, 17 September - 19 September 2020
Submission deadline: 10 June 2020