IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
28 August 2020
Hemi Leibowitz, Amir Herzberg, Ewa Syta, Sara Wrótniak
ePrint ReportMohammad Sadeq Dousti, Alptekin Küpçü
ePrint ReportPrasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
ePrint ReportYihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
ePrint ReportArthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
ePrint Report27 August 2020
Jyotirmoy Pramanik, Avishek Adhikari
ePrint ReportFukang Liu, Takanori Isobe, Willi Meier
ePrint ReportUniversity of Twente, The Netherlands
Job PostingThe Services and Cybersecurity (SCS) group at the University of Twente invites applications for a 4-year PhD position in evidence-based security response.
We are looking for candidates with a solid background in network and system security.
More information and the link to apply:
https://www.utwente.nl/en/organization/careers/!/1097214/full-time-phd-position-in-evidence-based-security-response
Deadline for applications: 30 September 2020, 23:59 CET
Closing date for applications:
Contact: Dr. Andreas Peter (a.peter@utwente.nl)
More information: https://www.utwente.nl/en/organization/careers/!/1097214/full-time-phd-position-in-evidence-based-security-response
26 August 2020
Runchao Han, Jiangshan Yu, Haoyu Lin
ePrint ReportTim Beyne, Chaoyun Li
ePrint ReportWe focus on low-data attacks, since these are the most relevant for typical use-cases of LowMC. In addition, this implies that our attacks can not be prevented by limiting the amount of data that can be encrypted using the weak tweak pair.
Despite our findings, we believe that the MALICIOUS framework can be used to create backdoored variants of LowMC provided that the parameters are modified.
Yang Yu, Michail Moraitis, Elena Dubrova
ePrint ReportXiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
ePrint ReportHannah Davis, Felix Günther
ePrint ReportPrior work gave reductions of both protocols' security to the underlying building blocks that were loose (in the number of users and/or sessions), so loose that they gave no guarantees for practical parameters. Adapting techniques by Cohn-Gordon et al. (Crypto 2019), we give reductions for SIGMA and TLS 1.3 to the strong Diffie-Hellman problem which are tight, and prove that this problem is as hard as solving discrete logarithms in the generic group model. Leveraging our tighter and fully-quantitative bounds, we meet the protocols' targeted security levels when instantiated with standardized curves and improve over prior bounds by up to over 80 bits of security across a range of real-world parameters.
Craig Gotsman, Kai Hormann
ePrint ReportHu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
ePrint ReportJunqing Gong, Haifeng Qian
ePrint Report- our first scheme is based on bilateral DLIN (decisional linear) assumption as Gay's scheme and the ciphertext is 15% shorter;
- our second scheme based on SXDH assumption and bilateral DLIN assumption is more efficient; it has 67% shorter ciphertext than previous SXDH-based scheme with selective indistinguishability security by Baltico et al. [CRYPTO 17]; the efficiency is comparable to their second scheme in the generic group model.
Technically, we roughly combine Wee's ``secret-key-to-public-key'' compiler [TCC 17] with Gay's paradigm [PKC 20]. We avoid (partial) function-hiding inner-product functional encryption used in Gay's work and make our schemes conceptually simpler.
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
ePrint ReportIn this paper, we present the first bit-vector differential model for the n-bit modular addition by a constant input. Our model contains O(log_2(n)) basic bit-vector constraints and describes the binary logarithm of the differential probability. We also represent an SMT-based automated method to look for differential characteristics of ARX, including constant additions, and we provide an open-source tool ArxPy to find ARX differential characteristics in a fully automated way. To provide some examples, we have searched for related-key differential characteristics of TEA, XTEA, HIGHT, and LEA, obtaining better results than previous works. Our differential model and our automated tool allow cipher designers to select the best constant inputs for modular additions and cryptanalysts to evaluate the resistance of ARX ciphers against differential attacks.
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
ePrint ReportBrakerski, Doettling, Garg, and Malavolta [EUROCRYPT 2020] showed a construction of iO obtained by combining certain natural \emph{homomorphic} encryption schemes. However, their construction was heuristic in the sense that security argument could only be presented in the random oracle model. In a beautiful recent work, Gay and Pass [ePrint 2020] showed a way to remove the heuristic step. They obtain a construction proved secure under circular security of natural homomorphic encryption schemes --- specifically, they use homomorphic encryption schemes based on LWE and DCR, respectively. In this work, we remove the need for DCR-based encryption and obtain a result solely from the circular security of LWE-based encryption schemes.