IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
02 September 2020
Tampere University
The Network and Information Security Group is currently looking for several motivated and talented PostDoctoral researchers to contribute to research projects related to applied cryptography, hardware security, security and privacy. The successful candidates will primarily be working on the following topics (but not limited to):
- Differential Privacy;
- Functional Encryption;
- Privacy-Preserving Analytics;
- Privacy-Preserving Machine Learning;
- Searchable Encryption and data structures enabling efficient search operations on encrypted data;
- Processing of encrypted data in outsourced and untrusted environments;
- IoT Security and Applications to Smart Cities.
Programming skills is a must.
The positions are principa research-focused. Activities include:
- Conducting both theoretical and applied research;
- Design of secure and/or privacy-preserving protocols;
- Software development and validation;
- Reading and writing scientific articles;
- Presentation of the research results at seminars and conferences in Finland and abroad;
- Acquiring (or assisting in acquiring) further funding.
Successful candidates will be working in EU and industrial research projects. Topics will be spanning from the theoretical foundations of cryptography to the design and implementation of provable secure communication protocols with direct applications to smart cities, cloud computing and eHealth.
To apply please send the following:
- Your latest CV;
- A research statement (max 2 pages long);
- The three best papers you have co-authored.
Closing date for applications:
Contact:
- Antonis Michalas (Provable Security and Privacy): antonios.michalas@tuni.fi
01 September 2020
Daniel Shumow
João Diogo Duarte
Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
In this paper, we propose a variant of MuSig in which signers generate their nonce deterministically as a pseudorandom function of the message and all signers' public keys and prove that they did so by providing a non-interactive zero-knowledge proof to their cosigners. The resulting scheme, which we call MuSig-DN, is the first Schnorr multi-signature scheme with deterministic signing. Therefore its signing protocol is robust against failures in the randomness generation as well as attacks trying to exploit the statefulness of the signing procedure, e.g., virtual machine rewinding attacks. As an additional benefit, a signing session in MuSig-DN requires only two rounds instead of three as required by all previous Schnorr multi-signatures including MuSig. To instantiate our construction, we identify a suitable algebraic pseudorandom function and provide an efficient implementation of this function as an arithmetic circuit. This makes it possible to realize MuSig-DN efficiently using zero-knowledge proof frameworks for arithmetic circuits which support inputs given in Pedersen commitments, e.g., Bulletproofs. We demonstrate the practicality of our technique by implementing it for the secp256k1 elliptic curve used in Bitcoin.
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
Santi J. Vives
Ben Smyth
Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
Jean-Philippe Aumasson, Omer Shlomovits
Although the TSS concept is not new, this is the first time that so many TSS implementations are written and deployed in such a critical context, where all liquidity reserves could be lost in a minute if the crypto fails. Furthermore, TSS schemes are sometimes extended or tweaked to best adapt to their target use case---what could go wrong?
This paper, based on the authors' experience with building and analyzing TSS technology, describes three different attacks on TSS implementations used by leading organizations. Unlike security analyses of on-paper protocols, this work targets TSS as deployed in real applications, and exploits logical vulnerabilities enabled by the extra layers of complexity added by TSS software. The attacks have concrete applications, and could for example have been exploited to empty an organization's cold wallet (typically worth at least an 8-digit dollar figure). Indeed, one of our targets is the cold wallet system of the biggest cryptocurrency exchange (which has been fixed after our disclosure).
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
Arpita Patra, Divya Ravi, Swati Singla
This work nearly settles the exact round complexity of two classes of BoBW protocols differing on the security achieved in the honest-majority setting, namely god and fn respectively, under the assumption of no setup (plain model), public setup (CRS) and private setup (CRS + PKI or simply PKI). The former class necessarily requires the number of parties to be strictly more than the sum of the bounds of corruptions in the honest-majority and dishonest-majority setting, for a feasible solution to exist. Demoting the goal to the second-best attainable security in the honest-majority setting, the latter class needs no such restriction.
Assuming a network with pair-wise private channels and a broadcast channel, we show that 5 and 3 rounds are necessary and sufficient for the class of BoBW MPC with fn under the assumption of `no setup' and `public and private setup' respectively. For the class of BoBW MPC with god, we show necessity and sufficiency of 3 rounds for the public setup case and 2 rounds for the private setup case. In the no setup setting, we show the sufficiency of 5 rounds, while the known lower bound is 4. All our upper bounds are based on polynomial-time assumptions and assume black-box simulation. With distinct feasibility conditions, the classes differ in terms of the round requirement. The bounds are in some cases different and on a positive note at most one more, compared to the maximum of the needs of the honest-majority and dishonest-majority setting. Our results remain unaffected when security with abort and fairness are upgraded to their identifiable counterparts.
Stefano Barbero, Emanuele Bellini, Rusydi Makarim
Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
The monomial prediction technique can be regarded as a purification of the definitions of the division properties without resorting to external multisets. This algebraic formulation gives more insights into division properties and inspires new search strategies. With the monomial prediction, we obtain the exact algebraic degrees of TRIVIUM up to 834 rounds for the first time. In the context of cube attacks, we are able to explore a larger search space in limited time and recover the exact algebraic normal forms of complex superpolies with the help of a divide-and-conquer strategy. As a result, we identify more cubes with smaller dimensions, leading to improvements of some near-optimal attacks against 840-, 841- and 842-round TRIVIUM.
Gao, Yiwen, Zhou, Yongbin
ZUC Design Team
31 August 2020
Due to the COVID-19 pandemic, ASIACRYPT 2020 has been converted into an all-digital event with slightly changed dates. It is now scheduled to take place online Monday-Friday, December 7-11. The conference proceedings will be published according to the original schedule.
Details about the new all-digital event, including its scientific program and registration process, will be communicated at a later time via the usual IACR channels and the conference website.
The board wishes safety and health to all our members during these challenging times.
Gaithersburg, USA, 19 October - 21 October 2020
Submission deadline: 14 September 2020
Notification: 28 September 2020
-
Submission deadline: 31 March 2021
Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
To register for CHES 2020, please visit the CHES 2020 registration site. Registration for CHES 2020 is free for IACR members; non-IACR members will be asked to pay the IACR membership fee (USD 50 regular, USD 25 for students) during registration.
You can follow any updates on twitter @2020CHES.