IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
25 September 2020
Hui Zhu, Christian Gehrmann
ePrint Report24 September 2020
Edinburgh, UK, 10 May - 13 May 2021
PKCSubmission deadline: 13 November 2020
23 September 2020
Technology Innovation Institute - Abu Dhabi, UAE
Job Posting
Responsibilities
- Specify, design, implement and deploy cryptographic IP cores (including quantum-secure solutions)
- Conduct research on (but not limited to) efficient cryptographic implementations, implementation attacks and countermeasures, design methodologies and tools
- Perform security reviews of hardware designs and implementations
- Work closely with the integration team and other teams in the organization to design and prototype secure systems and communication protocols
Minimum qualifications:
- BSc, MSc or PhD degree in Cryptography, Computer Science, Engineering or similar degree with 3+ years of relevant work or research
- Thorough knowledge of computer architecture and digital design principles Relevant hardware development experience with a focus on hardware security
- Extensive experience developing for FPGA and/or ASIC platforms in Verilog/VHDL
- Experience writing testbenches and using waveform-based debugging tools
- Solid understanding of cryptography, side-channel analysis attacks and countermeasures
Preferred qualifications: - Knowledge of UVM and assertion-based formal tools
- Understanding of low-power and high-performance techniques
- Understanding of micro-architectural attacks (e.g., Spectre, Meltdown, MDS)
- Hands-on experience integrating IP blocks in complex systems (SoCs)
- Programming skills in C/C++, Python, and/or Tcl
- Hands-on experience with lab equipment (e.g., oscilloscopes, function generators)
Closing date for applications:
Contact: Mehdi Messaoudi
Talent Acquisition Manager
mehdi.messaoudi@tii.ae
Jean Monnet University in Saint-Etienne, Hubert Curien Laboratory, Saint-Etienne, France
Job PostingClosing date for applications:
Contact: fischer(at)univ-st-etienne.fr
More information: https://laboratoirehubertcurien.univ-st-etienne.fr/en/teams/secure-embedded-systems-hardware-architectures/job-opportunities-2.html
Algorand, Inc.
Job PostingYou will be working on a fast-paced, rapidly growing, high-profile project with a significant opportunity for industry-level impact on emerging blockchain and cryptocurrency technologies.
Overseen by Silvio Micali, this opportunity is for one (1) year with the possibility for extension.
Full role description (including responsibilities and qualifications) and application link is available at the further information link.
Interested candidates should submit their application at the further information link along with their CV (including list of publications), one (1) recently published paper relevant to the position responsibilities, and two (2) reference letters. You can share your paper and reference letter via the "Portfolio" link when applying, or upload the files with you CV. This position is available immediately and thus candidates who are already in the US are preferred.
Closing date for applications:
Contact: Regnia O'Brien, Head of People & Talent
More information: https://jobapply.page.link/TNVg
21 September 2020
SICPA - international company with HQ in Lausanne, Switzerland
Job PostingWHAT YOU WILL DO
Shape new concepts and ideas, quickly and iteratively, through prototyping.
Have meaningful impact on the crafting and delivery in the early stages of the idea, and product life cycles.
Collaborate closely with our development team to craft solid foundation for future product development.
Deliver, as part of the team, a prototype.
Deliver a functioning sandbox environment, with goal to identify competitive advantage and help implement that in practice.
Drive cooperation with platform and lab teams.
WHAT WE NEED FROM YOUYou have relevant technical skills gained via formal education (PhD preferred), and/or red/blue team experience.
You have expertise in applied cryptography, long-term security, Multi-Party Computation (MPC), key rotation schemes, SoC, SE, TEE, solving difficult challenges for systems in highly adversarial environments.
Also, you master cryptographic protocols and standards (FIPS, AAL, PKI, NIST, ISO/IEC 27001).
You are curious to solve hard problems, oftentimes with competing priorities, using smartly assembled primitives, protocols and solutions, as well as advise on choice tradeoffs.
Besides being a great listener, you are an educator that acts as an advisor and mentor to team members on your domain of expertise.
You thrive in asynchronous communication environments and can express clearly your ideas and thinking, in writing.
You have a natural ability to explain, communicate and influence a broad audience (from highly technical to managerial), seek and engage in external collaboration with academia or red teams.
Read the full job ad here: https://jobs.sicpa.com/job/Prilly_Floris-%28CH01%29-Senior-Cryptographer/616
Closing date for applications:
Contact: Mrs Iuliana Petcu Talent Acquisition Manager hrrecruitment@sicpa.com
More information: https://jobs.sicpa.com/job/Prilly_Floris-%28CH01%29-Senior-Cryptographer/616737401/
Siemen Dhooghe, Svetla Nikova
ePrint ReportAs tiled models use multi-party computation techniques, countermeasures are typically expensive for software/hardware. This work investigates a tiled countermeasure based on the ISW methodology which is shown to perform significantly better than CAPA for practical parameters.
Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
ePrint ReportThe second result is to prove the security of PRF-based $\mathsf{nEHtM}$; when $\mathsf{nEHtM}$ is based on an $n$-to-$s$ bit random function for a fixed size $s$ such that $1\leq s\leq n$, it is proved to be secure up to any number of MAC queries and $2^s$ verification queries, if (1) $s=n$ and $\mu<2^{\frac{n}{2}}$ or (2) $\frac{n}{2}<s<2^{n-s}$ and $\mu<\max\{2^{\frac{s}{2}},2^{n-s}\}$, or (3) $s\leq \frac{n}{2}$ and $\mu<2^{\frac{n}{2}}$. This result leads to the security proof of truncated $\mathsf{nEHtM}$ that returns only $s$ bits of the original tag since a truncated permutation can be seen as a pseudorandom function. In particular, when $s\leq\frac{2n}{3}$, the truncated $\mathsf{nEHtM}$ is secure up to $2^{n-\frac{s}{2}}$ MAC queries and $2^s$ verification queries as long as $\mu<\min\{2^{\frac{n}{2}},2^{n-s}\}$. For example, when $s=\frac{n}{2}$ (resp. $s=\frac{n}{4}$), the truncated $\mathsf{nEHtM}$ is secure up to $2^{\frac{3n}{4}}$ (resp. $2^{\frac{7n}{8}}$) MAC queries. So truncation might provide better provable security than the original $\mathsf{nEHtM}$ with respect to the number of MAC queries.
Lior Rotem, Gil Segev
ePrint ReportWe put forward the notion of algebraic distinguishers, strengthening the algebraic group model by enabling it to capture decisional problems. Within our framework we then reveal new insights on the algebraic interplay between a wide variety of decisional assumptions. These include the decisional Diffie-Hellman assumption, the family of Linear assumptions in multilinear groups, and the family of Uber assumptions in bilinear groups.
Our main technical results establish that, from an algebraic perspective, these decisional assumptions are in fact all polynomially equivalent to either the most basic discrete logarithm assumption or to its higher-order variant, the $q$-discrete logarithm assumption. On the one hand, these results increase the confidence in these strong decisional assumptions, while on the other hand, they enable to direct cryptanalytic efforts towards either extracting discrete logarithms or significantly deviating from standard algebraic techniques.
Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
ePrint ReportZhengjun Cao , Lihua Liu
ePrint ReportDaniele Di Tullio, Manoj Gyawali
ePrint ReportYongjune Kim, Cyril Guyot, Young-Sik Kim
ePrint ReportHuijia Lin, Ji Luo
ePrint ReportOur schemes are obtained through a general and modular approach that combines a public-key inner product functional encryption satisfying a new security notion called gradual simulation security and an information-theoretic randomized encoding scheme called arithmetic key garbling scheme.
Florian Weber, Andreas Hülsing
ePrint ReportLennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
ePrint ReportWe instantiate our framework with protocols for $N$ parties and security against up to $N-1$ passive corruptions: the MPC protocols of Goldreich-Micali-Wigderson (GMW) in its arithmetic and Boolean version and oblivious transfer (OT)-based BMR (Ben-Efraim et al., CCS'16), as well as novel and highly efficient conversions between them, including a non-interactive conversion from BMR to arithmetic GMW. Moreover, we design a novel garbling technique that saves 20% of communication in the BMR protocol.
MOTION is highly efficient, which we demonstrate in our experiments by measuring its run-times in various network settings with different numbers of parties. For secure evaluation of AES-128 with $N=3$ parties in the high-latency network setting from the OT-based BMR paper, we achieve a 16x better throughput of 16 AES/s using BMR. This shows that the BMR protocol is much more competitive than previously assumed. For $N=3$ parties and full-threshold protocols in the LAN setting, MOTION is 10x-18x faster than the previous best passively secure implementation from the MP-SPDZ framework, and 190x-586x faster than the actively secure SCALE-MAMBA framework. Finally, we show that our framework is highly efficient for privacy preserving neural network inference.
Han Wu, Guangwu Xu
ePrint ReportFor prime $p\equiv 2 \pmod 3$, it is shown that $E_b(\mathbb{F}_p)\cong \mathbb{Z}_{p+1}$. Two efficiently computable isomorphisms are described within the single isomorphism class of groups for representatives $E_1(\mathbb{F}_p)$ and $E_{-3}(\mathbb{F}_p)$
The explicit formulas $\#E_b(\mathbb{F}_p)$ for $p\equiv 1 \pmod p$ are used in searching prime (or almost prime) order Koblitz curves over prime fields. An efficient procedure is described and analyzed. The procedure is proved to be deterministic polynomial time, assuming the Generalized Riemann Hypothesis.
Several tools that are useful in computing cubic residues are also developed in this paper.
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
ePrint ReportIn this work, we propose the first adaptively secure IPE based on the learning with errors (LWE) assumption with sub-exponential modulus size (without resorting to complexity leveraging). Concretely, our IPE supports inner-products over the integers $\mathbb{Z}$ with polynomial sized entries and satisfies adaptively weakly-attribute-hiding security. We also show how to convert such an IPE to an IPE supporting inner-products over $\mathbb{Z}_p$ for a polynomial-sized $p$ and a fuzzy identity-based encryption (FIBE) for small and large universes. Our result builds on the ideas presented in Tsabary (CRYPTO'19), which uses constrained pseudorandom functions (CPRF) in a semi-generic way to achieve adaptively secure ABEs, and the recent lattice-based adaptively secure CPRF for inner-products by Davidson et al. (CRYPTO'20). Our main observation is realizing how to weaken the conforming CPRF property introduced in Tsabary (CRYPTO'19) by taking advantage of the specific linearity property enjoyed by the lattice evaluation algorithms by Boneh et al. (EUROCRYPT'14).