IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
17 December 2020
Atsuki Momose, Ling Ren
ePrint ReportThis paper provides two results towards closing this gap. Both protocols have a quadratic communication complexity and have different trade-offs in resilience and assumptions. The first protocol achieves the optimal resilience of $f < n/2$ but requires a trusted setup for threshold signature. The second protocol achieves near optimal resilience $f \le (1/2 - \varepsilon)n$ in the standard PKI model.
Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
ePrint ReportAfter defining compact certificates, we demonstrate an efficient compact certificate scheme. We then show how to implement such a scheme in a decentralized setting over an unreliable network and in the presence of adversarial parties who wish to disrupt certificate creation. Our evaluation shows that compact certificates are 50--280$\times$ smaller and 300--4000$\times$ cheaper to verify than a natural baseline approach.
Yadi Ye, Leyou Zhang, Yi Mu
ePrint ReportMohammad Amin Rakeei, Farokhlagha Moazami
ePrint ReportAmira Barki, Aline Gouget
ePrint ReportAnna M. Johnston, Rathna Ramesh
ePrint ReportSri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
ePrint ReportThis work formalizes VTS, presents efficient constructions compatible with BLS, Schnorr, and ECDSA signatures, and experimentally demonstrates that these constructions can be employed in practice. On a technical level, we design an efficient cut-and-choose protocol based on the homomorphic time-lock puzzles to prove the validity of a signature encapsulated in a time-lock puzzle. We also present a new efficient {range proof} protocol that significantly improves upon existing proposals in terms of the proof size, and is also of independent interest.
While VTS is a versatile tool with numerous existing applications, we demonstrate VTS's applicability to resolve three novel challenging issues in the space of cryptocurrencies. Specifically, we show how VTS is the cryptographic cornerstone to construct: (i) Payment channel networks with improved on-chain unlinkability of users involved in a transaction, (ii) multi-party signing of transactions for cryptocurrencies without any on-chain notion of time and (iii) cryptocurrency-enabled fair multi-party computation protocol.
Claude Carlet, Pierrick Méaux
ePrint ReportRyan Karl, Jonathan Takeshita, Taeho Jung
ePrint ReportMahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
ePrint Report15 December 2020
NTNU, Norway
Job PostingClosing date for applications:
Contact: Dr. Anamaria Costache, anamaria.costache@ntnu.no
More information: https://www.jobbnorge.no/en/available-jobs/job/197509/phd-candidate-in-cryptography
IMDEA Software Institute
Job PostingWho should apply?
Applicants should be MSc students in computer science, mathematics or a related discipline. The applicants should in particular have strong background in mathematics and some background and interest in cryptography. Good teamwork and communication skills, including excellent spoken and written English are also required.
Working at IMDEA Software
The position is based in Madrid, Spain, where the IMDEA Software Institute is situated. The institute provides for travel expenses and an internationally competitive stipend. The working language at the institute is English.
Dates
The internship duration is intended to be for 4-6 months (with some flexibility). The starting period would be March 2021 or later.
How to apply?
Applicants interested in the position should submit their application at https://careers.software.imdea.org/ using reference code 2020-12-intern-mpc. Deadline for applications is January 25th, 2021.
For enquiries about the position, please contact: Ignacio Cascudo, ignacio.cascudo (at) imdea.org
Closing date for applications:
Contact: Ignacio Cascudo
More information: https://careers.software.imdea.org/
Ant Group
Job PostingCandidates are expected to be developing cryptographic libraries and/or conduct related researches with a growing team of researchers and engineers. Candidates are likely to be working in one of the following directions:
- homomorphic encryptions
- multiparty computations
- zero-knowledge proofs
Bonus points:
- experience in developing cryptographic libraries
- top tier publications in cryptography or security
- experience with Rust
- Beijing
- Hangzhou
Closing date for applications:
Contact: Zhenfei Zhang
Max Plank Institutes in Computer Science, Germany
Job PostingThe Max Planck Institutes for Informatics (Saarbruecken), Software Systems (Saarbruecken and Kaiserslautern), and Security and Privacy (Bochum) offer research internships in all areas of Computer Science. An internship at a Max Planck Institute is a way to pursue world-class research in computer science! Our internships are also an excellent way to explore research or new research areas for the first time.
Internships are open to exceptional Bachelors, Masters, and Doctoral students worldwide, as well as exceptional individuals from industry interested in gaining academic research experience in computer science. Intern positions are limited and admissions are very competitive
We welcome interns all year round, but most interns prefer the summer months. Every intern works directly with an assigned faculty mentor at one of the participating institutes. Internship projects are based on the intern’s academic interests, maturity and prior experience.
All interns receive a monthly stipend, free (shared) housing, and travel to- and from- the institute hosting the internship. A typical internship lasts 12 to 14 weeks, but longer internships are possible.
Application Deadlines for Summer Internships:
- Early Deadline: 31 December (for internships starting in May or June)
- Late Deadline: 31 January (for internships starting in July or August)
More information can be obtained at https://www.cis.mpg.de/internships
We understand that travel restrictions due to the ongoing COVID-19 pandemic may prevent interns from traveling to host institutes right now. In such a case, the intern and the mentor may agree mutually to complete the internship remotely. The intern will still be paid the monthly stipend.
Closing date for applications:
Contact: Catalin Hritcu
More information: https://www.cis.mpg.de/internships
14 December 2020
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
ePrint ReportThomas Pornin
ePrint Report- Element encoding is canonical, and verified upon decoding. For a 2n-bit group (with n-bit security), encoding size is 2n + 1 bits, i.e. as good as compressed points on classic prime order curves.
- Unified and complete formulas allow secure and efficient computations in the group.
- Efficiency is on par with twisted Edwards curves, and in some respects slightly better; e.g. half of double-odd curves have formulas for computing point doublings with only six multiplications (down to 1M+5S per doubling on some curves).
We describe here various formulas and discuss implementations. We also define two specific parameter choices for curves with 128-bit security, called do255e and do255s. Our own implementations on 64-bit x86 (Coffee Lake) and low-end ARM Cortex M0+ achieve generic point multiplication in 76696 and 2.19 million cycles, respectively, with curve do255e.
Javad Doliskani
ePrint Report13 December 2020
Daniel Escudero, Anders Dalskov
ePrint ReportSiyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
ePrint ReportWe study the possibility of designing non-interactive LWE-based protocols with polynomial LWE-modulus. To this end,
We identify and formalize simple non-interactive and polynomial LWE-modulus variants of existing protocols, where Alice and Bob simultaneously exchange one or more (ring) LWE samples with polynomial LWE-modulus and then run individual key reconciliation functions to obtain the shared key.
We point out central barriers and show that such non-interactive key-exchange protocols are impossible if:
1) the reconciliation functions first compute the inner product of the received LWE sample with their private LWE secret. This impossibility is information theoretic.
2) one of the reconciliation functions does not depend on the error of the transmitted LWE sample. This impossibility assumes hardness of LWE.
We give further evidence that progress in either direction, of giving an LWE-based NIKE protocol or proving impossibility of one will lead to progress on some other well-studied questions in cryptography.
Overall, our results show possibilities and challenges in designing simple (ring) LWE-based non-interactive key exchange protocols.
Xiaolu Hou, Jakub Breier, Shivam Bhasin
ePrint ReportIn this paper, we target a specific bit permutation vulnerability in the block cipher GIFT that allows the attacker to mount a key recovery attack. We present a novel SCA methodology called DCSCA - Differential Ciphertext SCA, which follows principles of differential fault analysis, but instead of the usage of faults, it utilizes SCA and statistical distribution of intermediate values. We simulate the attack on a publicly available bitslice implementation of GIFT, showing the practicality of the attack. We further show the application of the attack on GIFT-based AEAD schemes (GIFT-COFB, ESTATE, HYENA, and SUNDAE-GIFT) proposed for the NIST LWC competition. DCSCA can recover the master key with $2^{13.39}$ AEAD sessions, assuming 32 encryptions per session.