IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
11 February 2021
Worcester Polytechnic Institute
Job Posting- Design of extended features for lattice based post-quantum schemes.
- Attacks / countermeasures for post-quantum schemes.
- Efficient software and hardware implementation of post-quantum schemes.
Closing date for applications:
Contact: Berk Sunar, sunar@wpi.edu
Professor, Department of Electrical and Computer Engineering
Vernam Applied Crypto and Cybersecurity Lab
Worcester Polytechnic Institute USA
More information: http://vernam.wpi.edu/positions/
10 February 2021
Juan Garay, Yu Shen
ePrint ReportIn this paper we provide the first formal cryptographic analysis of Bitcoin Cashs target recalculation functions against all possible adversaries. We follow the analytical approach developed in the Bitcoin backbone protocol [Eurocrypt 2015 and follow-ups], of first establishing basic properties of the blockchain data structure, from which the properties of a robust transaction ledger (namely, Consistency and Liveness) can be derived. However, the more active target recalculation mechanism as well as the more pronounced fluctuation of the mining population (due in part to miners behavior of switching chains towards achieving higher expected rewards) require new analytical tools.
We perform our analysis in the bounded-delay network model with dynamic participation of miners, of both ASERT and SMA (Bitcoin Cashs current and former recalculation functions, respectively) and conclude that in order to satisfy security (namely, properties satisfied except with negligible probability in the security parameter) considerably larger parameter values should be used with respect to the ones used in practice.
Muah Kim, Onur Gunlu, Rafael F. Schaefer
ePrint ReportLéo Ducas, Marc Stevens, Wessel van Woerden
ePrint ReportWe obtain new computational records, reaching dimension $180$ for the SVP Darmstadt Challenge improving upon the previous record for dimension $155$. This computation ran for $51.6$ days on a server with $4$ NVIDIA Turing GPUs and $1.5$TB of RAM. This corresponds to a gain of about two orders of magnitude over previous records both in terms of wall-clock time and of energy efficiency.
Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst
ePrint ReportIn this paper, we present a new system with access control key updates and direct user revocation, that are beneficial features in IoT. Access control is done using Ciphertext-Policy Attribute-Based Encryption where attributes represent roles of devices within their networks. Moreover, we devise a novel approach, based on a binary tree, to append time credentials. This allows us to find an interesting trade-off between key update frequency and user revocation list length, as well as stressing time-sensitive data exchanged in IoT environments. The security of our scheme is proved under the Decisional Bilinear Diffie-Hellman Exponent assumption.
Future work will focus on the implementation and analysis of our solution, in order to confirm that the latter is fully deployable in IoT networks.
Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
ePrint ReportIn this work, we initiate the investigation of order-fairness in the permissionless setting and provide two protocols that realize it. Our protocols work in a synchronous network and use an underlying longest-chain blockchain. As an added contribution, we show that any fair ordering protocol achieves a powerful zero-block confirmation property, through which honest transactions can be securely confirmed even before they are included in any block.
Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
ePrint ReportChris Brzuska, Eric Cornelissen, Konrad Kohbrok
ePrint ReportWe need to tackle this complex challenge as a community. Thus, the Internet Engineering Task Force (IETF) has created a working group with the goal of developing a sound standard for a continuous asynchronous key-exchange protocol for dynamic groups that is secure and remains efficient for large group sizes. The current version of the Messaging Layer Security (MLS) security protocol is in a feature freeze, i.e., no changes are made in order to provide a stable basis for cryptographic analysis. The key schedule and TreeKEM design are of particular concern since they are crucial to distribute and combine several keys to achieve PCS.
In this work, we provide a computational analysis of the MLS key schedule, TreeKEM and their composition, as specified in Draft 11 of the MLS RFC. The analysis is carried out using the State Separating Proofs methodology [9], and showcases the flexibility of the approach, enabling us to provide a full computational analysis shortly after Draft 11 was published.
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
ePrint ReportMasayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
ePrint ReportMarco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
ePrint ReportRavital Solomon, Ghada Almashaqbeh
ePrint Report08 February 2021
-
Event CalendarSubmission deadline: 23 November 2021
-
Event CalendarSubmission deadline: 1 September 2021
-
Event CalendarSubmission deadline: 1 June 2021
-
Event CalendarSubmission deadline: 1 March 2021
TU Delft, Netherlands
Job PostingAs one of the best engineering universities, TU Delft provides excellent future career training and opportunities, research environment and facilities to international and national academic researchers. Competitive salary, tax benefit and welfare package will be provided. Note the start date of the post-doc and PhD could be flexible but no later than the end of this year (2021).
Applicants should prepare and send their CVs, certificates, and transcripts to the following contact email.
Closing date for applications:
Contact: Dr. R. Wang
University of Westminster
Job PostingThe Centre for Parallel Computing (CPC) at the University of Westminster is looking for a Research Associate in Cloud Security to carry out research mainly focusing on digital twins and smart factories security (as part of several EU research projects).
The successful candidate will carry out tasks in relation to the design and development of novel secure and privacy-preserving cloud/edge/fog orchestration solutions and is expected to contribute to writing project deliverables and research papers. We expect candidates to have a strong research background in network security and/or applied cryptography. Proven research in areas such as trusted computing, cloud security, safety verification, security verification, data privacy, cyber-physical and internet of things security and cloud or mobile security will be considered as a plus.
The Centre for Parallel Computing is one of the leading research centres in distributed and parallel computation technologies. In particular, the CPC is engaged in research in Distributed Computing Infrastructures such as edge-fog-cloud ecosystems, specifically concentrating on the secure and automated deployment, orchestration and scalability of a large variety of applications in such environments. The CPC has a well-established track record of securing research funding in large-scale collaborative research projects, leading and contributing to more than 15 projects in the last 10 years.
Salary: £35,743 to £40,646 per annum
Closing date for applications:
Contact: Tamas Kiss
More information: https://vacancies.westminster.ac.uk/hrvacancies/default.aspx?id=50052971
Visa Research
Job PostingWorking on Cryptography research at Visa is a unique opportunity at a time when the payments industry is undergoing a digital transformation, and with security technologies as the critical enabler for a growing number of emerging payment models and usage scenarios. We offer you the opportunity to be at the center of innovation in the payments industry and set the security direction for Visa and the future payment ecosystem.
As a Research Scientist you will work with a team to conduct world-class security research and contribute to the long-term research agenda for digital payments, as well as deliver innovative technologies and insights to Visa's strategic products and business. As an integral team member of the extended Research team, you will work on research and development activities with fellow researchers, and work closely with product and technology teams to ensure the successful creation and application of disruptive and innovative security technologies.
More information: https://usa.visa.com/careers/job-details.jobid.743999733735539.deptid.868588.html
Closing date for applications:
Contact: Apply online at: https://usa.visa.com/careers/job-details.jobid.743999733735539.deptid.868588.html
More information: https://usa.visa.com/careers/job-details.jobid.743999733735539.deptid.868588.html