IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
01 March 2021
Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
ePrint ReportÁdám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
ePrint ReportTsz Hon Yuen, Handong Cui, Xiang Xie
ePrint ReportWhen applied to two-party ECDSA, we can lower the bandwidth of the key generation algorithm by 47%, and the running time for the key generation and signing algorithms are boosted by about 35% and 104% respectively. When applied to threshold ECDSA, our first scheme is more optimized for the key generation algorithm (about 70% lower bandwidth and 70% faster computation in key generation, at a cost of 20% larger bandwidth in signing), while our second scheme has an all-rounded performance improvement (about 60% lower bandwidth, 27% faster computation in key generation without additional cost in signing).
Andrey Kim, Yuriy Polyakov, Vincent Zucca
ePrint ReportMore precisely, we propose an improved variant of BFV where the encryption operation is modified to significantly reduce the noise growth, which makes the BFV noise growth somewhat better than for BGV (in contrast to prior results showing that BGV has smaller noise growth for larger plaintext moduli). We also modify the homomorphic multiplication procedure, which is the main bottleneck in BFV, to reduce its algorithmic complexity. Our work introduces several other novel optimizations, including lazy scaling in BFV homomorphic multiplication and an improved BFV decryption procedure in the Residue Number System (RNS) representation. We also develop a usable variant of BGV as a more efficient alternative to BFV for common practical scenarios.
We implement our improved variants of BFV and BGV in PALISADE and evaluate their experimental performance for several benchmark computations. Our results suggest that BGV is faster for intermediate and large plaintext moduli, which are often used in practical scenarios with ciphertext packing, while BFV is faster for small plaintext moduli.
Tjerand Silde, Martin Strand
ePrint ReportAdditional contributions include expanded definitions and a description of how anonymous tokens can improve the privacy in dp3t-like digital contact tracing applications. We also show how to create efficient and conceptually simple tokens with public metadata and public verifiability from pairings.
Martin R. Albrecht, Russell W. F. Lai
ePrint ReportBy constructing families of $(s,t)$-subtractive sets $S$ of size $n = $ poly over cyclotomic rings $\mathcal{R} = \mathbb{Z}[\zeta_{p^\ell}]$ for prime $p$, we construct Schnorr-like lattice-based proofs of knowledge for the SIS relation ${A} \cdot \vec{x} = s \cdot \vec{y} \bmod q$ with $O(1/n)$ knowledge error, and $s = 1$ in case $p = $ poly. Our technique slots naturally into the lattice Bulletproof framework from Crypto'20, producing lattice-based succinct arguments for NP with better parameters.
We then give matching impossibility results constraining $n$ relative to $s$, which suggest that our Bulletproof-compatible protocols are optimal unless fundamentally new techniques are discovered. Noting that the knowledge error of lattice Bulletproofs is \(\Omega(\log k/n)\) for witnesses in \(\mathcal{R}^k\) and subtractive set size \(n\), our result represents a barrier to practically efficient lattice-based succinct arguments in the Bulletproof framework.
Beyond these main results, the concept of $(s,t)$-subtractive sets bridges group-based threshold cryptography to lattice settings, which we demonstrate by relating it to distributed pseudorandom functions.
28 February 2021
X-Logos LLC, Colorado Springs, CO, USA
Job PostingCompany's mission: Original solutions for the security and economic demands of data and data owners.
Seniority level: Open to discussion. Lack of industry experience can be compensated by academic achievements.
Industry: Information Technology, Cybersecurity, Data Science.
Available employment types: full-time, part-time, in-person, remote.
Responsibilities:
- Stay current with advances in cryptography, related areas, and the underlying mathematical subjects.
- Understand and implement existing cryptographic constructions in the literature and industry.
- Help to design and to evaluate new cryptographic schemes and protocols.
Minimum Qualifications:
- Ph.D. in Computer Science, Mathematics, Engineering, or another related field.
- Fluency in at least one of the following programming languages: C, C++, Python, Ruby, Go, Java.
- Reasonable proficiency in several topics in discrete mathematics (in particular, logic, group theory, probability, number theory, and linear algebra).
Preferred:
- Track record of peer-reviewed publications related to cryptography and mathematics in general.
- Experience with cryptanalysis.
Benefits:
- Work with challenging problems for deploying real-world applications of significant impact in the industry.
- Direct contact with crypto experts in in-depth discussions and analysis of ongoing projects.
- Learn from veterans from the industry of new technologies.
- Incentives for writing scientific papers, patents, and participating in academic conferences and other related events.
- Budget for investing in continued education (books, courses, seminars, certifications, among others).
- Visa sponsorship (when applicable).
- Dental, vision, and health insurance (for full-time employees).
- Salary to be defined according to the seniority and employment level.
Closing date for applications:
Contact: David Silva, david@x-logos.com
DFINITY
Job Posting- Cryptography
- Distributed systems
- Formal verification
- Networking
- Computer
- Operating systems
- Embedded system
- Pen testing
Closing date for applications:
Contact: Jens Groth: jens AT dfinity.org
More information: https://dfinity.org/careers
DFINITY, Zurich and Bay Area
Job PostingClosing date for applications:
Contact: Jens Groth: jens AT dfinity.org
More information: https://dfinity.org/careers
University of Tartu, Estonia
Job PostingWe are searching for candidates who are enthusiastic about driving forward the field of quantum cryptography (including post-quantum crypto), especially provable quantum security. The research takes place in the context of an ERC project that targets formally verified quantum cryptographic proofs.
For more information, see the link below. Please forward this to anyone potentially interested, and do not hesitate to contact me.
Closing date for applications:
Contact: Dominique Unruh, unruh@ut.ee
More information: https://crypto.cs.ut.ee/Main/PostdocInPost-QuantumCryptography
24 February 2021
Hanshen Xiao, Srinivas Devadas
ePrint ReportWe study the applications of such a framework from generalized linear regression models to modern learning techniques, such as deep learning. On the information theoretical privacy side, we compare three privacy interpretations: ambiguity, statistical indistinguishability (Differential Privacy) and PAC inference resistance, and precisely describe the information leakage of our framework. We show the advantages of this new random transform approach with respect to underlying privacy guarantees, computational efficiency and utility for fully connected neural networks.
Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
ePrint ReportShuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
ePrint ReportFirst, we propose a secure, efficient exponential Bernoulli sampling algorithm. It can be applied to Gaussian samplers based on rejection samplings. We apply it to FALCON, a candidate of round 3 of the NIST post-quantum cryptography standardization project, and reduce its signature generation time by 13.66%-15.52%.
Second, we develop a new Gaussian sampler based on rejection sampling. Our Algorithm can securely sample from Gaussian distributions with different standard deviations and arbitrary centers. We apply it to PALISADE (S&P'18), an open-source lattice cryptography library. The new implementation of trapdoor sampling in PALISADE has better performance while resisting timing attacks.
Third, we improve the efficiency of the COSAC sampler (PQC'20). The new COSAC sampler is 1.46x-1.63x faster than the original and has the lowest expected number of trials among all Gaussian samplers based on rejection samplings. But it needs a more efficient algorithm sampling from the normal distribution to improve its performance.
Tatsuki Ono, Song Bian, Takashi Sato
ePrint ReportGuilherme Perin, Lichao Wu, Stjepan Picek
ePrint ReportThis paper proposes using a pruning strategy and recently proposed Lottery Ticket Hypothesis to improve the deep learning-based SCA. We demonstrate that we can find smaller neural networks that perform on the level of larger networks, where we manage to reduce the number of weights by more than 90% on average. Additionally, we show that pruning can help prevent overfitting and the effects of imbalanced data, reaching top attack performance for small networks when larger networks do not manage to break the target at all.