IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
02 March 2021
Naval Postgraduate School, Monterey, California, USA
Job PostingClosing date for applications:
Contact: Geoff Xie, Search Committee Chair
More information: https://main.hercjobs.org/jobs/14480892
University of Bern
Job PostingPostdoc positions are available in the Cryptology and Data Security research group at the Institute of Computer Science, University of Bern, led by Christian Cachin.
Our research addresses all aspects of security in distributed systems, especially cryptographic protocols, consistency, consensus, and cloud-computing security. We are particularly interested in blockchains, distributed ledger technology, cryptocurrencies, and their security and economics.
Candidates should have a strong background in computer science. They should like conceptual, rigorous thinking for working theoretically, or be interested in building innovative systems for working practically. Demonstrated expertise in cryptography, distributed computing, or blockchain technology is a plus. Applicants should hold a Ph.D., with contributions in the relevant research topics.
Positions are available starting immediately and come with a competitive salary. The selection process runs until suitable candidates have been found. The University of Bern conducts excellent research and lives up its vision that “Knowledge generates value”. The city of Bern lies in the center of Switzerland and offers some of the highest quality of life worldwide.
If you are interested, please apply be sending email with one single PDF file and subject line set to Application for Postdoc addressed directly to Prof. Christian Cachin at crypto (at) inf.unibe.ch.
Closing date for applications:
Contact: For more information, please contact Christian Cachin (https://crypto.unibe.ch/cc/).
More information: https://crypto.unibe.ch/jobs/
Hasso-Plattner-Institute, University of Potsdam (Potsdam/Berlin, Germany)
Job PostingThe Cybersecurity - Identity Management group at the Hasso-Plattner-Institute (HPI), University of Potsdam is looking for a motivated PhD student or Postdoc in the area of cryptography and privacy.
Your future tasks- Development and analysis of provably secure cryptographic protocols for real-world problems. Topics of interest include (but are not limited to):
- Privacy-enhancing technologies
- Password-based cryptography
- Foundations and solutions for real-world cryptography
- Publish and present results at top-tier international conferences
- Participate in teaching activities
- Master’s degree (or PhD for postdoctoral position) in Computer Science, Mathematics, or a related area by the time of appointment
- Profound knowledge in the areas of cryptography and IT security (for postdoctoral candidates proven in the form of publications in these areas)
- Excellent English language skills
We look forward to your application including a CV and motivation letter. Applications for the PhD position should also include a list of attended Master courses and grades, whereas applications for the Postdoc position should include contact information for two references. Please submit your application documents in a single PDF file via email.
Closing date for applications:
Contact: Anja Lehmann (anja.lehmann [at] hpi.de)
More information: https://hpi.de/lehmann/home.html
University of Luxembourg
Job PostingThe APSIA group led by Peter Y.A. Ryan is offering a post-doc position in a research project on future-proofing privacy of secure electronic voting led by Johannes Müller. The position is fully funded for 2 years and may be extended up to 5 years.
Your RoleThe candidate will shape research directions and produce results in one or more of the following topics:
- Protocol security
- Post-quantum cryptography
- Information-theoretic security
- Implementation of security protocols
- A PhD degree in Computer Science, Applied Mathematics or a related field
- Competitive research record in (applied) cryptography or protocol security
- Experience with secure e-voting or protocol security proofs is a plus
- Experience with post-quantum cryptography or information-theoretic security is a plus
- Experience with implementation of security protocols is a plus
Closing date for applications:
Contact: Johannes Müller
More information: https://recruitment.uni.lu/en/details.html?id=QMUFK026203F3VBQB7V7VV4S8&nPostingID=57676&nPostingTargetID=80219&mask=karriereseiten&lg=UK
DTU Denmark
Job PostingClosing date for applications:
Contact: Professor Lars Ramkilde Knudsen, lrkn@dtu.dk. Please use the above link when applying for the position. Applications sent by email will not be considered.
More information: https://www.dtu.dk/english/about/job-and-career/vacant-positions/job?id=fa3c2175-2322-42c9-b822-167147cf4e70
01 March 2021
Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
ePrint ReportOur construction relies on new protocols for secure fixed-point exponentiation and correlated matrix multiplications. Our secure exponentiation construction avoids expensive bit decomposition and achieves orders of magnitude improvement in both online and offline costs over state of the art works. As a result, the dominant cost for our secure Poisson regression are matrix multiplications with one fixed matrix. We introduce a new technique, called correlated Beaver triples, which enables many such multiplications at the cost of roughly one matrix multiplication. This further brings down the cost of secure Poisson regression.
We implement our constructions and show their extreme efficiency. Our secure exponentiation for 20-bit fractional precision takes less than 0.07ms. One iteration of Poisson regression on a dataset with 10,000 samples with 1000 binary features, requires 16.47s offline time, 23.73s online computation and 7.279MB communication. For several real datasets this translates into training that takes seconds and only a couple of MB communication.
Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
ePrint ReportÁdám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
ePrint ReportTsz Hon Yuen, Handong Cui, Xiang Xie
ePrint ReportWhen applied to two-party ECDSA, we can lower the bandwidth of the key generation algorithm by 47%, and the running time for the key generation and signing algorithms are boosted by about 35% and 104% respectively. When applied to threshold ECDSA, our first scheme is more optimized for the key generation algorithm (about 70% lower bandwidth and 70% faster computation in key generation, at a cost of 20% larger bandwidth in signing), while our second scheme has an all-rounded performance improvement (about 60% lower bandwidth, 27% faster computation in key generation without additional cost in signing).
Andrey Kim, Yuriy Polyakov, Vincent Zucca
ePrint ReportMore precisely, we propose an improved variant of BFV where the encryption operation is modified to significantly reduce the noise growth, which makes the BFV noise growth somewhat better than for BGV (in contrast to prior results showing that BGV has smaller noise growth for larger plaintext moduli). We also modify the homomorphic multiplication procedure, which is the main bottleneck in BFV, to reduce its algorithmic complexity. Our work introduces several other novel optimizations, including lazy scaling in BFV homomorphic multiplication and an improved BFV decryption procedure in the Residue Number System (RNS) representation. We also develop a usable variant of BGV as a more efficient alternative to BFV for common practical scenarios.
We implement our improved variants of BFV and BGV in PALISADE and evaluate their experimental performance for several benchmark computations. Our results suggest that BGV is faster for intermediate and large plaintext moduli, which are often used in practical scenarios with ciphertext packing, while BFV is faster for small plaintext moduli.
Tjerand Silde, Martin Strand
ePrint ReportAdditional contributions include expanded definitions and a description of how anonymous tokens can improve the privacy in dp3t-like digital contact tracing applications. We also show how to create efficient and conceptually simple tokens with public metadata and public verifiability from pairings.
Martin R. Albrecht, Russell W. F. Lai
ePrint ReportBy constructing families of $(s,t)$-subtractive sets $S$ of size $n = $ poly over cyclotomic rings $\mathcal{R} = \mathbb{Z}[\zeta_{p^\ell}]$ for prime $p$, we construct Schnorr-like lattice-based proofs of knowledge for the SIS relation ${A} \cdot \vec{x} = s \cdot \vec{y} \bmod q$ with $O(1/n)$ knowledge error, and $s = 1$ in case $p = $ poly. Our technique slots naturally into the lattice Bulletproof framework from Crypto'20, producing lattice-based succinct arguments for NP with better parameters.
We then give matching impossibility results constraining $n$ relative to $s$, which suggest that our Bulletproof-compatible protocols are optimal unless fundamentally new techniques are discovered. Noting that the knowledge error of lattice Bulletproofs is \(\Omega(\log k/n)\) for witnesses in \(\mathcal{R}^k\) and subtractive set size \(n\), our result represents a barrier to practically efficient lattice-based succinct arguments in the Bulletproof framework.
Beyond these main results, the concept of $(s,t)$-subtractive sets bridges group-based threshold cryptography to lattice settings, which we demonstrate by relating it to distributed pseudorandom functions.
28 February 2021
X-Logos LLC, Colorado Springs, CO, USA
Job PostingCompany's mission: Original solutions for the security and economic demands of data and data owners.
Seniority level: Open to discussion. Lack of industry experience can be compensated by academic achievements.
Industry: Information Technology, Cybersecurity, Data Science.
Available employment types: full-time, part-time, in-person, remote.
Responsibilities:
- Stay current with advances in cryptography, related areas, and the underlying mathematical subjects.
- Understand and implement existing cryptographic constructions in the literature and industry.
- Help to design and to evaluate new cryptographic schemes and protocols.
Minimum Qualifications:
- Ph.D. in Computer Science, Mathematics, Engineering, or another related field.
- Fluency in at least one of the following programming languages: C, C++, Python, Ruby, Go, Java.
- Reasonable proficiency in several topics in discrete mathematics (in particular, logic, group theory, probability, number theory, and linear algebra).
Preferred:
- Track record of peer-reviewed publications related to cryptography and mathematics in general.
- Experience with cryptanalysis.
Benefits:
- Work with challenging problems for deploying real-world applications of significant impact in the industry.
- Direct contact with crypto experts in in-depth discussions and analysis of ongoing projects.
- Learn from veterans from the industry of new technologies.
- Incentives for writing scientific papers, patents, and participating in academic conferences and other related events.
- Budget for investing in continued education (books, courses, seminars, certifications, among others).
- Visa sponsorship (when applicable).
- Dental, vision, and health insurance (for full-time employees).
- Salary to be defined according to the seniority and employment level.
Closing date for applications:
Contact: David Silva, david@x-logos.com
DFINITY
Job Posting- Cryptography
- Distributed systems
- Formal verification
- Networking
- Computer
- Operating systems
- Embedded system
- Pen testing
Closing date for applications:
Contact: Jens Groth: jens AT dfinity.org
More information: https://dfinity.org/careers
DFINITY, Zurich and Bay Area
Job PostingClosing date for applications:
Contact: Jens Groth: jens AT dfinity.org
More information: https://dfinity.org/careers
University of Tartu, Estonia
Job PostingWe are searching for candidates who are enthusiastic about driving forward the field of quantum cryptography (including post-quantum crypto), especially provable quantum security. The research takes place in the context of an ERC project that targets formally verified quantum cryptographic proofs.
For more information, see the link below. Please forward this to anyone potentially interested, and do not hesitate to contact me.
Closing date for applications:
Contact: Dominique Unruh, unruh@ut.ee
More information: https://crypto.cs.ut.ee/Main/PostdocInPost-QuantumCryptography
24 February 2021
Hanshen Xiao, Srinivas Devadas
ePrint ReportWe study the applications of such a framework from generalized linear regression models to modern learning techniques, such as deep learning. On the information theoretical privacy side, we compare three privacy interpretations: ambiguity, statistical indistinguishability (Differential Privacy) and PAC inference resistance, and precisely describe the information leakage of our framework. We show the advantages of this new random transform approach with respect to underlying privacy guarantees, computational efficiency and utility for fully connected neural networks.
Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
ePrint ReportShuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
ePrint ReportFirst, we propose a secure, efficient exponential Bernoulli sampling algorithm. It can be applied to Gaussian samplers based on rejection samplings. We apply it to FALCON, a candidate of round 3 of the NIST post-quantum cryptography standardization project, and reduce its signature generation time by 13.66%-15.52%.
Second, we develop a new Gaussian sampler based on rejection sampling. Our Algorithm can securely sample from Gaussian distributions with different standard deviations and arbitrary centers. We apply it to PALISADE (S&P'18), an open-source lattice cryptography library. The new implementation of trapdoor sampling in PALISADE has better performance while resisting timing attacks.
Third, we improve the efficiency of the COSAC sampler (PQC'20). The new COSAC sampler is 1.46x-1.63x faster than the original and has the lowest expected number of trials among all Gaussian samplers based on rejection samplings. But it needs a more efficient algorithm sampling from the normal distribution to improve its performance.