IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 May 2021
University of Birmingham, UK
Job PostingCAP-TEE: Capability Architectures for Trusted Execution
Trusted Execution Environments (TEEs) shield computations using security-sensitive data (e.g. personal data, banking information, or encryption keys) inside a secure "enclave" from the rest of the untrusted operating system. A TEE protects its data and code even if an attacker has gained full root access to the untrusted parts of the system. In this project, we will use capability architectures (as e.g. developed by the CHERI project) to protect TEEs against such state-of-the-art attacks. We address a wide range of threats from software vulnerabilities such as buffer overflows to sophisticated hardware attacks like fault injection. CAP-TEE will provide a strong, open-source basis for the future generation of more secure TEEs: https://cap-tee.org/
The project is led by David Oswald. Our industrial project partners are also devoting time to the project, and the PhD student will have the opportunity to work with them.
The studentship covers a stipend and tuition fees based on UK home student rates (nb: the studentship does not cover the full tuition fees for overseas students.).
Candidates should have a good background in computer science. One focus will be on improving and evaluating the security of capabilty architectures; suitable candidates will hence need a strong background in system-level programming (e.g. using C or C++). We also expect a first-class UG or PG degree in a relevant subject (e.g. computer science or electrical engineering).
How to apply: There is no deadline for applying. The PhD candidate is expected to start in summer/autumn 2021. We will process applications as they arrive. To apply, please send your CV, a transcript with a list of courses and grades, and a description of your research interests to d.f.oswald (at) bham.ac.uk.
Closing date for applications:
Contact: Dr David Oswald
More information: https://www.cs.bham.ac.uk/~oswalddf/phd-projects.php
The University of Manchester, Department of Computer Science, Manchester, UK
Job PostingThis is an exceptional opportunity to join the University of Manchester’s developing work in Cyber Security.
The Department of Computer Science is investing for growth in the Computer Science aspects of Information and Cyber Security. You will contribute to our portfolio of research and teaching in cyber security, and be willing to engage across discipline boundaries to apply your work. This will include engaging with a variety of business stakeholders and national agencies and government departments.
You will be part of a pan-university community contributing to Digital Trust and Security, including – but not restricted to – privacy, trust, data protection (School of Social Sciences), cybercrime, criminals, victims (School of Law) and work place security (Alliance Manchester Business School).
The Department of Computer Science is a leading research institution, and values exceptional researchers. You will publish to the highest standards, secure external research funding, pursue real-world impact, and contribute to the PGR training programmes within the Department.
The Department values exceptional teachers. You will play a key role in maintaining our reputation as an institute of learning – designing and delivering innovative undergraduate (UG) and postgraduate (PG) topics, not only in Cyber Security, but also across the spectrum of Computer Science. Exceptional teachers are encouraged to demonstrate this in their application.
Closing date for applications:
Contact: Enquiries about the vacancy, shortlisting and interviews: Name: Professor Robert Stevens
Email: robert.stevens@manchester.ac.uk
More information: https://www.jobs.manchester.ac.uk/displayjob.aspx?isPreview=Yes&jobid=20096
Isfahan, Iran, 1 September - 2 September 2021
Event CalendarSubmission deadline: 12 June 2021
Notification: 24 July 2021
Virtual event, Anywhere on Earth, 15 November 2021
Event CalendarSubmission deadline: 25 June 2021
Notification: 13 August 2021
University of Florida, Herbert Wertheim College of Engineering, Gainesville, Florida
Job PostingClosing date for applications:
Contact: tehranipoor@ufl.edu
More information: https://facultyjobs.hr.ufl.edu/posting/87357
11 May 2021
Ethereum Foundation (remote)
Job PostingAbout the Role: The candidate will be expected to research cryptographic protocols that will be useful in blockchain applications or more generally. They will additionally dedicate some fraction of their time to projects that more directly benefit Ethereum. There is a lot of flexibility to work on topics they find interesting and also to collaborate with other teams for example in academia. We have a culture of open source and no patents will be put on any work they produce. The role is remote. The position is permanent however the details of the contract will depend on the location and personal circumstances of the candidate.
Requirements: The successful candidate will have a PhD in either cryptography, consensus, or a closely related field. They will have a strong track record of publishing in top tier conferences and a clear vision of how they wish to continue their research for the benefit of blockchain and other communities. They will be comfortable working both independently and as part of a larger team. The candidate should be able to prototype their protocols/algorithms in a programming language of their choice.
The focus of this position is on Zero Knowledge Virtual Machines. Experience with the following is an advantage but not required:- Zero-Knowledge proof schemes such as Pairing-based SNARKs (Groth16, PLONK), Bulletproofs, STARKs, etc.
- Different arithmetization schemes such as AIR, R1CS, PLONK.
- Different methods of implementing recursive SNARKs.
- Implementing RAM in SNARKs, e.g. TinyRAM.
- Knowledge of how virtual machines work and how to scale them.
Interested candidates that have more diverse skills but do not fit the above requirements should also consider applying as there may be other roles within the foundation.
Closing date for applications:
Contact: Please email cryptography@ethereum.org with a CV and a short document (either 1 or 2 pages) detailing how you have personally contributed to each of your publications. If you have contributed to any open source projects then additionally discuss this in the short document or provide links.
10 May 2021
Benny Applebaum, Eyal Golombek
ePrint ReportAll the above sparsification results preserve statistical-zero knowledge provided that this property holds against a \emph{cheating verifier}. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communication from the prover by $R-F$ bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of $2^{R-F}$. Here $F$ is a new measure of \emph{accessible bit complexity} of an HVZK proof system that ranges from 0 to $R$, where a maximal grade of $R$ is achieved when zero-knowledge holds against a ``semi-malicious'' verifier that maliciously selects its random tape and then plays honestly. Consequently, we show that some classical HVSZK proof systems, like the one for the complete Statistical-Distance problem (Sahai and Vadhan, JACM 2003) admit randomness sparsification with no penalty.
Along the way we introduce new notions of pseudorandomness against interactive proof systems, and study their relations to existing notions of pseudorandomness.
David Heath, Vladimir Kolesnikov, Stanislav Peceny
ePrint ReportIn this work, we show that multiplication triples can be re-used across conditional branches. For a circuit with $b$ branches, each having $n$ AND gates, we need only a total of $n$ triples, rather than the typically required $b\cdot n$. Because preprocessing triples is often the most expensive step in protocols that use them, this significantly improves performance.
Prior work similarly amortized oblivious transfers across branches in the classic GMW protocol (Heath et al., Asiacrypt 2020, [HKP20]). In addition to demonstrating conditional improvements are possible for a different class of protocols, we also concretely improve over [HKP20]: their maximum improvement is bounded by the topology of the circuit. Our protocol yields improvement independent of topology: we need triples proportional to the size of the program's longest execution path, regardless of the structure of the program branches.
We implemented our approach in C++. Our experiments show that we significantly improve over a naive protocol and over prior work: for a circuit with $16$ branches and in terms of total communication, we improved over naive by $12\times$ and over [HKP20] by an average of $2.6\times$.
Our protocol is secure against the semi-honest corruption of $p-1$ parties.
Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
ePrint ReportMarten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
ePrint ReportHanshen Xiao, Srinivas Devadas
ePrint ReportThe privacy property we provide is information-theoretic in nature, Probably Approximately Correct (PAC) approximation resistance (abbreviated to PAC security). Each owner transforms its data and labels using a private transform. The server combines samples from each data set into expanded samples with corresponding expanded labels -- we refer to this step as Task Augmentation. The server can be used for inference by any owner by sending it transformed samples. Unlike most prior approaches, our transformed data approach maintains privacy for each entity, even in the case where the server colludes with all other entities. Importantly, we show the utility of collaborative learning typically exceeds the utility that can be achieved by any entity restricted to its own data set.
Another important application we show is that the Task Augmentation approach can also be used in the single owner case by adding labeled, learnable noise to amplify privacy. This can be straightforwardly used to produce (Local) Differential Privacy ((L)DP) guarantees. We show that adding labeled noise as opposed to a conventional (L)DP additive noise mechanism significantly improves the privacy-utility tradeoff in private learning under the same setup.
Christian Porter, Andrew Mendelsohn, Cong Ling
ePrint ReportShravan Srinivasan, Alex Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
ePrint ReportAs another added benefit over Merkle trees, Hyperproofs are homomorphic: digests (and proofs) for two vectors can be homomorphically combined into a digest (and proofs) for their sum. Homomorphism is very useful in emerging applications such as stateless cryptocurrencies. First, it enables unstealability, a novel property that incentivizes proof computation. Second, it makes digests and proofs much more convenient to update.
Finally, Hyperproofs have certain limitations: they are not transparent, have linear-sized public parameters, are slower to verify, and have larger aggregated proofs than SNARK-based approaches. Nonetheless, end-to-end, aggregation and verification in Hyperproofs is 10$\times$ to 100$\times$ faster than SNARK-based Merkle trees.
Panagiotis Chatzigiannis, Konstantinos Chalkias
ePrint ReportRami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
ePrint ReportVanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
ePrint ReportIn this paper we formally define mutual accountability: a user can be held accountable for her otherwise anonymous digital actions and a manager is held accountable for every de-anonymization attempt; plus, no honest party can be framed -- regardless of what malicious parties do.
Instead of distributing the de-anonymization power across entities, instead, we decouple the power of de-anonymization from the power of monitoring de-anonymization attempts. This allows for greater flexibility, particularly in the choice of the monitoring entities.
We show that our framework can be instantiated generically from threshold encryption schemes and succinct non-interactive zero-knowledge. We also show that the highly-efficient threshold group signature scheme by Camenisch et al.(SCN'20) can be modified and extended to instantiate our framework.
Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
ePrint ReportThe Bitcoin difficulty adjustment rule adjusts the difficulty target of block mining periodically to get a constant mean inter-block time. While superficially simple, the rule has proved itself to be sophisticated and successfully secure, both in practice and in theory [11, 13]. We show that natural adaptations of the Bitcoin adjustment rule to the parallel-chain case open the door to subtle, but catastrophic safety and liveness breaches. We uncover a meta-design principle that allow us to design variable mining difficulty protocols for three popular PoW blockchain proposals (Prism [3], OHIE [26], Fruitchains [21]) inside a common rubric.
The principle has three components: (M1) a pivot chain, based on which blocks in all chains choose difficulty, (M2) a monotonicity condition for referencing pivot chain blocks and (M3) translating additional protocol aspects from using levels (depth) to using difficulty levels. We show that protocols employing a subset of these principles may have catastrophic failures. The security of the designs is also proved using a common rubric the key technical challenge involves analyzing the interaction between the pivot chain and the other chains, as well as bounding the sudden changes in difficulty target experienced in non-pivot chains. We empirically investigate the responsivity of the new mining difficulty rule via simulations based on historical Bitcoin data, and find that the protocol very effectively controls the forking rate across all the chains.
Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
ePrint ReportShumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan (randomized author ordering)
ePrint ReportIn this paper, we consider the {\tt Join} operator, an important database primitive that has been extensively studied and optimized. Unfortunately, any {\it fully oblivious} {\tt Join} algorithm would require {\it always} padding the result to the {\it worst-case} length which is {\it quadratic} in the data size $N$. In comparison, an insecure baseline incurs only $O(R + N)$ cost where $R$ is the true result length, and in the common case in practice, $R$ is relatively short. As a typical example, when $R = O(N)$, any fully oblivious algorithm must inherently incur a prohibitive, $N$-fold slowdown relative to the insecure baseline. Indeed, the (non-private) database and algorithms literature invariably focuses on studying the {\it instance-specific} rather than {\it worst-case} performance of database algorithms. Unfortunately, the stringent notion of full obliviousness precludes the design of efficient algorithms with non-trivial instance-specific performance.
To overcome this worst-case performance barrier of full obliviousness and enable algorithms with good instance-specific performance, we consider a relaxed notion of access pattern privacy called $(\epsilon, \delta)$-differential obliviousness (DO), originally proposed in the seminal work of Chan et al. (SODA'19). Rather than insisting that the access patterns leak no information whatsoever, the relaxed DO notion requires that the access patterns satisfy $(\epsilon, \delta)$-differential privacy. We show that by adopting the relaxed DO notion, we can obtain efficient database {\tt Join} mechanisms whose instance-specific performance {\it approximately matches} the insecure baseline, while still offering a meaningful notion of privacy to individual users.
Complementing our upper bound results, we also prove new lower bounds regarding the performance of any DO {\tt Join} algorithm.
Differential obliviousness (DO) is a new notion and is a relatively unexplored territory. Following the pioneering investigations by Chan et al. and others, our work is among the very first to formally explore how DO can help overcome the worst-case performance curse of full obliviousness; moreover, we motivate our work with database applications.
Our work shows new evidence why DO might be a promising notion, and opens up several exciting future directions.