IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 July 2021
Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
ePrint ReportPierre Briaud, Jean-Pierre Tillich, Javier Verbel
ePrint ReportJianghua Zhong, Yingyin Pan , Wenhui Kong, Dongdai Lin
ePrint ReportShuichi Katsumata
ePrint ReportIn this paper, we present a new simple semi-generic transform that compiles many existing lattice-based $\Sigma$-/public-coin HVZK interactive protocols into QROM secure NIZKs. Our transform builds on a new primitive called $\textit{extractable linear homomorphic commitment}$ protocol. The resulting NIZK has several appealing features: it is not only a proof of knowledge but also straight-line extractable; the proof overhead is smaller compared to the Unruh transform; it enjoys a relatively small reduction loss; and it requires minimal background on quantum computation. To illustrate the generality of our technique, we show how to transform the recent Bootle et al.'s 5-round protocol with an exact sound proof (Crypto'19) into a QROM secure NIZK by increasing the proof size by a factor of $2.6$. This compares favorably to the Unruh transform that requires a factor of more than $50$.
Chethan Kamath, Karen Klein, Krzysztof Pietrzak
ePrint ReportMarten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
ePrint ReportRouzbeh Behnia, Yilei Chen, Daniel Masny
ePrint ReportLuca De Feo, Bertram Poettering, Alessandro Sorniotti
ePrint ReportKunal Dey, Sumit Kumar Debnath
ePrint ReportWenshuo Guo, Fang-Wei Fu
ePrint ReportNir Bitansky, Huijia Lin, Omri Shmueli
ePrint Report\begin{itemize} \item A $\log^\star(\lambda)$-round classical protocol based on quantum fully-homomorphic encryption and the quantum hardness of Learning with Errors. \item A polynomial-round classical protocol based on post-quantum oblivious transfer.
\item A polynomial-round quantum protocol based on post-quantum one-way functions. \end{itemize}
Previously, non-malleable commitments with quantum security were only known against a restricted class of adversaries known as synchronizing adversaries. At the heart of our results is a general technique that allows to modularly obtain non-malleable commitments from any extractable commitment protocol, obliviously of the underlying extraction strategy (black-box or non-black-box), round complexity, and whether communication is quantum or classical. The transformation preserves the quantum security of the underlying extractable commitments, and is new even in the classical setting.
Benjamin Wesolowski
ePrint ReportGuangzhou, China, 5 November - 8 November 2021
Event CalendarSubmission deadline: 20 July 2021
Notification: 25 August 2021
Hasso-Plattner-Institute (Potsdam/Berlin, Germany)
Job PostingThe Cybersecurity - Identity Management group at the Hasso-Plattner-Institute (HPI), University of Potsdam is looking for motivated PhD students in the area of cryptography and privacy.
Your future tasks- Development and analysis of provably secure cryptographic protocols for real-world problems. Topics of interest include (but are not limited to):
- Privacy-enhancing technologies
- Password-based cryptography
- Foundations and solutions for real-world cryptography
- Publish and present results at top-tier international conferences
- Participate in teaching activities (depends on position)
- Master’s degree in Computer Science, Mathematics, or a related area by the time of appointment
- Profound knowledge and interest in the areas of cryptography and IT security
- Fluency in English (written and spoken)
There are two types for the PhD positions: One position comes with a teaching obligation for which also sufficient German language skills are required. Review of applicants will start immediately until the position is filled. The starting date is flexible. The other is through the scholarship program of the HPI. Deadline for scholarship applications is August 15, and the positions usually start around October.
We look forward to your application including a CV, motivation letter and a list of attended Master courses and grades. Please submit your application documents (only as PDF) via email, and indicate the position you are interested in (teaching/scholarship).
Closing date for applications:
Contact: Anja Lehmann (anja . lehmann - at - hpi . de)
More information: https://hpi.de/lehmann/home.html
KU Leuven (Catholic University of Leuven)
Job PostingClosing date for applications:
Contact: For inquiries send an email to jobs-cosic@esat.kuleuven.be
More information: https://www.esat.kuleuven.be/cosic/vacancies/
The Hong Kong University of Science and Technology
Job Posting- Zero-knowledge proofs
- Polynomial/vector commitments
- Searchable/structured encryption
- Oblivious algorithms
- TEE-assisted cryptography
Interested applicants should submit their CV and a single-page research statement. The position is available immediately and on a rolling basis until filled. It will initially be for one year and can be extended given satisfactory performance.
Work environment: The HKUST CSE department was ranked 17th in the world in 2020 by THE World University Rankings. Our graduates typically produce research output of the highest quality and consistently staff world-class institutions. The lab offers a creative work environment that is ideal for excellent research.
Closing date for applications:
Contact: Prof. Papadopoulos Dimitrios, dipapado at cse dot ust dot hk
08 July 2021
Orestis Chardouvelis, Giulio Malavolta
ePrint ReportAll of these protocols match the best round complexity known for the corresponding protocols for NP with security against classical adversaries. Along the way, we introduce and construct the notions of sometimes-extractable oblivious transfer and sometimes-simulatable zero-knowledge, which might be of independent interest.
Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
ePrint ReportPyrros Chaidos, Aggelos Kiayias
ePrint ReportIn this work we put forth a new stake-based primitive, stake-based threshold multisignatures (STM, or Mithril signatures), which allows the aggregation of individual signatures into a compact multisignature pro- vided the stake that supports a given message exceeds a stake threshold. This is achieved by having for each message a pseudorandomly sampled subset of participants eligible to issue an individual signature; this ensures the scalability of signing, aggregation and verification.
We formalize the primitive in the universal composition setting and propose efficient constructions for STMs. We also showcase that STMs are eminently useful in the cryptocurrency setting by providing two applications: (i) stakeholder decision-making for Proof of Work (PoW) blockchains, specifically, Bitcoin, and (ii) fast bootstrapping for Proof of Stake (PoS) blockchains.
Gal Arnon, Alessandro Chiesa, Eylon Yogev
ePrint ReportWe present a generalization of the PCP theorem for interactive languages. We show that any language decidable by a $k(n)$-round IP has a $k(n)$-round public-coin IOP, where the verifier makes its decision by reading only $O(1)$ bits from each (polynomially long) prover message and $O(1)$ bits from each of its own (random) messages to the prover. Our proof relies on a new notion of PCPs that we construct called index-decodable PCPs, which may be of independent interest.
We are then able to bring transformations that previously applied only for IPs into the realm of IOPs. We show IOP-to-IOP transformations that preserve query complexity and achieve: (i) private-coins to public-coins; (ii) round reduction; and (iii) imperfect to perfect completeness.