IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
23 August 2021
Denis Firsov, Dominique Unruh
ePrint ReportArijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
ePrint ReportHanlin Ren, Rahul Santhanam
ePrint ReportV. Vysotskaya, I. Chizhov
ePrint ReportEge Erdogan, Alptekin Kupcu, A. Ercument Cicek
ePrint ReportThore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz
ePrint ReportRuben Niederhagen, Johannes Roth, Julian Wälde
ePrint ReportThomas Haines, Rajeev Gore
ePrint ReportWe revisit the BeleniosVS scheme and propose several refinements to the ProVerif security model and scheme which increase the number of threat models in which the scheme has verifiability from 22 to 28. Our new ProVerif security model also implies end-to-end verifiability but the requirements are easier to satisfy. Interestingly, in all six improvements, both the changes to the security model and one or more changes to the scheme are necessary to prove verifiability.
Gilles Macario-Rat, Jacques Patarin
ePrint ReportJoachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, Javier Díaz
ePrint ReportHongrui Cui, Kaiyi Zhang
ePrint ReportKuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
ePrint ReportFatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y.A. Ryan, Julien Weibel, Robert Weil
ePrint ReportThe storage process can be divided into three time-frames. Within the first (life), we can easily read out the stored data with high probability. The second time-frame (agony) is a parameter-dependent state of uncertainty; the data is not easily accessible, but still cannot be guaranteed to be inaccessible. During the third (death), the data can with high probability not be recovered without a large computational effort which can be controlled via a security parameter. The quality of such a system, in terms of a foreseeable lifespan, depends on the brevity of the agony time-frame, and we show how to optimise this.
In the present paper, we analyse the use of synthetic DNA and RNA as a storage medium since it is a suitable information carrier and we can manipulate the RNA nucleotide degradation rate to help control the lifespan of the message embedded in the synthesized DNA/RNA molecules. Other media such as Bisphenol A thermal fax paper or unstable nonvolatile memory technologies can be used to implement the same principle but the decay models of each of those phenomena should be re-analysed and the formulae given in this paper adapted correspondingly.
Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y.A. Ryan, Hugo Waltsburger
ePrint ReportAn inherent limitation of OV-Net is its lack of robustness against denial-of-service attacks, which occur when at least one of the voters initiates the protocol but (maliciously or accidentally) does not complete it. Unfortunately such a situation is very likely to occur in any real-world implementation of the protocol. This will cost serious time delays from either waiting for the failing parties and perhaps having to perform extra protocol rounds with the remaining participants.
This paper provides a solution to this problem by extending OV-Net with mechanisms tolerating a number of unresponsive participants. The price to pay is a carefully controlled privacy loss, an increase in computation, and a statistical loss in the accuracy.
Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
ePrint Report20 August 2021
University of Stuttgart, Institute of Information Security
Job PostingApply if you belong to the top 5% of students in your peer group, are highly motivated and capable of addressing and solving scientifically challenging problems, and if you are interested in doing research in an internationally oriented, interdisciplinary, and highly successful team. We value strong analytical skills. Knowledge of cryptography, in particular, privacy enhancing technologies such as Multi Party Computation and Differential Privacy, is an asset. Knowledge of German is not required.
The University of Stuttgart is an equal opportunity employer. Applications from women are strongly encouraged. Severely challenged persons will be given preference in the case of equal qualifications.
To apply, please send email with subject "PhD position: Privacy-Preserving Attentive User Interfaces" and a single PDF file containing the following documents to ralf.kuesters@sec.uni-stuttgart.de:
- Cover letter (explaining your scientific background and your motivation to apply)
- Curriculum Vitae
- List of publications (if any)
- Copies of transcripts and certificates (Bachelor and Master)
- Names and contact addresses of at least two references
September 12th, 2021.
Late applications will be considered until the position is filled.
See https://sec.uni-stuttgart.de/ for more information about the Institute of Information Security (Prof. Küsters) and http://www.perceptualui.org/ for the Perceptual User Interfaces Group (Prof. Bulling).
Closing date for applications:
Contact: Prof. Dr. Ralf Küsters
ralf.kuesters@sec.uni-stuttgart.de
More information: https://sec.uni-stuttgart.de/
IST Austria, Vienna
Job PostingClosing date for applications:
Contact: Lefteris Kokoris-Kogias
More information: https://twitter.com/LefKok/status/1427299702530363405
Microsoft Research India, Bangalore
Job PostingClosing date for applications:
Contact: https://careers.microsoft.com/us/en/job/1129518/Research-SDE
More information: https://careers.microsoft.com/us/en/job/1129518/Research-SDE
Indian Institute of Science (IISc)
Job PostingThis position is open for post-graduate (MSc/MS/MTech/Dual degree/Integrated Mtech) students interested in getting more research experience. Applicants who have credited a cryptography course in their home institute and/or who have worked on a related topic for their master's thesis are preferred.
You can apply through and find further details regarding opportunities at CrIS here -
https://www.csa.iisc.ac.in/~cris/opportunities.html
Closing date for applications:
Contact: Arpita Patra
More information: https://www.csa.iisc.ac.in/~cris/about.html
Indian Institute of Science (IISc)
Job PostingThe applicant is expected to have completed a PhD degree (recently) in Cryptography or a related subject with strong publication records. A background in theoretical aspects of secure multiparty computation and/or experience in coding for practical aspects of secure computation is expected. Postdoctoral fellows are expected to actively interact with PhD students and contribute to the lab's projects. The tenure of the position is for one year and can be extended further.
You can apply through and find further details regarding opportunities at CrIS here -
https://www.csa.iisc.ac.in/~cris/opportunities.html
Closing date for applications:
Contact: Arpita Patra
More information: https://www.csa.iisc.ac.in/~cris/about.html