IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
24 August 2021
Durham University, UK
Job PostingThe Department of Computer Science at Durham University is looking for a postdoctoral researcher from 1 Jan 2022 to work on an EPSRC project on topics related to password-hashing algorithms and idealized models of computation for a period of two years. We would be interested in applicants holding (or nearing the completion of) a PhD in Cryptography (or related fields) who have strong interests in the foundational aspects of crypto, proof techniques, and definitional work. Publications at competitive venues and ability to work independently are a plus. Applicants with backgrounds in Algorithms and Complexity are also very welcome to apply.
Durham is one of the top (and oldest) universities in the UK, and the CS department hosts one of the strongest Theory groups in the UK across the ACiD and NESTiD groups. The annual salary for the position is £42,149.
Closing date for applications:
Contact: Pooya Farshim. Please submit a CV containing publications and references.
More information: https://farshim.github.io/
23 August 2021
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
ePrint ReportIn this paper, we propose SplitGuard, a method by which a split learning client can detect whether it is being targeted by a training-hijacking attack or not. We experimentally evaluate its effectiveness, and discuss in detail various points related to its use. We conclude that SplitGuard can effectively detect training-hijacking attacks while minimizing the amount of information recovered by the adversaries.
Zhiyuan Fan, Jiatu Li, Tianqi Yang
ePrint Report* In general $B_2$ circuits, assuming the existence of PRFs, PRFs can be constructed in $2n + o(n)$ size, simplifying and improving the $O(n)$ bound by Ishai et al. (STOC 2008). We show that such construction is almost optimal by giving an unconditional $2n-O(1)$ lower bound.
* In logarithmic depth circuits, assuming the existence of $NC^1$ PRFs, PRFs can be constructed in $2n + o(n)$ size and $(1+\epsilon) \log n$ depth simultaneously.
* In constant depth linear threshold circuits, assuming the existence of $TC^0$ PRFs, PRFs can be constructed with wire complexity $n^{1+O(1.61^{-d})}$. We also give an $n^{1+\Omega(c^{-d})}$ wire complexity lower bound for some constant $c$.
The upper bounds are proved with generalized Levin's trick and novel constructions of "almost" universal hash functions; the lower bound for general circuits is proved via a tricky but elementary wire-counting argument; and the lower bound for $TC^0$ circuits is proved by extracting a "black-box" property of $TC^0$ circuits from the "white-box" restriction lemma of Chen, Santhanam, and Srinivasan (Theory Comput. 2018). As a byproduct, we prove unconditional tight upper and lower bounds for "almost" universal hashing, which we believe to have independent interests.
Following Natural Proofs by Razborov and Rudich (J. Comput. Syst. Sci. 1997), our results make progress in realizing the difficulty to improve known circuit lower bounds which recently becomes significant due to the discovery of several "bootstrapping results". In $TC^0$, this reveals the limitation of the current restriction-based methods; in particular, it brings new insights in understanding the strange phenomenon of "sharp threshold results" such as the one presented by Chen and Tell (STOC 2019).
Denis Firsov, Dominique Unruh
ePrint ReportArijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
ePrint ReportHanlin Ren, Rahul Santhanam
ePrint ReportV. Vysotskaya, I. Chizhov
ePrint ReportEge Erdogan, Alptekin Kupcu, A. Ercument Cicek
ePrint ReportThore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz
ePrint ReportRuben Niederhagen, Johannes Roth, Julian Wälde
ePrint ReportThomas Haines, Rajeev Gore
ePrint ReportWe revisit the BeleniosVS scheme and propose several refinements to the ProVerif security model and scheme which increase the number of threat models in which the scheme has verifiability from 22 to 28. Our new ProVerif security model also implies end-to-end verifiability but the requirements are easier to satisfy. Interestingly, in all six improvements, both the changes to the security model and one or more changes to the scheme are necessary to prove verifiability.
Gilles Macario-Rat, Jacques Patarin
ePrint ReportJoachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, Javier Díaz
ePrint ReportHongrui Cui, Kaiyi Zhang
ePrint ReportKuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
ePrint ReportFatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y.A. Ryan, Julien Weibel, Robert Weil
ePrint ReportThe storage process can be divided into three time-frames. Within the first (life), we can easily read out the stored data with high probability. The second time-frame (agony) is a parameter-dependent state of uncertainty; the data is not easily accessible, but still cannot be guaranteed to be inaccessible. During the third (death), the data can with high probability not be recovered without a large computational effort which can be controlled via a security parameter. The quality of such a system, in terms of a foreseeable lifespan, depends on the brevity of the agony time-frame, and we show how to optimise this.
In the present paper, we analyse the use of synthetic DNA and RNA as a storage medium since it is a suitable information carrier and we can manipulate the RNA nucleotide degradation rate to help control the lifespan of the message embedded in the synthesized DNA/RNA molecules. Other media such as Bisphenol A thermal fax paper or unstable nonvolatile memory technologies can be used to implement the same principle but the decay models of each of those phenomena should be re-analysed and the formulae given in this paper adapted correspondingly.
Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y.A. Ryan, Hugo Waltsburger
ePrint ReportAn inherent limitation of OV-Net is its lack of robustness against denial-of-service attacks, which occur when at least one of the voters initiates the protocol but (maliciously or accidentally) does not complete it. Unfortunately such a situation is very likely to occur in any real-world implementation of the protocol. This will cost serious time delays from either waiting for the failing parties and perhaps having to perform extra protocol rounds with the remaining participants.
This paper provides a solution to this problem by extending OV-Net with mechanisms tolerating a number of unresponsive participants. The price to pay is a carefully controlled privacy loss, an increase in computation, and a statistical loss in the accuracy.
Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
ePrint Report20 August 2021
University of Stuttgart, Institute of Information Security
Job PostingApply if you belong to the top 5% of students in your peer group, are highly motivated and capable of addressing and solving scientifically challenging problems, and if you are interested in doing research in an internationally oriented, interdisciplinary, and highly successful team. We value strong analytical skills. Knowledge of cryptography, in particular, privacy enhancing technologies such as Multi Party Computation and Differential Privacy, is an asset. Knowledge of German is not required.
The University of Stuttgart is an equal opportunity employer. Applications from women are strongly encouraged. Severely challenged persons will be given preference in the case of equal qualifications.
To apply, please send email with subject "PhD position: Privacy-Preserving Attentive User Interfaces" and a single PDF file containing the following documents to ralf.kuesters@sec.uni-stuttgart.de:
- Cover letter (explaining your scientific background and your motivation to apply)
- Curriculum Vitae
- List of publications (if any)
- Copies of transcripts and certificates (Bachelor and Master)
- Names and contact addresses of at least two references
September 12th, 2021.
Late applications will be considered until the position is filled.
See https://sec.uni-stuttgart.de/ for more information about the Institute of Information Security (Prof. Küsters) and http://www.perceptualui.org/ for the Perceptual User Interfaces Group (Prof. Bulling).
Closing date for applications:
Contact: Prof. Dr. Ralf Küsters
ralf.kuesters@sec.uni-stuttgart.de
More information: https://sec.uni-stuttgart.de/
IST Austria, Vienna
Job PostingClosing date for applications:
Contact: Lefteris Kokoris-Kogias
More information: https://twitter.com/LefKok/status/1427299702530363405