IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
08 December 2021
Deepika Natarajan, Wei Dai, Ronald Dreslinski
In this work, we present CHEX-MIX, a solution to the problem of privacy-preserving machine learning between two mutually distrustful parties in an untrusted cloud setting. CHEX-MIX relies on a combination of HE and trusted execution environments (TEEs) and leverages the benefits of each to counter the drawbacks of the other. In particular, we use HE to provide clients with confidentiality guarantees and TEEs to provide model providers with confidentiality guarantees and protect the integrity of computation from malicious cloud adversaries. Unlike prior solutions to this problem, such as multi-key HE, single-key HE, MPC, or TEE-only techniques, our solution assumes that both clients and the cloud can be malicious, makes no collusion assumptions, and frees model providers from needing to maintain private online infrastructures. In this paper, we analyze our solution from a security perspective and detail the advantages that our solution provides over prior works, including its ability to allow model providers to maintain privacy of their software IP. We demonstrate the feasibility of our solution by deploying CHEX-MIX in an Azure confidential computing machine. Our results show that CHEX-MIX can execute at high efficiency, with low communication cost, while providing security guarantees unaddressed by prior work.
Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
We argue in this paper that there is no evidence to support the $P/poly$ validity of GVW15 predicate encryption scheme, that is, when addressing $P/poly$ functions, there is no evidence to show GVW15 scheme can be implemented. In specific, when addressing $P/poly$ functions, there is no indication that the modulus reduction in GVW15 predicate encryption scheme can scale the noise in the fully homomorphic encryption ciphertext (the inner noise) down to polynomial size. Our argument is separated into two parts.
First, under a compact inner modulus $Q$, an intuition is that modulus reduction should reduce the inner noise to about the same size as the outer noise (i.e. the noise in the attribute ciphertext), which is super-polynomial in size. Breaking this intuition requires a special proof which GVW15 predicate encryption (PE) scheme does not provide.
Second, under an enlarged inner modulus $Q$, the outer modulus is enlarged correspondingly. As a result, the static target of modulus reduction is lost. Even so, the size of inner noise can still be reduced to polynomial size by using proper modulus reduction, as long as it can be proved that the ratio of increments of outer modulus and inner modulus is smaller than the ratio of original outer modulus $q$ and original inner modulus $Q$. However, GVW15 PE scheme failed to provide such proof. Moreover, it appears hopeless to get such proof, based on our observations.
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
In any plausible real-world setting, however, a quantum attacker would have only *classical* access to the keyed permutation $E$ implemented by honest parties, while retaining quantum access to $P$. Attacks in this setting with $q_E \cdot q_P^2 \approx 2^n$ are known, showing that security degrades as compared to the purely classical case, but leaving open the question as to whether the Even-Mansour cipher can still be proven secure in this natural ``post-quantum'' setting.
We resolve this question, showing that any attack in that setting requires $q_E \cdot q^2_P + q_P \cdot q_E^2 \approx 2^n$. Our results apply to both the two-key and single-key variants of Even-Mansour. Along the way, we establish several generalizations of results from prior work on quantum-query lower bounds that may be of independent interest.
Antonin Leroux
Our main contribution is the design of the suborder representation, a new isogeny representation targetted at the case of (big) prime degree. The core of our new method is the revelation of endomorphisms of smooth norm inside a well-chosen suborder of the codomain's endomorphism ring. These new membership witnesses appear to be opening interesting prospects for isogeny-based cryptography under the hardness of a new computational problem: the SubOrder to Ideal Problem (SOIP). As an application, we introduce pSIDH, a new NIKE based on our new suborder representation.
In the process, we also develop several heuristic algorithmic tools to solve norm equations inside a new family of quaternion orders. These new algorithms may be of independent interest.
Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
Marc Fischlin, Olga Sanina
CDT in Cyber Security for the Everyday. Royal Holloway University. Egham, Surrey, UK
Closing date for applications:
Contact: Prospective applicants are welcome to discuss with Guidi Schmitz
More information: https://www.royalholloway.ac.uk/cdt
CDT in Cyber Security for the Everyday. Royal Holloway University. Egham, Surrey, UK
Closing date for applications:
Contact: Dr Rachel Player
More information: https://www.royalholloway.ac.uk/cdt
CDT in Cyber Security for the Everyday. Royal Holloway University. Egham, Surrey, UK
Closing date for applications:
Contact: Prospective applicants are welcome to discuss with Professor Martin Albrecht
More information: https://www.royalholloway.ac.uk/cdt
Technische Univversität Darmstadt
Closing date for applications:
Contact: Prof. Dr. Marc Fischlin, E-Mail: jobs@cx.tu-darmstadt.de
More information: https://www.tu-darmstadt.de/universitaet/karriere_an_der_tu/stellenangebote/aktuelle_stellenangebote/stellenausschreibungen_detailansichten_1_442368.en.jsp
06 December 2021
NTT Research, Sunnyvale, CA, USA
Closing date for applications:
Contact: Shin'ichiro Matsuo (Shinichiro.Matsuo@ntt-research.com)
More information: https://careers.ntt-research.com/cis
Basque Center for Applied Mathematics (BCAM), in Bilbao
BCAM is an research center of applied mathematics located in Bilbao. Its research is transversal, covering from core developments in mathematics to the most applied aspects. It enjoys the Severo Ochoa distinction (the highest rank distinction for research centers in Spain). The position is the framework of the creation of a new research line in (post-quantum) cryptography, which falls within the Basque strategy on Quantum computing, Quantum Cryptography and Quantum safe Cryptography. The research line will be lead by Prof. Ignacio Luengo (UCM, Madrid), with the collaboration of Prof. Jintai Ding (Tsinghua University).
Deadline for applications is 12/31/2020.
More details, and application link are available here: https://www.bcamath.org/en/research/job
Closing date for applications:
Contact: Ignacio Luengo (iluengo@ucm.es)
More information: https://www.bcamath.org
05 December 2021
Fez, Morocco, 18 July - 20 July 2022
Submission deadline: 25 February 2022
Notification: 22 April 2022
Bristol, United Kingdom, 8 August - 12 August 2022
Submission deadline: 25 February 2022
Notification: 23 May 2022
University of Southern Queensland
Closing date for applications:
Contact: To find out more about this opportunity, please contact Dr Zhaohui Tang on +61 7 4631 2464 or Zhaohui.Tang@usq.edu.au.
North Carolina State University
Closing date for applications:
Contact: Aydin Aysu
Ruhr-Universitaet, Faculty of Computer Science, Bochum, Germany
The Horst Görtz Institute for IT Security (HGI) in Bochum, Germany is one of the most renowned institutes in the field of IT Security in Europe. The Horst Görtz Institute for IT Security (HGI) in Bochum, Germany is one of the most renowned institutes in the field of IT Security in Europe. The HGI hosts 26 faculty members, maintains extensive networks and has produced numerous successful start-ups. HGI is home to the Cluster of Excellence "CASA: Cyber Security in the Age of Large-Scale Adversaries", funded with approximately 30 million euros. This outstanding environment offers excellent working conditions in a highly topical and exciting field. In addition, there is a very good working atmosphere in a young and diverse group of researchers. The Faculty of Computer Science at Ruhr-Universität Bochum invites applications for a tenured Full Professorship for System Security. Applicants should have an excellent track record in research and teaching in at least one of the following areas:
- OS and software security
- Network and distributed systems security
- Malware analysis
- Analysis of network and security protocols
- Security analysis of hardware designs and binaries
- Machine learning and security.
We are looking for a scientist with an internationally visible research profile, who complements existing focus areas. We expect a willingness to cooperate with the Horst Görtz Institute for IT Security as well as an active role in current and planned projects, especially in the Cluster of Excellence "CASA: Cyber Security in the Age of Large Scale Adversaries". The Max Planck Institute for Security and Privacy offers additional possibilities for collaboration. The working language is English. Fluent German is not a prerequisite for a successful engagement at HGI. The official job add can be found here. Applications with the usual documents are requested by January 10, 2022 to the Dean of the Faculty of Computer Science at Ruhr-Universität Bochum, Alexander May, e-mail: career@casa.rub.de . Further information can be found here: https://informatik.rub.de/en/ https://casa.rub.de/en/Closing date for applications:
Contact: Alexander May, Dean of the Faculty of Computer Science at Ruhr-Universität Bochum
More information: https://informatik.rub.de/en/
Fraunhofer AISEC, Garching (near Munich), Germany
The work covers different aspects in the areas the design of new physical structures for tamper protection and PUF primitives, characterization of the structures, design of measurement circuits, research on attacks and countermeasures, system design, development of firmware, and statistical assessments, depending on the background of the candidate.
The candidate must hold a master's degree in electrical engineering, security, physics, or a related field, and have at least intermediate German language levels (B2). The position supports the candidate to work towards a PhD in collaboration with the Technical University of Munich.
If you are interested, please apply via the following link: https://www.aisec.fraunhofer.de/de/jobs/wissenschaftliche-stellen/aisec-2021-6.html
Closing date for applications:
Contact: Matthias Hiller (matthias.hiller@aisec.fraunhofer.de)
Aalto University, Department of Computer Science, Espoo, Finland
The Department of Computer Science (https://www.aalto.fi/en/department-of-computer-science) is home to world-class research in modern computer science, combining research on foundations and innovative applications. An international community with 47 professors and more than 400 employees from 45 countries, it is the largest department at Aalto University and the largest computer science unit in Finland. The department consistently ranks high in global rankings, for example,1st in Northern countries and 56th worldwide in Times Higher Education subject ranking 2020. Diversity is part of who we are, and we actively work to ensure our community’s diversity and inclusiveness. We warmly encourage qualified candidates from all backgrounds to join our community. We offer competitive salaries and start-up packages to new faculty. The contract includes occupational health benefits. For international hires, we offer relocation services.
Closing date for applications:
Contact: Please contact Associate Professor Casper Lassenius or in recruitment process related questions HR Coordinator Laura Kuusisto-Noponen; emails firstname.lastname@aalto.fi.
More information: https://aalto.wd3.myworkdayjobs.com/en-US/aalto/job/Otaniemi-Espoo-Finland/Assistant-or-Associate-Professors-in-Computer-Science_R32265