IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
20 December 2021
Trondheim, Norway, 29 May 2022
Event CalendarSubmission deadline: 7 March 2022
Notification: 15 April 2022
Boston, USA, 5 July - 7 July 2022
Event CalendarSubmission deadline: 10 January 2022
Brandenburgische Technische Universität
Job PostingJunior Researcher / PhD Student, limited to 2 years, full time, with possibility for extension
Our chair performs research and teaching in the area of IT Security with a strong focus on Network Security and Online Privacy. Our goal is to advance the state of the art in research and to educate qualified computer scientists in the area of IT Security who are able to meet the challenges of the growing demand on securing IT Systems and provide data protection in various areas of our life and society. More information about us can be found at https://www.b-tu.de/en/fg-it-sicherheit.
Tasks:
Active research in the area of intrusion detection systems (IDS) for critical infrastructures, secure cyber-physical systems, and artificial intelligence / machine learning for traffic analysis.
Implementation and evaluation of new algorithms and methods.
Cooperation and knowledge transfer with industrial partners.
Publication of scientific results.
Assistance with teaching.
The employment takes place with the goal of doctoral graduation (obtaining a PhD degree). Requirements:
Master’s degree (or equivalent) in Computer Science or related disciplines.
Strong interest in IT security and/or networking and distributed systems.
Knowledge of at least one programming language (C++, Java, etc.) and one scripting language (Perl, Python, etc.) or strong willingness to quickly learn new programming languages.
Linux/Unix skills.
Knowledge of data mining, machine learning, statistics and result visualization concepts is of advantage.
Excellent working knowledge of English; German is of advantage
Excellent communication skills.
For more information about the vacant position please contact Prof. A. Panchenko (E-Mail: itsec-jobs.informatik@lists.b-tu.de).
We value diversity and therefore welcome all applications.
Closing date for applications:
Contact: Prof. Andriy Panchenko
More information: https://www.b-tu.de/en/fg-it-sicherheit
Indian Institute of Technology Hyderabad, India
Job PostingClosing date for applications:
Contact: Dr. Antony Franklin, Associate Professor, Department of Computer Science and Engineering, Indian Institute of Technology Hyderabad, India.
More information: https://newslab.iith.ac.in/
University of Luxembourg
Job PostingClosing date for applications:
Contact: Prof. Dr. Thomas Engel (admin-engel@uni.lu).
Boris Ryabko
ePrint ReportGeorg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
ePrint ReportBased on a relation we prove between approximate DCP and approximate distance-preserving functions, we design our core approximate DCPE scheme we call Scale-And-Perturb ($\mathsf{SAP}$). The encryption algorithm of $\mathsf{SAP}$ processes data on-the-fly. To boost security, we also introduce two preprocessing techniques: (1) normalizing the plaintext distribution, and (2) shuffling, wherein the component-wise encrypted dataset is randomly permuted. We prove (under suitable restrictions) that $\mathsf{SAP}$ achieves an indistinguishability-based security notion we call Real-or-Replaced ($\mathsf{RoR}$). In particular, our $\mathsf{RoR}$ result implies that our scheme prevents membership inference attacks by Yeom et al. (CSF 2018). Moreover, we show for i.i.d. multivariate normal plaintexts, we get security against approximate frequency-finding attacks, the main line of attacks against property-preserving encryption. This follows from a one-wayness $(\mathsf{OW})$ analysis. Finally, carefully combining our $\mathsf{OW}$ and $\mathsf{RoR}$ results, we are able characterize bit-security of $\mathsf{SAP}$.
Our overall findings are that our scheme not only has superior bit-security to OPE but resists specific attacks that even ideal order-revealing encryption (Boneh et al., EUROCRYPT 2015) does not. This suggests it could be sufficient for certain ANN applications, a subject on which we encourage further study.
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
ePrint ReportTo achieve this, we first identify a new fine-grained security notion for ABE -- partially adaptive/selective security, and instantiate this notion from LWE. Then, by using this notion, we design a new key compressing mechanism for identity-based/attributed-based weak hash proof system (IB/AB-wHPS) for various policy classes, achieving (1) succinct secret keys and (2) adaptive/selective security matching the existing non-leakage resilient lattice-based designs. Using the existing connection between weak hash proof system and leakage resilient encryption, the succinct-key IB/AB-wHPS can yield the desired leakage resilient IBE/ABE schemes with the optimal leakage rates in the relative leakage model. Finally, by further improving the prior analysis of the compatible locally computable extractors, we can achieve the optimal leakage rates in the BRM.
Shiduo Zhang, Yang Yu
ePrint ReportIn this work, we propose two new gadget sampling algorithms for arbitrary moduli. Our first algorithm is for gadget Gaussian sampling. It is simple and efficient. One distinguishing feature of our Gaussian sampler is that it does not need floating-point arithmetic, which makes it better compatible with constrained environments. Our second algorithm is for gadget subgaussian sampling. Compared with the existing algorithm, it is simpler, faster, and requires asymptotically less randomness. In addition, our subgaussian sampler achieves an almost equal quality for different practical parameters. Overall these two algorithms provide simpler options for gadget algorithms and enhance the practicality of the gadget toolkit.
Prabhanjan Ananth, Luowen Qian, Henry Yuen
ePrint ReportWe construct, assuming the existence of pseudorandom state generators that map a $\lambda$-bit seed to a $\omega(\log\lambda)$-qubit state, (a) statistically binding and computationally hiding commitments and (b) pseudo one-time encryption schemes. A consequence of (a) is that pseudorandom states are sufficient to construct maliciously secure multiparty computation protocols in the dishonest majority setting.
Our constructions are derived via a new notion called pseudorandom function-like states (PRFS), a generalization of pseudorandom states that parallels the classical notion of pseudorandom functions. Beyond the above two applications, we believe our notion can effectively replace pseudorandom functions in many other cryptographic applications.
Mihai-Zicu Mina, Emil Simion
ePrint ReportEmma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
ePrint Report18 December 2021
Research & Development Group, Horizen Labs; Milano, Italy
Job PostingOur Core Engineering Team is an innovative and collaborative group of researchers and software engineers who are dedicated to the design and development of world-class blockchain-based products. We are looking for a cryptographer, or applied cryptographer, to join our growing crypto team based in Milan, Italy. Currently, the team is developing a protocol suite for SNARK-based proof-composition, but its duties reach beyond that, developing privacy-enhancing solutions for our sidechain ecosystem.
Responsabilities- Design privacy-enhancing technology built on SNARK-based protocols
- Perform collaborative research and assist technical colleagues in their development work
- Participate in standards-setting
- Ph.D. in mathematics, computer science, or cryptography
- Solid foundations in zero-knowledge and cryptographic protocols
- Publications in acknowledged venues on applied or theoretical cryptography, preferably cryptographic protocols or PETs
- Strong problem-solving skills
- The ability to work in a team setting as well as autonomously
- Foundations in blockchain technology and experience in reading Rust are a plus
- A competitive salary plus pre-series A stock options
- Flexible working hours, including the possibility of remote working
- The opportunity to work with talented minds on challenging topics in this field, including the most recent advancements in zero-knowledge
- A nice and informal team setting to conduct research and development of high-quality open source solutions
If you are interested in this position, you might want to take a look at our recent publications (IACR eprints 2021/930, 2021/399, 2020/123) and our latest podcast on zeroknowledge.fm (Episode 178). For further questions, please contact the email below.
Closing date for applications:
Contact: recruiting@horizenlabs.io
More information: https://horizenlabs.io/careers/job/?gh_jid=4116067004
Basque Center for Applied Mathematics - BCAM
Job PostingBCAM is an research center of applied mathematics located in Bilbao. Its research is transversal, covering from core developments in mathematics to the most applied aspects. It enjoys the Severo Ochoa distinction (the highest rank distinction for research centers in Spain). The position is the framework of the creation of a new research line in (post-quantum) cryptography, which falls within the Basque strategy on Quantum computing, Quantum Cryptography and Quantum save Cryptography. The research line will be lead by Prof. Ignacio Luengo (UCM, Madrid), with the collaboration of Prof. Jintai Ding (Tsinghua University).
Applications at: http://www.bcamath.org/en/research/job/ic2021-12-postdoctoral-fellow-on-post-quantum-cryptography
Closing date for applications:
Contact: Enquiries about the position can be sent to iluengo@mat.ucm.es
More information: http://www.bcamath.org/en/research/job/ic2021-12-postdoctoral-fellow-on-post-quantum-cryptography
UConn, Computer Science and Engineering Dept.
Job PostingThe positions provide a great opportunity for students with interest in interdisciplinary projects that combine knowledge from various fields towards the design of secure systems and protocols. We target real-world timely problems and aim to provide secure and practical solutions backed by rigorous foundations and efficient implementations/thorough performance testing. We are also interested in conceptual projects that contribute in bridging the gap between theory and practice of Cryptography. For more information about our current and previous projects please check https://ghadaalmashaqbeh.github.io/research/.
For interested students, please send your CV to ghada@uconn.edu and provide any relevant information about the topics you want to work on and the skills/related background you have.
Closing date for applications:
Contact: Ghada Almashaqbeh
More information: https://ghadaalmashaqbeh.github.io/
University of Southern Denmark, Department of Mathematics and Computer Science; Odense, Denmark
Job PostingThe Section of Artificial Intelligence, Cybersecurity, and Programming Languages at the Department of Mathematics and Computer Science at the University of Southern Denmark (main campus, Odense) invites applications for tenure-track assistant professor positions in Computer Science.
Application deadline: 15 February 2022.
Link to the call: https://www.sdu.dk/da/service/ledige_stillinger/1180362?sc_lang=en
The University of Southern Denmark wishes its staff to reflect the diversity of society and thus welcomes applications from all qualified candidates regardless of personal background.
Closing date for applications:
Contact:
Please feel free to reach out to Professor Fabrizio Montesi (fmontesi@imada.sdu.dk) or Assistant Professor Ruben Niederhagen (niederhagen@imada.sdu.dk) for more information.
More information: https://www.sdu.dk/da/service/ledige_stillinger/1180362?sc_lang=en
Academia Sinica, Taipei, Taiwan
Job PostingClosing date for applications:
Contact: Bo-Yin Yang (by at crypto.tw)
Kai-Min Chung (kmchung at iis.sinica.edu.tw)