07 March 2022
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
We achieve this via a careful application of a binning approach that enables parallelizing any arbitrary PSI protocol. Building on this idea, we designed and implemented a framework that takes a pair of PSI executables (i.e., for each of the two parties) that typically works for million-sized sets, and then scales it to billion-sized sets (and beyond). For example, our framework can perform a join of billion-sized sets in 83 minutes compared to 2000 minutes of Pinkas et al. (ACM TPS 2018), an improvement of $25\times$. Furthermore, we present an end-to-end Spark application where two enterprises, each possessing private databases, can perform a restricted class of database join operations (specifically, join operations with only an on clause which is a conjunction of equality checks involving attributes from both parties, followed by a where clause which can be split into conjunctive clauses where each conjunction is a function of a single table) without revealing any data that is not part of the output.
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
In this paper, we determine what is possible in the honest majority setting without a PKI, closing a question left open by Damgård et al. We show that without a PKI, having an honest majority does not make it possible to achieve stronger security guarantees compared to the dishonest majority setting. However, if two thirds of the parties are guaranteed to be honest, identifiable abort is additionally achievable using broadcast only in the second round.
We use fundamentally different techniques from the previous works in order to avoid relying on private communication in the first round when a PKI is not available, since assuming such private channels without the availability of public encryption keys is unrealistic. We also show that, somewhat surprisingly, the availability of private channels in the first round does not enable stronger security guarantees unless the corruption threshold is one. In that case, prior work has shown that with private channels in the first round, guaranteed output delivery is always achievable; we show that without these channels, fairness is unachievable even with broadcast in both rounds, and unanimous abort is unachievable without broadcast in the second round.
Michael Amar, Amit Kama, Kang Wang, Yossi Oren
A recent paper of Farha et al. suggested an entity authentication scheme suitable for low-resource IoT edge devices, which relies on SRAM-based physically unclonable functions (PUFs). In this paper we analyze this scheme. We show that, while it claims to offer strong PUF functionality, the scheme creates only a weak PUF: an active attacker can completely read out the secret PUF response of the edge device after a very small amount of queries, converting the scheme into a weak PUF scheme which can then be counterfeited easily. After analyzing the scheme, we propose an alternative construction for an authentication method based on SRAM-PUF which better protects the secret SRAM startup state.
Vadim Tsypyschev, Iliya Morgasov
Anna Lysyanskaya, Leah Namisa Rosenbloom
Joachim Neu, Ertem Nusret Tas, David Tse
Aaron Feickert, Aram Jivanyan
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
In this work, we show that there is a more direct and more efficient way to prove that the coefficients of $s$ have a small $\ell_2$ norm which does not require an equivocation with the $\ell_\infty$ norm, nor any conversion to the CRT representation. We observe that the inner product between two vectors $ r$ and $s$ can be made to appear as a coefficient of a product (or sum of products) between polynomials which are functions of $r$ and $s$. Thus, by using a polynomial product proof system and hiding all but one coefficient, we are able to prove knowledge of the inner product of two vectors modulo $q$. Using a cheap, approximate range proof, one can then lift the proof to be over $\mathbb{Z}$ instead of $\mathbb{Z}_q$. Our protocols for proving short norms work over all (interesting) polynomial rings, but are particularly efficient for rings like $\mathbb{Z}[X]/(X^n+1)$ in which the function relating the inner product of vectors and polynomial products happens to be a ``nice'' automorphism.
The new proof system can be plugged into constructions of various lattice-based privacy primitives in a black-box manner. As examples, we instantiate a verifiable encryption scheme and a group signature scheme which are more than twice as compact as the previously best solutions.
06 March 2022
Nagasaki, Japan, 30 May - 3 June 2022
Submission deadline: 7 March 2022
Notification: 11 March 2022
Lochau, Österreich, 4 October - 7 October 2022
Submission deadline: 15 May 2022
Notification: 24 June 2022
04 March 2022
Input Output Global (IOG)
Duties will include:
- Reviewing specifications produced by architects and formal methods specialists
- Contributing to the design of algorithms
- Bridging ideas from academic papers to production ready systems
- Implementing Cryptographic primitives in Rust and C
- Solid background in Mathematics. A degree in computer science or mathematics is desirable but not essential
- Deep understanding of Elliptic Curve Cryptography
- Familiarity with advanced cryptographic protocols (eg. Zero Knowledge Proofs, Distributed Key Generation, Threshold Signatures)
- Experience with systems programming (C/C++/Rust)
- Skilled in software development methods such as agile programming and test-driven development
- Experience in developing cryptography protocols would be a bonus, as would blockchain experience.
Closing date for applications:
Contact: Iñigo Querejeta Azurmendi
More information: https://apply.workable.com/io-global/j/EF38633ABE/
University of Southern Queensland, Australia
Closing date for applications:
Contact: Professor Linda Galligan, Head of School (Mathematics, Physics and Computing) on +61 7 4631 2263 or HES-HoS-Sciences@usq.edu.au.
Research Institute CODE, Universität der Bundeswehr München, Germany
A new research Privacy and Applied Cryptography (PACY) Lab formed by Prof. Mark Manulis at RI CODE is looking for several PhD/post-doc researchers to work on relevant topics such as:
- computing on encrypted data (ZKP, HE, MPC techniques)
- attribute-based cryptography (encryption & signatures)
- privacy-preserving authentication (incl. MFA, distributed)
- private messaging (e.g. key establishment, anonymity)
- privacy and applied cryptography for social web/metaverse, IoT, blockchain, or New Space
Requirements:
- Master's (or equivalent) or PhD in Computer Science, Information Security, Maths or similar
- Knowledge and understanding of privacy-oriented cryptography (theory and/or practice)
- Fluency in written and spoken English, (German desirable)
How to apply?
As a first step email Mark Manulis with subject line "Application PACY" including your cover/motivation letter, CV, and transcripts of grades. Search will continue until vacancies are filled.
Closing date for applications:
Contact: Mark Manulis (mark [AT] manulis.eu)
More information: https://www.manulis.eu/pub.html
Panther Protocol
Closing date for applications:
Contact: Martin Raeburn
More information: https://angel.co/company/panther-protocol/jobs/1979044-cryptography-engineer
QPQ Global
What do we give you?
• A stimulating, Socratic intellectual environment.
• Hybrid office approach – we have been a distributed workforce from the start. This role is centred around our European axis, so we expect you to live within +/- 3 hours of CET. We get together a complete team every quarter, so you must be willing to travel and embrace being part of a diverse team drawn from many walks of life and cultures.
• Good salary, travel expense budget and many future opportunities to participate in the company’s growth.
• The mother of all intellectual challenges!
Responsibilities.
• implement and embed in products cryptographic protocols in the privacy space.
• Working with a multi-faceted team of practitioners on a set of blockchain-based privacy protocols interacting with the DeFi space and providing compliance with financial regulations.
• Focus on zero knowledge schemes which provide privacy and compliance.
Requirements.
• MSc or multi-year experience in cryptography or a closely related field.
• Knowledge of modern cryptographic primitives.
• Be able to productize protocols/schemes/algorithms in at least one relevant programming language (C++ or Rust desirable).
• General understanding of full-stack system architecture.
• Have a thorough approach and be committed to high quality output. Have prior research/code already published in the space.
- Excellent communication and collaboration skills.
Closing date for applications:
Contact: opportunities@qpq.io
University of Amsterdam
Are you fascinated by security? Are you willing to take on the challenge of securing the next generation of computer systems and networks? Do you like to work in a team of young researchers? We are seeking a PhD candidate who is interested in interdisciplinary research on side-channel attacks against quantum devices used in quantum networks and beyond.
Closing date for applications:
Contact: Christian Schaffner
More information: https://vacatures.uva.nl/UvA/job/PhD-Position-on-Side-Channel-Attacks-on-Quantum-Devices-Used-in-Quantum-Networks/742058802/
QuSoft / University of Amsterdam
Full details: https://vacatures.uva.nl/UvA/job/ivi/742510202/
https://vacatures.uva.nl/UvA/job/QuSoft/742509902/
Closing date for applications:
Contact: Christian Schaffner
More information: https://www.qusoft.org/jobs/