IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
07 March 2022
Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
Along the way we introduce a new notion of promise $\Sigma$-protocol that satisfies only a weaker soundness called promise extractability. An accepting promise $\Sigma$-proof for statements related to class-group-based encryptions does not establish the truth of the statement but provides security guarantees (promise extractability) that are sufficient for our applications. We also show how to simulate homomorphic operations on a (possibly invalid) class-group-based encryption whose correctness has been proven via our promise $\Sigma$-protocol. We believe that these techniques are of independent interest and applicable to other scenarios where efficient zero knowledge proofs for statements related to class-group is required.
Vasyl Ustimenko
Alexander Poremba
In this work, we augment the proof-of-deletion paradigm with fully homomorphic encryption (FHE). This results in a new and powerful cryptographic notion called fully homomorphic encryption with certified deletion -- an interactive protocol which enables an untrusted quantum server to compute on encrypted data and, if requested, to simultaneously prove data deletion to a client. Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors (LWE) distribution in the form of a quantum state was deleted. We introduce an encoding based on Gaussian coset states which is highly generic and suggests that essentially any LWE-based cryptographic primitive admits a classically-verifiable quantum proof of deletion.
As an application of our protocol, we construct a Dual-Regev public-key encryption scheme with certified deletion, which we then extend towards a (leveled) FHE scheme of the same type. In terms of security, we distinguish between two types of attack scenarios: a semi-honest adversary that follows the protocol exactly, and a fully malicious adversary that is allowed to deviate arbitrarily from the protocol. In the former case, we achieve indistinguishable ciphertexts, even if the secret key is later revealed after deletion has taken place. In the latter case, we provide entropic uncertainty relations for Gaussian cosets which limit the adversary's ability to guess the delegated ciphertext once deletion has taken place. Our results enable a form of everlasting cryptography and give rise to new privacy-preserving quantum cloud applications, such as private machine learning on encrypted data with certified data deletion.
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
We achieve this via a careful application of a binning approach that enables parallelizing any arbitrary PSI protocol. Building on this idea, we designed and implemented a framework that takes a pair of PSI executables (i.e., for each of the two parties) that typically works for million-sized sets, and then scales it to billion-sized sets (and beyond). For example, our framework can perform a join of billion-sized sets in 83 minutes compared to 2000 minutes of Pinkas et al. (ACM TPS 2018), an improvement of $25\times$. Furthermore, we present an end-to-end Spark application where two enterprises, each possessing private databases, can perform a restricted class of database join operations (specifically, join operations with only an on clause which is a conjunction of equality checks involving attributes from both parties, followed by a where clause which can be split into conjunctive clauses where each conjunction is a function of a single table) without revealing any data that is not part of the output.
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
In this paper, we determine what is possible in the honest majority setting without a PKI, closing a question left open by Damgård et al. We show that without a PKI, having an honest majority does not make it possible to achieve stronger security guarantees compared to the dishonest majority setting. However, if two thirds of the parties are guaranteed to be honest, identifiable abort is additionally achievable using broadcast only in the second round.
We use fundamentally different techniques from the previous works in order to avoid relying on private communication in the first round when a PKI is not available, since assuming such private channels without the availability of public encryption keys is unrealistic. We also show that, somewhat surprisingly, the availability of private channels in the first round does not enable stronger security guarantees unless the corruption threshold is one. In that case, prior work has shown that with private channels in the first round, guaranteed output delivery is always achievable; we show that without these channels, fairness is unachievable even with broadcast in both rounds, and unanimous abort is unachievable without broadcast in the second round.
Michael Amar, Amit Kama, Kang Wang, Yossi Oren
A recent paper of Farha et al. suggested an entity authentication scheme suitable for low-resource IoT edge devices, which relies on SRAM-based physically unclonable functions (PUFs). In this paper we analyze this scheme. We show that, while it claims to offer strong PUF functionality, the scheme creates only a weak PUF: an active attacker can completely read out the secret PUF response of the edge device after a very small amount of queries, converting the scheme into a weak PUF scheme which can then be counterfeited easily. After analyzing the scheme, we propose an alternative construction for an authentication method based on SRAM-PUF which better protects the secret SRAM startup state.
Vadim Tsypyschev, Iliya Morgasov
Anna Lysyanskaya, Leah Namisa Rosenbloom
Joachim Neu, Ertem Nusret Tas, David Tse
Aaron Feickert, Aram Jivanyan
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
In this work, we show that there is a more direct and more efficient way to prove that the coefficients of $s$ have a small $\ell_2$ norm which does not require an equivocation with the $\ell_\infty$ norm, nor any conversion to the CRT representation. We observe that the inner product between two vectors $ r$ and $s$ can be made to appear as a coefficient of a product (or sum of products) between polynomials which are functions of $r$ and $s$. Thus, by using a polynomial product proof system and hiding all but one coefficient, we are able to prove knowledge of the inner product of two vectors modulo $q$. Using a cheap, approximate range proof, one can then lift the proof to be over $\mathbb{Z}$ instead of $\mathbb{Z}_q$. Our protocols for proving short norms work over all (interesting) polynomial rings, but are particularly efficient for rings like $\mathbb{Z}[X]/(X^n+1)$ in which the function relating the inner product of vectors and polynomial products happens to be a ``nice'' automorphism.
The new proof system can be plugged into constructions of various lattice-based privacy primitives in a black-box manner. As examples, we instantiate a verifiable encryption scheme and a group signature scheme which are more than twice as compact as the previously best solutions.
06 March 2022
Nagasaki, Japan, 30 May - 3 June 2022
Submission deadline: 7 March 2022
Notification: 11 March 2022
Lochau, Österreich, 4 October - 7 October 2022
Submission deadline: 15 May 2022
Notification: 24 June 2022
04 March 2022
Input Output Global (IOG)
Duties will include:
- Reviewing specifications produced by architects and formal methods specialists
- Contributing to the design of algorithms
- Bridging ideas from academic papers to production ready systems
- Implementing Cryptographic primitives in Rust and C
- Solid background in Mathematics. A degree in computer science or mathematics is desirable but not essential
- Deep understanding of Elliptic Curve Cryptography
- Familiarity with advanced cryptographic protocols (eg. Zero Knowledge Proofs, Distributed Key Generation, Threshold Signatures)
- Experience with systems programming (C/C++/Rust)
- Skilled in software development methods such as agile programming and test-driven development
- Experience in developing cryptography protocols would be a bonus, as would blockchain experience.
Closing date for applications:
Contact: Iñigo Querejeta Azurmendi
More information: https://apply.workable.com/io-global/j/EF38633ABE/
University of Southern Queensland, Australia
Closing date for applications:
Contact: Professor Linda Galligan, Head of School (Mathematics, Physics and Computing) on +61 7 4631 2263 or HES-HoS-Sciences@usq.edu.au.
Research Institute CODE, Universität der Bundeswehr München, Germany
A new research Privacy and Applied Cryptography (PACY) Lab formed by Prof. Mark Manulis at RI CODE is looking for several PhD/post-doc researchers to work on relevant topics such as:
- computing on encrypted data (ZKP, HE, MPC techniques)
- attribute-based cryptography (encryption & signatures)
- privacy-preserving authentication (incl. MFA, distributed)
- private messaging (e.g. key establishment, anonymity)
- privacy and applied cryptography for social web/metaverse, IoT, blockchain, or New Space
Requirements:
- Master's (or equivalent) or PhD in Computer Science, Information Security, Maths or similar
- Knowledge and understanding of privacy-oriented cryptography (theory and/or practice)
- Fluency in written and spoken English, (German desirable)
How to apply?
As a first step email Mark Manulis with subject line "Application PACY" including your cover/motivation letter, CV, and transcripts of grades. Search will continue until vacancies are filled.
Closing date for applications:
Contact: Mark Manulis (mark [AT] manulis.eu)
More information: https://www.manulis.eu/pub.html
Panther Protocol
Closing date for applications:
Contact: Martin Raeburn
More information: https://angel.co/company/panther-protocol/jobs/1979044-cryptography-engineer