International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News

Updates on the COVID-19 situation are on the Announcement channel.

Here you can see all recent updates to the IACR webpage. These updates are also available:

RSS symbol icon
via RSS feed
Twitter bird icon
via Twitter
Weibo icon
via Weibo
Facebook icon
via Facebook

03 October 2022

Trey Li
ePrint Report ePrint Report
It is well-known that the subset product problem is NP-hard. We give a probabilistic polynomial time algorithm for the special case of high F_2-rank.
Expand
Vadim Lyubashevsky, Ngoc Khan Nguyen
ePrint Report ePrint Report
We give a construction of an efficient one-out-of-many proof system, in which a prover shows that he knows the pre-image for one element in a set, based on the hardness of lattice problems. The construction employs the recent zero-knowledge framework of Lyubashevsky et al. (Crypto 2022) together with an improved, over prior lattice-based one-out-of-many proofs, recursive procedure, and a novel rejection sampling proof that allows to use the efficient bimodal rejection sampling throughout the protocol.

Using these new primitives and techniques, we give instantiations of the most compact lattice-based ring and group signatures schemes. The improvement in signature sizes over prior works ranges between $25\%$ and $2$X. Perhaps of even more significance, the size of the user public keys, which need to be stored somewhere publicly accessible in order for ring signatures to be meaningful, is reduced by factors ranging from $7$X to $15$X. In what could be of independent interest, we also provide noticeably improved proofs for integer relations which, together with one-out-of-many proofs are key components of confidential payment systems.
Expand
Kazumasa Shinagawa, Koji Nuida
ePrint Report ePrint Report
In this note, we introduce a class of card-based protocols called single-shuffle full-open (SSFO) protocols and show that any SSFO protocol for a function $f: \{0,1\}^n \rightarrow [d]$ using $k$ cards is generically converted to a private simultaneous messages (PSM) protocol for $f$ with $(nk)$-bit communication. As an example application, we obtain an 18-bit PSM protocol for the three-bit equality function from the six-card trick (Heather-Schneider-Teague, Formal Aspects of Computing 2014), which is an SSFO protocol in our terminology. We then generalize this result to another class of protocols which we name single-shuffle single-branch (SSSB) protocols, which contains SSFO protocols as a subclass. As an example application, we obtain an 8-bit PSM protocol for the two-bit AND function from the four-card trick (Mizuki-Kumamoto-Sone, ASIACRYPT 2012), which is an SSSB protocol in our terminology.
Expand
Trey Li
ePrint Report ePrint Report
It has been half a century since the first several NP-complete problems were discovered by Cook, Karp and Levin in the early 1970s. Till today, thousands of NP-complete problems have been found. Most of them are of combinatorial flavor. We discover new possibilities in purer mathematics and introduce more structures to the theory of computation. We propose a family of abstract problems related to the subset product problem. To describe hardness of abstract problems, we propose a new hardness notion called global-case hardness, which is stronger than worst-case hardness and incomparable with average-case hardness. It is about whether all prespecified subproblems of a problem are NP-hard. We prove that our problems are generally NP-hard in all/a wide range of unique factorization domains with efficient multiplication or all/a wide range of ideal class groups of Dedekind domains with efficient ideal multiplication.
Expand
IT University of Copenhagen
Job Posting Job Posting

The IT University of Copenhagen is searching a PhD candidate within Machine Learning for Eye Information privacy and security as part of the European Training Network EYES4ICU on Eyes for Information, Communication, and Understanding. The PhD project aims to identify sensitive eye information and develop methods for legal-compliance and safe access control and “private” data control using Eye Information. The goal is to work towards a fully GDPR (General Data Protection Regulation) compliant Eye Information pipeline that balances utility and security for everyday use of Eye information (e.g., such as in schools, and clinical settings).

The successful candidate should have a good background in one or more of the following: machine learning, statistics and computer science. Strong programming and mathematical skills Ideally also have a knowledge of and desire to work with eye tracking, human-machine interfaces, cognitive modelling, security/privacy, federated learning, and cryptographic protocols. You are enthusiastic about traveling for research conferences, PhD schools, and for internships with partners in different countries, e.g., Poland.

Benefits include: a 3-year employment contract with a competitive salary and additional family allowance (if married or having dependent children); access to high quality public education and healthcare in Denmark; budget for work-related travel, books, conferences and workshops etc.; Connections to potential employers in Europe; A rich and versatile PhD program with diverse educational modules, including mentorship, summer and winter schools, workshops... lots of fun!

Closing date for applications:

Contact: Dan Witzner

More information: https://candidate.hr-manager.net/ApplicationInit.aspx?cid=119&ProjectId=181482&DepartmentId=3439&MediaId=1282

Expand
Heliax, Remote
Job Posting Job Posting
Heliax is a public goods lab which researches, develops, deploys, and maintains protocols and mechanisms designed to serve the everyday needs of humanity. Using these protocols and mechanisms, we build vertically integrated products and networks that form coherent open systems which are capable of acting as an alternative to existing exploitative paradigms. Everything produced by Heliax is open-source and unencumbered by any form of IP law. Two of the most notable vertically integrated protocols are Anoma and Namada. Anoma is an intent-centric, privacy-preserving protocol for decentralized counterparty discovery, distributed solving,and atomic multi-chain settlement – a radically novel architecture for decentralized protocols marking the beginning of the third generation of architectures, the first new generation since the introduction of programmable settlement by Ethereum. Namada is Anoma’s first fractal instance: a proof-of-stake Layer 1 blockchain protocol designed to provide users with asset-agnostic, interchain privacy. The key innovations include Zcash-like shielded transfers for any assets (fungible and non-fungible), incentivised privacy sets, and interoperability with Ethereum via a custom bridge and with the Cosmos ecosystem and others via IBC. As components of these vertically integrated protocols, Heliax builds many modular components which can be used independently or jointly, such as the Juvix language, Typhon consensus suite, Taiga private state transition framework, and VampIR polynomial circuit compiler. Heliax is a remote-first (but not remotely-only) team, currently composed of +50 cross-disciplinary members located around the world.

Closing date for applications:

Contact: Christopher Goes - cwgoes@heliax.dev

More information: https://heliax.dev/jobs/zero-knowledge-cryptographer-protocol-developer/

Expand

01 October 2022

University of Waterloo, Department of Combinatorics and Optimization; Waterloo, Ontario, Canada
Job Posting Job Posting

The Department of Combinatorics and Optimization at the University of Waterloo invites applications from qualified candidates for a 1.5-year postdoctoral fellowship appointment in cryptography under the supervision of Prof. Douglas Stebila. Expertise in cryptography is desired, particularly in the areas of cryptographic protocols, post-quantum cryptography, or digital credentials.

A Ph.D. degree and evidence of excellence in research are required. Successful applicants are expected to maintain an active program of research. The annual salary is $60,000. In addition, a travel fund of $3,000 per year is provided. The effective date of appointment is January 1, 2023 – June 30, 2024. However, dates are negotiable.

Interested individuals should apply using the MathJobs site https://www.mathjobs.org/jobs/list/20495. Applications should include a cover letter describing their interest in the position, a curriculum vitae and research statement and at least three reference letters.

Inquiries may be addressed to Douglas Stebila, Associate Professor (dstebila@uwaterloo.ca), Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1. The deadline for application is October 15, 2022. Late applications will be considered until the position is filled.

Closing date for applications:

Contact: Douglas Stebila (dstebila@uwaterloo.ca)

More information: https://www.mathjobs.org/jobs/list/20495

Expand
New Jersey Institute of Technology
Job Posting Job Posting
The Ying Wu College of Computing (YWCC) at the New Jersey Institute of Technology (NJIT) invites applications for a senior faculty member to serve as the Director of the Institute for Cybersecurity. Candidates must have a PhD in computer science or a related discipline with a demonstrated track record of scholarly accomplishments commensurate with the appointment at the rank of Associate Professor or above. Candidates with doctorates from top worldwide institutions are especially welcome to apply.

The successful candidate will hold a faculty appointment in the department of Computer Science and is expected to lead the creation of the Institute for Cybersecurity, which builds on top of existing research and educational strengths in cybersecurity and will span multiple departments across NJIT. Exceptional organizational and communication skills, financial acumen, and the potential to fundraise are essential. As a faculty member of the Computer Science department, the successful candidate is expected to contribute to the academic life of the department, in terms of education, research and service.

NJIT is a Carnegie R1 Doctoral University (Very High Research Activity), with $166M research expenditures in FY21. The Computer Science Department has 31 tenured/tenure track faculty, with eight NSF CAREER awardees and one DARPA Young Investigator recipient. The department conducts research on real-world grand challenges in computer science and plays a key role in the NJIT Cybersecurity Research Center. The department is designated by the NSA as a National Center for Academic Excellence in Cyber Defense, and it hosts an NSF Scholarship for Service program.

To formally apply for the position, please submit your application at https://academicjobsonline.org/ajo/jobs/22924.

Applications received by December 31, 2022 will receive full consideration. However, applications are welcome until the positions are filled, and will be evaluated as they are received. Contact address for inquiries: cs-faculty-search@njit.edu.

Closing date for applications:

Contact: cs-faculty-search@njit.edu

More information: https://academicjobsonline.org/ajo/jobs/22924

Expand
New Jersey Institute of Technology
Job Posting Job Posting
The Computer Science Department at the New Jersey Institute of Technology (NJIT) invites applications for tenure-track faculty positions starting in Fall 2023. We seek applicants whose research focuses on cybersecurity, as well as applicants in other areas of computer science. We aim to hire at the rank of Assistant Professor, but exceptional candidates at higher ranks will also be considered.

Applicants must have a Ph.D. degree by Summer 2023 in a relevant discipline, and outstanding academic credentials that demonstrate their ability to conduct independent world-class research and attract external funding. Candidates with doctorates from top worldwide institutions are especially welcome to apply. NJIT is a Carnegie R1 Doctoral University (Very High Research Activity), with $166M research expenditures in FY21. The Computer Science Department has 31 tenured/tenure track faculty, with eight NSF CAREER awardees and one DARPA Young Investigator recipient. The department conducts research to solve real-world grand challenges in computer science and plays a key role in the NJIT Cybersecurity Research Center.

Applied research, collaboration with industry, innovation and entrepreneurship are encouraged and supported. Performance and tenure expectations are aligned with those of the broader academic computing community, with an emphasis on grant funding and publishing in top conferences and journals, and contributing to our undergraduate and graduate instructional programs.

To formally apply for the position, please submit your application materials at https://academicjobsonline.org/ajo/jobs/22915.

Applications received by December 31, 2022 will receive full consideration. However, applications are welcome until the positions are filled, and will be evaluated as they are received. Contact address for inquiries: cs-faculty-search@njit.edu.

Closing date for applications:

Contact: cs-faculty-search@njit.edu

More information: https://academicjobsonline.org/ajo/jobs/22915

Expand
Duality Technologies
Job Posting Job Posting
We are hiring a Scientist for the Cryptography team. In this position you will be part of a team developing and implementing cryptographic protocols for encrypted computations. The Cryptography team includes well-known researchers and is a major contributor to the PALISADE and OpenFHE homomorphic encryption libraries.

Requirements:
  • PhD in Computer Science, Math, or a related field
  • Experience in software development with C++
  • Research experience in lattice-based cryptography
  • Publications in top-tier conferences
Desired Skills:
  • Experience in fully homomorphic encryption
  • Experience in secure multiparty computation
  • Experience with hardware acceleration of lattice-based cryptography
Expand
Purdue University, Computer Science Department
Job Posting Job Posting

Applications are invited for a postdoctoral research position in distributed cryptography. The researcher will be working on one or more areas from:

  • foundational aspects of blockchains
  • secure multiparty computation
  • cryptographic protocols
  • Byzantine fault tolerance
  • algorithmic economics and applications to blockchains
  • cryptocurrencies and decentralized finance

Applicants are expected to hold a PhD in computer science or related field, and must have published papers at a top-tier venue in cryptography, theoretical computer science, security, blockchain and cryptocurrencies, or distributed computing. Applications that do not satisfy the above will not be considered.

The position will be available starting in Spring 2023 (earlier starting date might also be considered), and remain open until filled.

The Computer Science Department at Purdue University is a top-ranked computer science departments in the US with an outstanding reputation in security and cryptography, and more than 13 faculty whose research focus is in these areas. Purdue is also the home to the Center for Education and Research in Information Assurance and Security (CERIAS), a cross-cutting institute at Purdue University, and the world’s foremost interdisciplinary academic center for cyber and cyber-physical systems, consisting more than a hundred researchers addressing issues of security, privacy, resiliency, trusted electronics, autonomy and explainable artificial intelligence.

The postdoctoral researcher will work under the supervision of Prof. Vassilis Zikas and join the vibrant and rapidly-growing Purdue Blockchain Lab.

To apply, please use the following link: https://forms.gle/GkYXRndZ3yuNQegP9

Closing date for applications:

Contact: Prof. Vassilis Zikas, Purdue University

More information: https://www.cs.purdue.edu/blockchain/index.html

Expand
University of Waterloo, Department of Combinatorics & Optimization; Waterloo, Ontario, Canada
Job Posting Job Posting

The Department of Combinatorics and Optimization (https://math.uwaterloo.ca/co) in the Faculty of Mathematics at the University of Waterloo invites applications for one tenure-track faculty position at the rank of Assistant Professor. Associate or Full Professors with tenure will be considered in special cases that substantially enhance the reputation of the department.

The focus area for this position is cryptography, and emphasis will be given to candidates in this area. However, stellar candidates in the research areas of algebraic combinatorics, continuous optimization, discrete optimization, and graph theory, who can greatly enhance the research and teaching profile of the department, are also welcome to apply.

A Ph.D. degree and evidence of excellence in research and teaching are required. Successful applicants are expected to maintain an active program of research, to attract and supervise graduate students, and to participate in undergraduate and graduate teaching. The salary range for the position is $105,000 to $155,000. Negotiations beyond this salary range will be considered for exceptionally qualified candidates. The anticipated start date will be July 1, 2023.

Interested individuals should apply using the MathJobs site (https://www.mathjobs.org/jobs/list/20728). Applications should include a curriculum vitae, research and teaching statements, and up to three reprints/preprints. In addition, at least three reference letters should be submitted.

If you have any questions regarding the position, the application process, assessment process, or eligibility, please contact combopt@uwaterloo.ca or Chaitanya Swamy, Chair, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1. The closing date for receipt of applications is December 1, 2022.

For more information and the full job description, please see https://www.mathjobs.org/jobs/list/20728.

Closing date for applications:

Contact: Chaitanya Swamy, Chair, Department of Combinatorics and Optimization

More information: https://www.mathjobs.org/jobs/list/20728

Expand
University of Montpellier
Job Posting Job Posting

The ECO team (https://www.lirmm.fr/eco/) at LIRMM (CNRS/Univ Montpellier, France) has several post-doc funding of various duration.

Topics include:

  • error correcting codes, decoding algorithms, computer algebra and algorithms for coding theory, error correcting codes and lattices. The postdoctoral fellow will join the BARRACUDA project (https://barracuda.inria.fr/fr/)
    Contact : Eleonora Guerrini (eleonora.guerrini@lirmm.fr)
  • public-key cryptography, multi-party computation, advanced protocols within the SANGRIA project (https://lip6.fr/Damien.Vergnaud/projects/sangria/) and the SecureCompute (PEPR) project.
    Contact : Fabien Laguillaumie (fabien.laguillaumie@lirmm.fr)

If you are interested, please send an email including your CV and a list of publications.

Closing date for applications:

Contact: Fabien Laguillaumie

Expand
University of Georgia, Department of Mathematics, Athens, GA, USA
Job Posting Job Posting

The Department of Mathematics at the University of Georgia invites applications for a tenure-track Assistant Professor position starting August 2023. Applicants should hold a Ph.D. in Mathematics or related field at the time of appointment. Candidates for this position should have a strong research background/record in Cryptography and demonstrate a commitment to excellence in teaching and mentoring undergraduate and graduate students. Complete applications must be received by December 1, 2022, to ensure full consideration, but review will continue until the position is filled.

The University of Georgia (UGA) is making significant investments in Artificial Intelligence (AI) and Data Science to address some of society’s most urgent challenges. To this end, UGA has established the Presidential Interdisciplinary Faculty Hiring Initiative in Data Science and AI, which aims to recruit 50 new faculty members within the next two years who will educate students and advance research in Data Science and AI, including both foundational research and applied research in cross-cutting areas such as cybersecurity, cyber-physical systems, infectious diseases, integrative precision agriculture, ethics, resilient communities and the environment.

Within UGA’s broad initiative, the School of Computing, in collaboration with the Department of Mathematics and the UGA Institute for Cybersecurity and Privacy, has established a cluster hire initiative on Secure AI Systems that can support a variety of sensitive applications, including (but not limited to) secure, privacy-preserving, and efficient learning for biomedical applications. This cluster hire initiative aims to hire four new faculty members over two years in the following areas of research: Cryptography (this position), Applied Cryptography with applications to Machine Learning systems and algorithms, Computer Vision, and High-Performance AI Systems.

Closing date for applications:

Contact: Prof. Dino Lorenzini Chair of the Hiring Search Committee

More information: https://www.ugajobsearch.com/postings/284491

Expand
CryptoExperts
Job Posting Job Posting

The ambition of CryptoExperts is to develop innovative technologies in cryptography to meet the emerging needs of the security industry. This ambition is reflected through a team of multi-experts in cryptography and engineers endowed with a particular taste for research, innovation and practical applications.

As software engineer you will be working alongside a team of cryptographers to address the needs of CryptoExperts’ customers in terms of software development and evaluation. You will contribute to the internal R&D effort of the company, notably in terms of design and implementation of

  • cryptographic libraries targeting high efficiency and high security in constrained environments (e.g. embedded systems),
  • a framework for the design and implementation of white-box cryptography components (compilation and obfuscation).
You will also be involved in various applied research projects and contribute to the development of prototypes of innovative cryptographic protocols and applications.

Please refer to the full job offer for complete information.

Closing date for applications:

Contact: Matthieu Rivain

More information: https://www.cryptoexperts.com/job-offer-software-engineer.pdf

Expand
CryptoExperts
Job Posting Job Posting

The ambition of CryptoExperts is to develop innovative technologies in cryptography to meet the emerging needs of the security industry. This ambition is reflected through a team of multi-experts in cryptography and engineers endowed with a particular taste for research, innovation and practical applications.

As a cryptography expert, you will contribute to R&D and consulting missions for various customers, including

  • security assessments for systems/applications that involve cryptography,
  • development of secure and optimized cryptographic libraries,
  • feasibility study and the tailor-made design of specific cryptographic solutions.

You will also take part to various research projects of the company on topics such as homomorphic encryption, white-box cryptography, post-quantum cryptography, secure cryptographic implementations, security proofs against side-channel attacks, zero-knowledge proofs.

Please refer to the full job offer for complete information.

Closing date for applications:

Contact: Matthieu Rivain

More information: https://www.cryptoexperts.com/job-offer-cryptography-expert.pdf

Expand

30 September 2022

Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
ePrint Report ePrint Report
With the recent availability of cloud quantum computing services, the question of verifying quantum computations delegated by a client to a quantum server is becoming of practical interest. While Verifiable Blind Quantum Computing (VBQC) has emerged as one of the key approaches to address this challenge, current protocols still need to be optimised before they are truly practical.

To this end, we establish a fundamental correspondence between error-detection and verification and provide sufficient conditions to both achieve security in the Abstract Cryptography framework and optimise resource overheads of all known VBQC-based protocols. As a direct application, we demonstrate how to systematise the search for new efficient and robust verification protocols for $\mathsf{BQP}$ computations. While we have chosen Measurement-Based Quantum Computing (MBQC) as the working model for the presentation of our results, one could expand the domain of applicability of our framework via direct known translation between the circuit model and MBQC.
Expand
Hanno Becker, Fabien Klein
ePrint Report ePrint Report
In this work, we present a tool for the automated super optimization of Armv8.1-M + Helium assembly on Cortex-M55. It consists of two parts: Firstly, a generic framework SLOTHY - [S]uper ([L]azy) [O]ptimization of [T]ricky [H]andwritten assembl[Y] - for expressing the super optimization of small pieces of assembly as a constraint satisfaction problem which can be handed to an external solver -- concretely, we pick CP-SAT from Google OR-Tools. Secondly, an instantiation Helight55 of SLOTHY with the Armv8.1-M architecture and aspects of the Cortex-M55 microarchitecture. We demonstrate the power of SLOTHY and Helight55 by using it to optimize two workloads: First, a radix-4 complex Fast Fourier Transform (FFT) in fixed-point arithmetic, fundamental in Digital Signal Processing. Second, the instances of the Number Theoretic Transform (NTT) underlying CRYSTALS-Kyber and CRYSTALS-Dilithium, two recently announced winners of the NIST Post-Quantum Cryptography standardization project.
Expand
Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
ePrint Report ePrint Report
We initiate the study of Private Certifier Intersection (PCI), which allows mutually distrusting parties to establish a trust basis for cross-validation of claims if they have one or more trust authorities (certifiers) in common. This is one of the essential requirements for verifiable presentations in Web 3.0, since it provides additional privacy without compromising on decentralization. A PCI protocol allows two or more parties holding certificates to identify a common set of certifiers while additionally validating the certificates issued by such certifiers, without leaking any information about the certifiers not in the output intersection. In this paper, we formally define the notion of multi-party PCI in the Simplified-UC framework for two different settings depending on whether certificates are required for any of the claims (called PCI-Any) or all of the claims (called PCI-All). We then design and implement two provably secure and practically efficient PCI protocols supporting validation of digital signature-based certificates: a PCI-Any protocol for ECDSA-based certificates and a PCI-All protocol for BLS-based certificates. The technical centerpiece of our proposals is the first secretsharing-based MPC framework supporting efficient computation of elliptic curve-based arithmetic operations, including elliptic curve pairings, in a black-box way. We implement this framework by building on top of the well-known MP-SPDZ library using OpenSSL and RELIC for elliptic curve operations, and use this implementation to benchmark our proposed PCI protocols in the LAN and WAN settings. In an intercontinental WAN setup with parties located in different continents, our protocols execute in less than a minute on input sets of size 40, which demonstrates the practicality of our proposed solutions.
Expand
Hu Yupu, Dong Siyue, Wang Baocang, Dong Xingting
ePrint Report ePrint Report
Indistinguishability obfuscation (IO) is at the frontier of cryptography research. Lin16/Lin17 obfuscation schemes are famous progresses towards simplifying obfuscation mechanism. Their basic structure can be described in the following way: to obfuscate a polynomial-time-computable Boolean function $c(x)$, first divide it into a group of component functions with low-degree and low-locality by using randomized encoding, and then hide the shapes of these component functions by using constant-degree multilinear maps (rather than polynomial degree ones).

In this short paper we point out that Lin16/Lin17 schemes are invalid. More detailedly, they cannot achieve reusability, therefore they are not true IO schemes, but rather garbling schemes which are one-time schemes.
Expand
◄ Previous Next ►