IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
25 October 2022
Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
ePrint ReportMasahito Ishizaka, Kazuhide Fukushima
ePrint ReportAndreas Erwig, Siavash Riahi
ePrint ReportIn this work, we introduce the notion of adaptor wallets. Adaptor wallets allow parties to securely use and maintain adaptor signatures in the Blockchain setting. Our adaptor wallets are both deterministic and operate in the hot/cold paradigm, which was first formalized by Das et al. (CCS 2019) for standard signature schemes. We introduce a new cryptographic primitive called adaptor signatures with rerandomizable keys, and use it to generically construct adaptor wallets. We further show how to instantiate adaptor signatures with rerandomizable keys from the ECDSA signature scheme and discuss that they can likely be built for Schnorr and Katz-Wang schemes as well. Finally, we discuss the limitations of the existing ECDSA- and Schnorr-based adaptor signatures w.r.t. deterministic wallets in the hot/cold setting and prove that it is impossible to overcome these drawbacks given the current state-of-the-art design of adaptor signatures.
Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukerjee, Peter Rindal
ePrint ReportDahlia Malkhi, Atsuki Momose, Ling Ren
ePrint ReportAriel Gabizon, Dmitry Khovratovich
ePrint ReportValentina Pribanić
ePrint ReportShanjie Xu, Qi Da, Chun Guo
ePrint ReportDebasmita Chakraborty
ePrint ReportDOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
Bo Yang, Yanchao Zhang, Dong Tong
ePrint ReportJames Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantiang Gong
ePrint ReportYu Liu, Haodong Jiang, Yunlei Zhao
ePrint ReportMarwan Zeggari, Renaud Lambiotte, Aydin Abadi
ePrint ReportGiacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Naehrig, Michael Meyer, Bruno Sterner
ePrint Report24 October 2022
Asiacrypt
More information and registration instructions can be found at https://asiacrypt.iacr.org/2022/
Some rooms at the venue + nearby hotels reserved for attendees at cut prices.
Stipends may still be available.
University of Cambridge, Cambridge, England
Job PostingClosing date for applications:
Contact: Interested applicants are encouraged to make informal enquiries about the post to Dr Alice Hutchings and Professor Robert Watson, Alice.Hutchings@cst.cam.ac.uk Robert.Watson@cst.cam.ac.uk
More information: https://www.jobs.cam.ac.uk/job/37371/
Academia Sinica, Taipei, Taiwan
Job PostingClosing date for applications:
Contact: Bo-Yin Yang (by at crypto.tw)
Kai-Min Chung (kmchung at iis.sinica.edu.tw)
Norwegian University of Science and Technology
Job PostingAfter six years of standardisation efforts to solicit, evaluate, and standardise one or more quantum-resistant public-key cryptographic algorithms, in the summer of 2022, the National Institute of Standards and Technology (NIST) from the USA has selected a portfolio of several algorithms. Those algorithms will be the new standards for Public-key Encryption and Key-establishment and for Digital Signatures.
We are now entering a phase where those post-quantum cryptographic standards must be efficiently implemented and deployed. The deployment phase faces challenges such as high-performance implementations, protocol updates with the post-quantum primitives, and levels of robustness and trustworthiness.
Duties of the position:
See https://www.jobbnorge.no/en/available-jobs/job/233227/associate-professor-in-post-quantum-cryptography for more details and how to apply.
Closing date for applications:
Contact: Professor Danilo Gligoroski (danilo.gligoroski@ntnu.no)
More information: https://www.jobbnorge.no/en/available-jobs/job/233227/associate-professor-in-post-quantum-cryptography
Florian Bourse, Malika Izabachène
ePrint ReportAnother desirable property of FHE called circuit privacy enables to preserve the privacy of the evaluation circuit, i.e. all the information on the bootstrapped ciphertext, including the computation that was performed to obtain it, is destroyed.
In this paper, we show how to directly build a circuit private FHE scheme from TFHE bootstrapping (Asiacrypt 2016). Our proof frame is inspired from the techniques used in Bourse etal (Crypto 2016), we provide a statistical analysis of the error growth during the bootstrapping procedure where we adapt discrete Gaussian lemmata over rings. We make use of a randomized decomposition for the homomorphic external product and introduce a public key encryption scheme with invariance properties on the ciphertexts distribution. As a proof of concept, we provide a C implementation of our sanitization strategy.
Lennart Braun, Ivan Damgård, Claudio Orlandi
ePrint ReportTo achieve this, we also design a new zero-knowledge protocol for proving multiplicative relations between encrypted values. As a result, the zero-knowledge proofs needed to get active security add only a constant factor overhead. Finally, we explain how to adapt our protocol for the so called "You-Only-Speak-Once" (YOSO) setting, which is a very promising recent approach for performing MPC over a blockchain.