IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
24 March 2023
Gideon Samid
Thomas Attema, Pedro Capitão, Lisa Kohl
In this work, we present a new 2-party local share conversion procedure, which allows to locally convert noise encoded shares to non-noise plaintext shares such that the parties can detect whenever a (potential) error occurs and in that case resort to an alternative conversion procedure. Building on this technique, we present the first HSS for branching programs from (Ring-)LWE with polynomial input share size which can make use of the efficient multiplication procedure of Boyle et al.~(Eurocrypt 2019) and has no correctness error. Our construction comes at the cost of a -- on expectation -- slightly increased output share size (which is insignificant compared to the input share size) and a more involved reconstruction procedure. More concretely, we show that in the setting of 2-server private counting queries we can choose ciphertext sizes of only a quarter of the size of the scheme of Boyle et al. at essentially no extra cost.
23 March 2023
Université de Montréal, Canada
- New cryptographic protocols based on uniquely quantum phenomena
- Security of classical cryptography against quantum adversaries
- Cryptography based on the hardness of keeping qubits in quantum superposition
- Quantum zero-knowledge proof systems
- Quantum multiparty secure computation
- Quantum money
Requirements The ideal applicant will have a strong background in theoretical computer science and mathematics, knowledge of cryptography and/or quantum information, and strong written and oral communication skills.
Information on the Ph.D. program can be found here: https://diro.umontreal.ca/english/programs/graduate-programs/phd-in-computer-science/
Closing date for applications:
Contact: Philippe Lamontagne (philippe.lamontagne.1@umontreal.ca)
IPFS Force; Shanghai, China (remote friendly)
Closing date for applications:
Contact: judith.li@protocol.ai - please send CV's to this email
More information: https://github.com/ipfs-force-community
21 March 2023
Royal Holloway, University of London
The Department of Information Security has a record of outstanding research and hosts established research groups in Systems and Software Security, Smart Card and Internet of Things Security, Cryptography, Interdisciplinary Security, and Ethnography.
For one of the posts, we are looking for applicants with interests that would support our new Media Broadcasting Security Centre (MBSC). For the other two we welcome applications from a broad range of areas related to information security, especially those with expertise and experience in software and systems security and applications of AI in security. Applicants should either have, or have the potential for producing, high quality publications and attracting significant research funding. Applicants will have a track record demonstrated excellence, or will show the potential for excellence, in delivering undergraduate and postgraduate teaching and the supervision of both undergraduate and postgraduate students. The post holder will be expected to contribute strongly to the development of research impact, and the successful applicant will have, or have the potential to have, a strong track record in this area.
The post is based in Egham, Surrey where the College is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London. There will be also the opportunity to develop and deliver postgraduate programmes at our Central London campus, located in Bloomsbury.
Closing date for applications:
Contact: For an informal discussion about the post, please contact Professor Chris Mitchell (c.mitchell@rhul.ac.uk).
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0323-132
18 March 2023
Nillion
If you enjoy solving challenging problems, having an impact on a fast-paced remotely managed team and like being surrounded by inspiring coworkers, then keep reading!
We bring to life fast, permissionless, decentralized computation. The Nillion team are looking for talented cryptographers to help build a new paradigm in decentralized computing with the aim of redefining network computation on private data.
As a Cryptographer at Nillion you will learn, design, and implement cryptographic protocols within the larger framework of distributed and decentralized systems. You will be responsible for turning groundbreaking research into commercially viable and reliable products by analyzing, proposing, and validating innovative software solutions within a decentralized computing environment.
Closing date for applications:
Contact: Roisin Kavanagh
More information: https://apply.workable.com/nillion/j/172D91EBF3/
RWTH Aachen University, Security and Privacy in Industrial Cooperation; Aachen, Germany
We offer the opportunity to pursue a PhD in the field of 5G/6G cybersecurity in an excellent academic and research environment. As common in Germany, you will be employed full-time (part-time available upon request) at the university with a gross salary of approx. 52k Euro for the first year.
Together with cooperation partners from industry and academia, you will research the cyber security of future industrial 5G/6G communication networks with regard to efficient end-to-end security in the area of critical infrastructures and/or the detection of attacks on 5G/6G networks in production as part of research projects funded by the German Federal Office for Information Security. You will have the opportunity to actively develop and work on your own research topic in this highly topical and internationally visible research area in order to lay the foundations for your PhD project.
The research activities in our group typically include not only the design of new security processes but also their implementation and evaluation. To this end, you will work closely with students in the context of final theses, international research internships, and the supervision of student and research assistants. As part of this job, you will be expected to work independently on challenging research projects in the field of cybersecurity for industrial 5G/6G communications. This activity includes, among other things, the preparation of scientific publications, the participation in (and organization of) project meetings, the transfer of project results in courses, and the presentation of project results at international conferences.
Closing date for applications:
Contact: Prof. Dr. Martin Henze, henze@cs.rwth-aachen.de
More information: https://www.rwth-aachen.de/go/id/kbag/file/V000004739/
University of Wollongong, Australia
Closing date for applications:
Contact: Khoa Nguyen (https://sites.google.com/view/khoantt/, khoa@uow.edu.au)
ConsenSys
-
__________Qualifications:
Strong background in cryptography, with a focus on zero-knowledge proof systems.
Experience with research and development, including writing technical papers and presenting at conferences.
Strong problem-solving and analytical skills.
Excellent communication and teamwork abilities.
Closing date for applications:
Contact: Tazmin Jaffer
More information: https://consensys.net/open-roles/gh_jid?gh_jid=4879380
NEC Laboratories Europe
We are looking for a Research Associate to contribute, in the frame of an EU funded project, to the research and the development of solutions in the area of security and privacy, with a special focus on distributed systems and blockchain security.
Required Skills and Experience:
- Strong experience in system security and distributed systems
- Experience in blockchain technologies
- Experience in software development with programming languages such as Python, Golang, Java, or C/C++
- Excellent interpersonal and communication skills in English
Our work ranges from foundational research and IPR creation to prototype development for NEC products and services.
At NEC Laboratories Europe, we provide a collaborative, team-working environment that supports your career aspirations. Our working language is English. The position is initially limited to two years.
NEC Laboratories Europe is located in the beautiful city of Heidelberg, Germany. Home office schemes within the country may be offered. Heidelberg is an international and lively city with a large number of exciting cultural, entertainment, and outdoor activities.
To apply, please follow the link to the job description by clicking on the job title, or paste:
https://jobs.neclab.eu/jobs/openings/staff/NEC-NLE-2301-461-SEC-1-Research_Associate_%5b2301_461_SEC%5d.pdf
Application deadline: March 27, 2023
Closing date for applications:
Contact: Giorgia Marson (giorgia.marson@neclab.eu)
More information: https://jobs.neclab.eu/jobs/openings/staff/NEC-NLE-2301-461-SEC-1-Research_Associate_%5b2301_461_SEC%5d.pdf
Cryptology Group, CWI, Amsterdam, The Netherlands
Requirements: Candidates are required to hold a PhD in mathematics or computer science, with a specialization in cryptology, and they are expected to have a good knowledge of post-quantum cryptography and/or of quantum information science in general. Candidates must have a strong track record (ideally with publications at IACR conferences) and good academic writing and presentation skills. An additional plus is an interest in practical aspects of the migration to post-quantum secure schemes.
Application: Applications should include a detailed CV, a motivation letter, and at least three references, and they should be sent to the below email address. Applications will be reviewed until the position is filled.
Closing date for applications:
Contact: Serge Fehr (serge.fehr@cwi.nl)
Temasek Laboratories, National University of Singapore, Singapore
Description. Candidates will work in the area of post-quantum cryptography. Candidates will conduct research on design and analysis of post-quantum cryptography. The work may require to carry out some simulations.
Requirements. Candidates are required to have a PhD degree in Mathematics or Computer Science. Experience in one or more of these relevant background areas is an advantage: cryptography, algebra, algebraic number theory or coding theory. Programming skills in Magma software or SAGEMATH software are an advantage. Candidate must be a team worker and able to conduct independent research.
Information and application. All candidates should include their full CV and transcripts and send to Dr Chik How Tan, tsltch@nus.edu.sg. The application deadline is 15 May 2023. We encourage early applications and review of applications will begin immediately. Only shortlisted applications will be notified.
Closing date for applications:
Contact: Dr Chik How Tan (tsltch@nus.edu.sg)
Technical University of Darmstadt, Germany
The Cryptography and Privacy Engineering Group (ENCRYPTO) @Department of Computer Science @TU Darmstadt offers a full position for a Postdoctoral Researcher in Cryptography & Privacy Engineering, available immediately and for initially until 31.1.2025.
Our mission is to demonstrate that privacy can be efficiently protected in real-world applications via cryptographic protocols.TU Darmstadt is a top research university for IT security, cryptography and computer science in Europe. The position is based in the City of Science Darmstadt, which is very international, livable and well-connected in the Rhine-Main area around Frankfurt. Knowledge of German is helpful, but not required, and TU Darmstadt offers a Welcome Center and language courses.
Job descriptionAs postdoc @ENCRYPTO, you conduct research, build prototype implementations, and publish and present the results at top venues. You are involved in project management, teaching, co-advise PhD students and supervise thesis students & student research assistants. The position is co-funded by the ERC Starting Grant “Privacy-preserving Services on the Internet” (PSOTI), where we build privacy-preserving services on the Internet, which includes designing protocols for privately processing data among untrusted service providers using secure multi-party computation and implementing a scalable framework.
Your profile- Completed PhD degree (or equivalent) at a top university in IT security, computer science, applied mathematics, electrical engineering, or a similar area
- Publications at top venues (CORE rank A*/A) for IT security/applied cryptography (e.g., EUROCRYPT, S&P, CCS, NDSS, USENIX SEC), ideally on cryptographic protocols and secure computation
- Experience in software development, project management and supervising students
- Self-motivated, reliable, creative, can work in a team, and want to do excellent research on challenging scientific problems with practical relevance
- The working language at ENCRYPTO is English, so you must be able to discuss/write/present scientific results in English, whereas German is not required.
Closing date for applications:
Contact: Thomas Schneider (application@encrypto.cs.tu-darmstadt.de)
More information: https://encrypto.de/POSTDOC
Spetses, Greece, 21 May - 26 May 2023
Voss, Norway, 3 September - 8 September 2023
Submission deadline: 15 April 2023
Notification: 15 June 2023
Groningen, Netherlands, 29 November - 1 December 2023
Submission deadline: 27 July 2023
Quito, Ecuador, 2 October - 6 October 2023
Submission deadline: 27 May 2023
Notification: 22 July 2023
College Park, USA, 14 August - 18 August 2023
Submission deadline: 12 April 2023
Notification: 21 June 2023
College Park, Maryland, USA, 16 August - 18 August 2023
Submission deadline: 24 April 2023
Notification: 5 June 2023
16 March 2023
Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse
We demonstrate that security of both PoW and PoS longest chain, when operating at capacity, requires carefully designed scheduling policies that correctly prioritize which blocks are processed first, as we show attack strategies tailored to such policies. In PoS, we show an attack exploiting equivocations, which highlights that the throughput of the PoS longest chain protocol with a broad class of scheduling policies must decrease as the desired security error probability decreases. At the same time, through an improved analysis method, our work is the first to identify block production rates under which PoW longest chain is secure in the bounded bandwidth setting. We also present the first PoS longest chain protocol, SaPoS, which is secure with a block production rate independent of the security error probability, by using an ‘equivocation removal’ policy to prevent equivocation spamming.