IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 January 2024
Daniel Noble, Brett Hemenway Falk, Rafail Ostrovsky
This comes as a surprise, since the Goldreich-Ostrovsky lower bound shows that the related problem of Oblivious RAMs requires logarithmic overhead in the number of memory locations accessed. It was shown that this bound also applies in the multi-server ORAM setting, and therefore also applies in the DORAM setting. Achieving sub-logarithmic communication therefore requires accessing and using $\Omega(\log(n) \cdot d)$ bits of memory, without engaging in communication for each bit accessed. Techniques such as Fully Homomorphic Encryption and Function Secret Sharing allow secure selection of the relevant memory locations with small communication overhead, but introduce computational assumptions.
In this paper we show that it is possible to avoid a logarithmic communication overhead even without any computational assumptions. Concretely, we present a 3-party honest-majority DORAM that is secure against semi-honest adversaries. The protocol has communication cost $$\Theta\left((\log^2(n) + d) \cdot \frac{\log(n)}{\log(\log(n)}\right)$$ For any $d = \Omega(\log^2(n))$ the overhead is therefore $\Theta(\log(n)/\log(\log(n)))$. Additionally, we show a subtle flaw in a common approach for analyzing the security of Oblivious Hash Tables. We prove our construction secure using an alternative approach.
Sulaiman Alhussaini, Craig Collett, Serge˘ı Sergeev
Aviad Ben Arie, Tamir Tassa
Alessandro Budroni, Isaac A. Canales-Martínez, Lucas Pandolfo Perin
Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo
Ran Canetti, Claudio Chamon, Eduardo Mucciolo, Andrei Ruckenstein
We start by formulating a new (and relatively weak) obfuscation task regarding the ability to obfuscate random circuits of bounded length. We call such obfuscators random input & output (RIO) obfuscators. We then show how to construct indistinguishability obfuscators for all (unbounded length) circuits given only an RIO obfuscator --- under a new assumption regarding the pseudorandomness of sufficiently long random reversible circuits with known functionality, which in turn builds on a conjecture made by Gowers (Comb. Prob. Comp. '96) regarding the pseudorandomness of bounded-size random reversible circuits. Furthermore, the constructed obfuscators satisfy a new measure of security - called random output indistinguishability (ROI) obfuscation - which is significantly stronger than IO and may be of independent interest.
We then investigate the possibility of constructing RIO obfuscators using local, functionality preserving perturbations. Our approach is rooted in statistical mechanics and can be thought of as locally ``thermalizing'' a circuit while preserving its functionality. We provide candidate constructions along with a pathway for analyzing the security of such strategies.
Given the power of program obfuscation, viability of the proposed approach would provide an alternative route to realizing almost all cryptographic tasks under hardness assumptions that are very different from standard ones. Furthermore, our specific candidate obfuscators are relatively efficient: the obfuscated version of an n-wire, m-gate (reversible) circuit with security parameter k has n wires and poly(n,k)m gates. We hope that our initial exploration will motivate further study of this alternative path to cryptography.
Tamir Tassa, Avishay Yanai
Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
Alex Kampa
To illustrate the concept, a concrete application of this method to a simple binary voting scheme is then described in detail.
Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López
Vasyl Ustimenko
Yuval Ishai, Eyal Kushnir, Ron D. Rothblum
Our notion relates the ability to accomplish some task when given a ciphertext, to accomplishing the same task without the ciphertext, in the context of communication complexity. Thus, we say that a scheme is combinatorially homomorphic if there exists a communication complexity problem $f(x,y)$ (where $x$ is Alice's input and $y$ is Bob's input) which requires communication $c$, but can be solved with communication less than $c$ when Alice is given in addition also an encryption $E_k(y)$ of Bob's input (using Bob's key $k$).
We show that this definition indeed captures pre-existing notions of homomorphic encryption and (suitable variants are) sufficiently strong to derive prior known implications of homomorphic encryption in a conceptually appealing way. These include constructions of (lossy) public-key encryption from homomorphic private-key encryption, as well as collision-resistant hash functions and private information retrieval schemes.
02 January 2024
Dubrovnik, Croatia, 9 September - 13 September 2024
Worcester, USA, 5 April 2024
Submission deadline: 2 February 2024
Notification: 5 March 2024
Vienna, Austria, 30 July - 2 August 2024
Submission deadline: 28 February 2024
Notification: 3 May 2024
1 July 2024
Submission deadline: 1 July 2024
UCSC---CSE Assistant Professor, Security and Privacy (initial review Jan. 5, 2024)
Closing date for applications:
Contact: Ioannis Demertzis or Alvaro Cardenas
More information: https://recruit.ucsc.edu/JPF01635
AIT Austrian Institute of Technology; Vienna, Austria
The cryptography team is conducting research in the domain of public key cryptography, including secure communication, privacy-enhancing technologies, and long-term and post-quantum security. Our research covers the full spectrum from idea creation to the development of prototypes and demonstrators.
The team is seeking to grow, and is therefore looking for a PhD-student in the fields of privacy and security in distributed systems.
Through our AIT-PhD programme with 150 internationals students, conducted in collaboration with renowned universities, applicants will have the opportunity to conduct their PhD thesis in collaboration with our experts and our national and international project partners from industry or other research institutions.
Requirements:
- Applicants are required to hold a MSc degree (or equivalent) in computer science, mathematics, or a related field
- Basic knowledge of cryptography (at least one course specializing on cryptography) is expected
- Special interest in applied research and the solution of practical problems, in particular in the areas of cryptography and information security
- High level of commitment and ability to work in a team
- Good knowledge of a programming language (e.g., C/C++, Rust, Java, Python) and software development is a plus
- Very good written and oral English skills; knowledge of German is not a requirement
The minimum gross annual salary on a full-time basis (38,5 h / week) according to the collective agreement is EUR 53.578,--. The actual salary will be determined individually, based on your qualifications and experience. In addition, we offer company benefits, flexible working conditions, individual training and career opportunities.
All applications (including cover letter and full CV) need to be submitted using the following link: https://jobs.ait.ac.at/Job/224352
Closing date for applications:
Contact: Stephan Krenn (stephan.krenn[at]ait.ac.at)
More information: https://jobs.ait.ac.at/Job/224352
Shanghai Jiao Tong University
Applicants should have (a) a doctoral degree in Computer Science, Electronic Engineering, Communication, Mathematics or Statistics; (b) an established track record in research and scholarship; (c) expertise in the cryptographic and security research areas; and (d) a demonstrated commitment to excellence in teaching.
The school will provide highly competitive remuneration packages and assist applicants to apply for various national, provincial and ministerial level talent programs such as “Outstanding Youth Talents Program”, Shanghai “Talents Program”,etc. We will also assist on employment of spouses, schooling for children and medical care.
Closing date for applications:
Contact:
Chaoping Xing, emial: xingcp@sjtu.edu.cn; Ni Liang, email: liangni@sjtu.edu.cn
Luxembourg Institute of Science and Technology
How will you contribute? Your specific mission includes, but is not limited to, participating into the following activities along with the project partners:
- To design and develop privacy-preserving federated data management technologies
- To prototype privacy-preserving technologies for cyberthreat intelligence, data analysis or cybersecurity
- To develop open-source software
- To validate the effectiveness of developed technologies You are in charge of disseminating and promoting the research activities that will be carried out, whether through publications, prototype development or technical reports
- Hold a PhD. degree in Computer Science or related disciplines
- Have good programming skills (particularly experience on Python and C++)
- Have good track record on applied cryptography, such as secure multiparty computation and homomorphic encryption. Knowledge on secure aggregation techniques or zero-knowledge proofs is a plus.
- Demonstrate strong interest and experience in anonymization techniques such as differential privacy, Google’s RAPPOR
Closing date for applications:
Contact: Orhan Ermis
More information: https://app.skeeled.com/offer/6554879c69ccf56b0c1432df?utm_id=60fed4c509c80d16d1bbe536&utm_medium=OFFERS_PORTAL&language=en&show_description=true