IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 July 2024
Aalto University, Finland
Job PostingWe are looking for postdocs interested in working with us (Chris Brzuska and Russell W. F. Lai) on topics including but not limited to:
- Lattice-based cryptography, with special focus on the design, application, and analysis of non-standard lattice assumptions
- Succinct and/or zero-knowledge proof and argument systems
- Advanced (e.g. homomorphic, attribute-based, functional, laconic) encryption and (e.g. ring, group, threshold, blind) signature schemes
- Fine-grained cryptography (e.g. against bounded-space-time adversaries)
- Lower bounds and impossibility results
For questions about the topics, feel free to drop us an email to discuss.
For more details about the position, and for the instructions of how to apply, please refer to https://www.hiit.fi/ict-community-postdoctoral-researcher-positions/.
Closing date for applications:
Contact:
- For the position: Chris Brzuska, Russell W. F. Lai
- For the recruiting system: HIIT coordinator (see link above)
More information: https://www.hiit.fi/ict-community-postdoctoral-researcher-positions/
University of Surrey
Job PostingApplications are invited for a Postdoctoral Research Fellow, to start as soon as possible, to work on the EPSRC-funded project “PKC-Sec: Security Analysis of Classical and Post-Quantum Public Key Cryptography Assumptions”. Based within the Computer Science Research Centre, and the highly regarded Surrey Centre for Cyber Security (SCCS), the post-holder will be responsible for conducting research into three areas mentioned below, working alongside Dr Granger, and in collaboration with the official project partners, the Ethereum Foundation, PQShield and K.U. Leuven.
The aim of the project is to research and develop algorithms for solving computational problems that are foundational to the security of public key cryptography, both now and in the future. In particular, it will study:
- The discrete logarithm problem in finite fields of fixed characteristic, for which an efficient classical algorithm is potentially on the horizon;
- The security of the Legendre pseudo-random function, which is extremely well suited for multi-party computation and is used in the proof of custody construction within Ethereum, but is not so well-studied;
- The security of supersingular isogeny-based post-quantum cryptography, which although a relatively young field offers many very promising applications.
Due to their nature, any cryptographic assumptions based on mathematical constructions are potentially weaker than currently believed, and the project will deepen our understanding and assess the hardness of these natural and fundamental problems.
The successful applicant is expected to have a PhD (gained or near completion), or equivalent professional experience in computer science or a related subject in the technical areas relevant to the envisioned research.
For informal inquiries about the position, please contact Dr. Robert Granger.
Closing date for applications:
Contact: r.granger@surrey.ac.uk
More information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=021224-R
University of Amsterdam, The Netherlands
Job PostingClosing date for applications:
Contact: Kostas Papagiannopoulos - k.papagiannopoulos@uva.nl
More information: https://vacatures.uva.nl/UvA/job/Security-and-Network-Engineering-Education-Technical-Coordinator/798272902/
IRIF, Université de Paris Cité; Paris, France
Job PostingRequired qualifications: The ideal candidate for the postdoc position will hold a PhD (or be close to completion) in cryptography and be an expert in any of the areas of interest.
Salary: €3080 to €4291 gross monthly salary depending on the experience of the candidate
Dates: The starting date is flexible, starting October 2024.
Closing date for applications:
Contact: algocomp-apply@irif.fr
More information: https://www.irif.fr/postes/postdoc
University of Edinburgh
Job PostingThe position will be part of our research group, Quantum Software Lab which currently consists of more than 40 members, including eight faculty (Prof Elham Kashefi, Prof Chris Heunen, Dr Petros Wallden, Dr Myrto Arapinis, Dr Raul Garcia-Patron, Dr Mina Doosti, Dr Oliver Brown, Dr Alexandru Cojocaru). For more information, please contact a.cojocaru@ed.ac.uk with a CV and a short (up to 1 page) statement of research interests. The PhD position will have the expected starting date 1st October 2024, but later starting dates are negotiable. Candidates should apply by the 15th of July 2024, but are encouraged to reach out as early as possible. For a more detailed description, please see below.
Candidate’s profile. Applicants are expected to have (or about to obtain) a Master’s degree or equivalent (e.g., a First Class Honours) in Computer Science, Physics, or Mathematics. Outstanding candidates with a Bachelor’s degree (without a Master’s) will also be considered. A strong background in the theory of quantum computation, quantum information theory, cryptography or closely related fields is highly desirable.
Studentship and eligibility. Full time PhD tuition fees for a student with a Home or Overseas fee status; A tax free stipend of £19,237 per year for 3.5 years;
Research Environment. The School of Informatics at University of Edinburgh is one of the largest in Europe and currently the top Informatics institute in UK for research power, with 40% of its research outputs considered world-leading (top grade). University of Edinburgh is constantly ranked among the world’s top universities (among the top 20 Universities in the world in computer science) and is a highly international environment with several centres of excellence.
Closing date for applications:
Contact: a.cojocaru@ed.ac.uk
Joseph Johnston
ePrint ReportXiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, Kui Ren
ePrint ReportIn this paper, we propose $\mathsf{ROTL}$, a secure two-party protocol for LUT evaluations. Compared with FLUTE (the state-of-the-art LUT presented at Oakland '23), it achieves upto 11.6$\times$ speedup in terms of overall performance and 155$\times$ speedup in terms of online performance. Furthermore, $\mathsf{ROTL}$ can support arithmetic shares (which is required by secure LLM inference), whereas FLUTE can only support boolean shares. At the heart of $\mathsf{ROTL}$ is a novel protocol for secret-shared rotation, which allows two parties to generate additive shares of the rotated table without revealing the rotation offset. We believe this protocol is of independent interest. Based on $\mathsf{ROTL}$, we design a novel secure comparison protocol; compared with the state-of-the-art, it achieves a 2.4$\times$ bandwidth reduction in terms of online performance.
To support boolean shares, we further provide an optimization for FLUTE, by reducing its computational complexity from $O(l\cdot n^2)$ to $O(n\log n+l\cdot n)$ and shifting $O(n\log n)$ computation to the preprocessing phase. As a result, compared with FLUTE, it achieves upto 10.8$\times$ speedup in terms of overall performance and 962$\times$ speedup in terms of online performance.
Xinyao Li, Xiwen Ren, Ling Ning, Changhai Ou
ePrint ReportRostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos
ePrint ReportCharles Gouert, Nektarios Georgios Tsoutsos
ePrint ReportCharles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
ePrint ReportRostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos
ePrint ReportLars Folkerts, Nektarios Georgios Tsoutsos
ePrint ReportFelix Günther, Douglas Stebila, Shannon Veitch
ePrint ReportWe formalize the notion of obfuscated key exchange, capturing the requirement that a key exchange protocol's traffic "looks random" and that it resists active probing attacks, in addition to ensuring secure session keys and authentication. We show that the Tor network's obfs4 protocol satisfies this definition. We then show how to extend the obfs4 design to defend against stronger censorship attacks and present a quantum-safe obfuscated key exchange protocol. To instantiate our quantum-safe protocol using the ML-KEM (Kyber) standard, we present Kemeleon, a new mapping between ML-KEM public keys/ciphertexts and uniform byte strings.
Onur Gunlu
ePrint ReportThis work provides lower bounds on Wyner's common information (WCI), which is one of the two corner points of the coordination-randomness rate region characterizing the ultimate limits of randomized distributed function computation. The WCI corresponds to the case when there is no common randomness shared by the transmitter and receiver. Moreover, numerical methods are proposed to compute the other corner point for continuous-valued random variables, for which an unlimited amount of common randomness is available. Results for two problems of practical interest illustrate that leveraging common randomness can decrease the communication load as compared to the WCI corner point significantly. We also illustrate that semantic communication gains over lossless compression methods are achieved also without common randomness, motivating further research on limited common randomness scenarios.
Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, Hai Jin
ePrint ReportSangwon Kim, Siwoo Eum, Minho Song, Hwajeong Seo
ePrint ReportYujin Oh, Kyungbae Jang, Hwajeong Seo
ePrint ReportMatthieu Rambaud, Christophe Levrat
ePrint ReportOur first contribution is a new fNIM called $\mathsf{dms}$, it addresses both (ii) and (iii). It is as simple as adding Schnorr PoPs to the schoolbook pairing-based fNIM of Boldyreva (PKC'03). (ii) For a group of 1000 signers, processing these PoPs is $5+$ times faster than for the previous pairing-based PoPs, and $3+$ times faster than the processing of SMSKR, which had furthermore to be done for every new group member. (iii) In the algebraic group model (AGM), and given the current estimation of roughly 128 bits of security for the discrete logarithm (DL) in both the curves BLS12-381 and BLS12-377, then we prove a probability of forgery of $\mathsf{dms}$ no higher than about $2^{-93}$ for a time $2^{80}$ adversary. This proof of security is our main technical contribution. The only related proof before was for an interactive Schnorr-based multi-signature scheme, using Schnorr PoPs. We observe a gap in its proof, which is that the adversary has not access to a signing oracle before publishing its PoPs, although it should have. On the one hand, the gap can easily be fixed in their context. But in our context of pairing-based multi-signatures, the signing oracle produces a correlated random string which significantly complicates our extraction of the keys of the adversary. We finally provide another application of $\mathsf{dms}$, which is that it can be plugged in recent threshold signatures without setup (presented by Das et al at CCS'23, and Garg et al at SP'24), since these schemes implicitly build on any arbitrary BLS-based fNIM.
Our second contribution addresses (i), it is a very simple compiler: $\mathcal{M}to\mathcal{A}$ (multi-to-aggregate). It turns any fNIM into an fNIA, suitable for aggregation of signatures on messages with a prefix in common, with the restriction that a signer must not sign twice using the same prefix. The obtained fNIA is post-quantum as soon as the fNIM is, such as Chipmunk (CCS'23). We demonstrate the relevance for Diem by applying $\mathcal{M}to\mathcal{A}$ to $\mathsf{dms}$: the resulting fNIA enables to verify 39x faster an aggregate of 129 signatures, over messages with $7$ bits-long variable parts, than BGLS.
Justin Holmgren, Brent Waters
ePrint ReportCentral to our separation is a new hash family, which may be of independent interest. Specifically, for any $S(k) = k^{O(1)}$, any $n(k) = k^{O(1)}$, and any $m(k) = k^{\Theta(1)}$, we construct a hash family mapping $n(k)$ bits to $m(k)$ bits that is somewhere statistically correlation intractable (SS-CI) for all relations $R_k \subseteq \{0,1\}^{n(k)} \times \{0,1\}^{m(k)}$ that are enumerable by circuits of size $S(k)$.
We give two constructions of such a hash family. Our first construction uses IO, and generically ``boosts'' any hash family that is SS-CI for the smaller class of functions that are computable by circuits of size $S(k)$. This weaker hash variant can be constructed based solely on LWE (Peikert and Shiehian, CRYPTO 2019). Our second construction is based on the existence of a circular secure FHE scheme, and follows the construction of Canetti et al. (STOC 2019).