IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
08 July 2024
Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage
ePrint ReportAnil Kumar Pradhan
ePrint ReportAmos Beimel, Tal Malkin, Noam Mazor
ePrint ReportIn this work, we make significant further progress: we rule out black-box constructions of PRF from PRG that follow certain structural constraints, but may call the PRG adaptively polynomially many times. In particular, we define ``tree constructions" which generalize the GGM structure: they apply the PRG $G$ along a tree path, but allow for different choices of functions to compute the children of a node on the tree and to compute the next node on the computation path down the tree. We prove that a tree construction of logarithmic depth cannot be a PRF (while GGM is a tree construction of super-logarithmic depth). We also show several other results and discuss the special case of one-call constructions.
Our main results in fact rule out even weak PRF constructions with one output bit. We use the oracle separation methodology introduced by Gertner, Malkin, and Reingold (FOCS 2001), and show that for any candidate black-box construction $F^G$ from $G$, there exists an oracle relative to which $G$ is a PRG, but $F^G$ is not a PRF.
Ron D. Rothblum
ePrint ReportLihua Liu
ePrint ReportAny Muanalifah, Zahari Mahad, Nurwan, Rosalio G Artes
ePrint ReportFranklin Harding, Jiayu Xu
ePrint ReportThis paper serves as a first step towards characterizing the security of the Schnorr BSS in the limited concurrency setting. Specifically, we demonstrate that the Schnorr BSS satisfies OMUF when at most two signing sessions can be open concurrently (in the AGM+ROM). Our argument suggests that it is plausible that the Schnorr BSS satisfies OMUF for up to polylogarithmically many concurrent signing sessions.
Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
ePrint Report05 July 2024
Dario Catalano, Emanuele Giunta, Francesco Migliaro
ePrint ReportOver the last few years several works addressed this challenge by showing new constructions, refined notions and extensions. Most of these constructions, however, are either ad hoc, in the sense that they build upon specific properties of the underlying PKE, or impose severe restrictions on the size of the underlying anamorphic message space.
In this paper we consider the question of whether it is possible to have realizations of the primitive that are both generic and allow for large anamorphic message spaces. We give strong indications that, unfortunately, this is not the case.
Our first result shows that $ \textit{any black-box realization} $ of the primitive, i.e. any realization that accesses the underlying PKE only via oracle calls, $ \textit{must} $ have an anamorphic message space of size at most $poly(\lambda)$ ($\lambda$ security parameter).
Even worse, if one aims at stronger variants of the primitive (and, specifically, the notion of asymmetric anamorphic encryption, recently proposed by Catalano $ \textit{et al.} $) we show that such black-box realizations are plainly impossible, i.e. no matter how small the anamorphic message space is.
Finally, we show that our impossibility results are rather tight: indeed, by making more specific assumptions on the underlying PKE, it becomes possible to build generic AE where the anamorphic message space is of size $\Omega(2^\lambda)$.
Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, Krzysztof Pietrzak
ePrint ReportWe prove our bounds in a combinatorial setting where the state of the protocol progresses in rounds. The state of the protocol in each round is captured by a set system, with each of its elements specifying a set of users who share a secret key. We show this combinatorial model implies bounds in symbolic models for ME and CGKA that capture, as building blocks, PRGs, PRFs, dual PRFs, secret sharing, and symmetric encryption in the setting of ME, and PRGs, PRFs, dual PRFs, secret sharing, public-key encryption, and key-updatable public-key encryption in the setting of CGKA. The models are related to the ones used by Micciancio and Panjwani (Eurocrypt'04) and Bienstock et al. (TCC'20) to analyze ME and CGKA, respectively.
We prove - using the Bollobás' Set Pairs Inequality - that the cost (number of uploaded ciphertexts) for replacing a set of $d$ users in a group of size $n$ is $\Omega(d\ln(n/d))$. Our lower bound is asymptotically tight and both improves on a bound of $\Omega(d)$ by Bienstock et al. (TCC'20), and generalizes a result by Micciancio and Panjwani (Eurocrypt'04), who proved a lower bound of $\Omega(\log(n))$ for $d=1$.
Marcel Tiepelt, Christian Martin, Nils Maeurer
ePrint ReportDebasmita Chakraborty, Mridul Nandi
ePrint ReportSecITC 2024: 17th International Conference on Security for Information Technology and Communications
Bucharest, Romania, 21 November - 22 November 2024
Event CalendarSubmission deadline: 18 September 2024
Notification: 30 October 2024
Auckland, New Zealand, 16 December - 18 December 2024
Event CalendarHalifax, Canada, 4 September 2024
Event CalendarSubmission deadline: 10 July 2024
Notification: 19 July 2024
Kunming, China, 14 December - 16 December 2024
Event CalendarSubmission deadline: 15 August 2024
Notification: 10 November 2024
University of Wollongong, Australia
Job PostingClosing date for applications:
Contact: Prof Willy Susilo
More information: https://www.uow.edu.au/about/jobs/jobs-available/#en/sites/CX_1/job/4604/?utm_medium=jobshare
NXP
Job PostingClosing date for applications:
Contact: Kerstin Krauss
More information: https://nxp.wd3.myworkdayjobs.com/careers/job/Gratkorn/Senior-Web-Service-Java-Software-Engineer-for-Trust-Provisioning--m-f-d-_R-10053960-1
TU Wien
Job PostingAt the Institute of Logic and Computation, in the Research Unit of Security and Privacy (in the upcoming Research Unit Privacy Enhanced Technologies) at TU Wien is offering two 40hours/week positions as university assistant (prae-doc) limited to expected 4 years. Expected start: September 2024
Tasks:
- Research in the area of privacy enhancing technologies, cryptocurrencies, and (applied) cryptography
- Teaching tasks (exercises and exams), student guidance
- Teaching in German and English is expected
- Assistance with thesis supervision
- Scientific publishing (journal and conference papers, dissertation) - Participation in scientific events
- Assistance with organizational and administrative tasks
Your profile: - Completion of a master or diploma curriculum in one of these fields: computer Science, math, or smilar fields
- Knowledge of privacy-enhancing technologies, such as cryptography, differential privacy, and related areas.
- Very good skills in German and English communication and writing Interest in academic research and teaching
- Advanced problem solving skills and scientific curiosity
- Team player with very good communication skills
We offer: A highly visible and connected international research group A broad range of opportunities in a thriving research area Hybrid working style with home office option A range of attractive social benefits (see Fringe-Benefit Catalogue of TU Wien) Internal and external training opportunities, various career options Central location of workplace as well as good accessibility (U1/U4 Karlsplatz)
Closing date for applications:
Contact: Univ.-Prof. Dr. Dominique Schröder dominique.schroeder@tuwien.ac.at
More information: https://jobs.tuwien.ac.at/Job/235902
Aalto University, Finland
Job PostingWe are looking for postdocs interested in working with us (Chris Brzuska and Russell W. F. Lai) on topics including but not limited to:
- Lattice-based cryptography, with special focus on the design, application, and analysis of non-standard lattice assumptions
- Succinct and/or zero-knowledge proof and argument systems
- Advanced (e.g. homomorphic, attribute-based, functional, laconic) encryption and (e.g. ring, group, threshold, blind) signature schemes
- Fine-grained cryptography (e.g. against bounded-space-time adversaries)
- Lower bounds and impossibility results
For questions about the topics, feel free to drop us an email to discuss.
For more details about the position, and for the instructions of how to apply, please refer to https://www.hiit.fi/ict-community-postdoctoral-researcher-positions/.
Closing date for applications:
Contact:
- For the position: Chris Brzuska, Russell W. F. Lai
- For the recruiting system: HIIT coordinator (see link above)
More information: https://www.hiit.fi/ict-community-postdoctoral-researcher-positions/