IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 July 2024
Reo Eriguchi
ePrint ReportAydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar
ePrint ReportMaria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez
ePrint ReportWe present two new methods that combine previous techniques for finding suitable primes: sieve-and-boost and XGCD-and-boost. We use these methods to find primes for the NIST submission of SQIsign. Furthermore, we show that our methods are flexible and can be adapted to find suitable parameters for other isogeny-based schemes such as AprèsSQI or POKE. For all three schemes, the parameters we present offer the best performance among all parameters proposed in the literature.
Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun
ePrint ReportThomas Espitau, Heorhii Pliatsok
ePrint ReportClémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, Alexandre Wallet
ePrint ReportIn some particular cases, these elements can be computed in polynomial time, making the reduction uniform. This is in particular the case for the Hawk signature scheme: we show that breaking Hawk is no harder than solving a variant of the principal ideal problem in a fixed quaternion algebra (and this reduction is uniform).
15 July 2024
Salt Lake City, USA, 18 October 2024
Event CalendarSubmission deadline: 22 July 2024
Notification: 26 August 2024
University of Luxembourg
Job PostingThe candidate will be based at the University of Luxembourg but also profit from regular visits at and joint research projects with the KASTEL Security Research Labs at KIT, Germany. The candidate’s research will be dealing with privacy-enhancing cryptographic building blocks and protocols for important application scenarios and result in both theoretical contributions (protocol designs, security models and proofs, etc.) and their efficient implementation. Privacy-preserving payments and data analytics, misuse-resistant lawful interception, and anonymous communication are research topics of particular interest to us.
If you are interested in joining our group, please send an email including your CV, transcripts, and two references to andy.rupp@uni.lu. As the position should be filled as soon as possible, your application will be considered promptly.
Closing date for applications:
Contact: Andy Rupp (andy.rupp@uni.lu)
More information: https://www.uni.lu/fstm-en/research-groups/cryptographic-protocols/
University of Amsterdam
Job PostingClosing date for applications:
Contact: Nicolas Resch
More information: https://vacatures.uva.nl/UvA/job/PhD-Position-in-Code-Based-Cryptography/777741202/
Univeristiy of Sydney, School of Computer Science, Sydney, Australia
Job PostingWe are seeking two highly motivated and talented students to join our research group to pursue a Ph.D in the field of cryptography at School of Computer Science, University of Sydney. The student will work on cutting-edge research in topics such as
The University of Sydney is one of the world's leading universities, known for its outstanding research and teaching excellence (ranked 18 in the world - QS rankings 2025 ). Our vibrant campus is located in the heart of Sydney (one of the top livable cities of the world), offering an exceptional environment for both academic and personal growth and the perfect work-life balance. The School of Computer Science is among the top ranked in the world ( ranked 22 in the world for CS - US news and world report 2024-25 ) constantly expanding year-on-year with strong faculty and students.
Application Process: Interested candidates should contact via email withClosing date for applications:
Contact: Sri AravindaKrishnan Thyagarajan aravind.thyagarajan@sydney.edu.au
More information: https://www.sydney.edu.au/courses/courses/pr/doctor-of-philosophy-engineering.html
Technical University of Denmark, Copenhagen, Denmark
Job PostingWe are looking for a bright, ambitious, and motivated PhD student to join the cryptography group in the Cybersecurity Engineering Section at DTU Compute in the Copenhagen region of Denmark. The 3-year PhD position will preferably start on 1 November 2024 (or according to mutual agreement). The goal of the PhD project is to improve the state of threshold post-quantum cryptography. You will join the growing cryptography team at DTU and be able to work with researchers in- and outside of the Copenhagen region and Denmark.
Responsibilities and qualifications
Your main task will be to design new threshold cryptographic algorithms with post-quantum security.
You will investigate distributed alternatives to existing post-quantum algorithms such as Dilithium, Falcon and Picnic, and the long-term security of threshold cryptography, in particular with respect to proactive and post-quantum security. To succeed in this research effort, you will gain familiarity with:
- post-quantum cryptographic primitives such as signatures or OPRFs
- threshold cryptographic techniques such as secret sharing and multiparty computation
- cryptographic foundations of post-quantum cryptography such as lattices, MPC-in-the-head, FHE and similar tools
As formal qualification, you must have a two-year master's degree (120 ECTS points) or a similar degree with an academic level equivalent to a two-year master's degree. Furthermore, to ensure a smooth start into the project, it is preferable that you have previous experience with either threshold or post-quantum cryptography.
Salary and appointment terms
The appointment will be based on the collective agreement with the Danish Confederation of Professional Associations. The allowance will be agreed upon with the relevant union. The period of employment is 3 years. The position is a full-time position and the starting date is 1 November 2024 (or according to mutual agreement).
Closing date for applications:
Contact: Carsten Baum (cabau@dtu.dk)
More information: https://efzu.fa.em2.oraclecloud.com/hcmUI/CandidateExperience/da/sites/CX_1/job/2872/
Eindhoven University of Technology (TU/e), Netherlands
Job PostingWe are looking for a person to extend our team as postdoc in the Horizon Europe Next Generation Internet pilot NGI TALER. Your task will be to carry out foundational research in the context of the payment system GNU Taler. More precisely, you will be tasked with proving the security of post-quantum replacements for the cryptography used to secure GNU Taler. The position is initially 1 year with funding for a 1-year extension available.
GNU Taler is a privacy-preserving payment system. Customers can stay anonymous, but merchants cannot hide their income through payments with GNU Taler. This helps to avoid tax evasion and money laundering while providing users with a privacy-preserving way of electronic payment. As part of a Next Generation Internet pilot, the cryptography used in GNU Taler will be future-proofed by developing post-quantum secure variants of the involved protocols. Your task will be to prove these new protocols secure against quantum adversaries, closely collaborating with the team that develops the protocols.
If you have a PhD in cryptography or a related area, please apply online via the TU/e website.
Closing date for applications:
Contact: Andreas Hülsing a.t.huelsing [put at here] tue.nl and Kathrin Hövelmanns k.hovelmanns [put at here] tue.nl
More information: https://jobs.tue.nl/en/vacancy/postdoc-in-postquantum-cryptography-1094802.html
Aztec Labs
Job Postinghttps://aztec.network/
We’re creating a general-purpose private smart contract layer for Ethereum, affectionately dubbed ‘Aztec 3’.
We utilise bleeding-edge cryptography in our tech stack to realise private transactions on a public blockchain network, particularly in the realm of zero-knowledge cryptography.
As a result we possess a world-class R&D team that has co-authored the Plonk, Plookup and Zeromorph protocols. Plonk in particular is rapidly becoming an industry standard ZK-SNARK technology.
We are looking for experienced cryptographers to expand our R&D team and allow us to further enhance the state-of-the-art when it comes to generating proofs of private computation.
- Role focus:
- * Research techniques to improve both the constant and asymptotic performance of our cryptographic protocols
- * Perform literature reviews to identify new developments that could improve the Prover/Verifier efficiency of our cryptographic protocols (or replace them entirely)
- * Develop security proofs for our ZK-SNARK circuit architectures
- * Liaise with our applied cryptographers to assist them with implementing our cryptographic protocols in software
- Required experience:
- * PhD-level qualification in cryptography or a related field
- * Named author in one or more papers in the field of zero-knowledge cryptography
- * Ability to read and understand software implementations of cryptographic protocols written in C++
- * Familiarity with algorithms, data structures and basic programming concepts
- * Able to provide clear and constructive feedback for more junior cryptographers / applied cryptographers, mentoring where necessary
- What we offer:
- * A highly competitive compensation package (including equity)
- * Flexible and remote work environment
- * 25 days holiday + bank holidays annually
- * An opportunity to work at the cutting edge of blockchain and FinTech with a world class cryptography and engineering team
Closing date for applications:
Contact: travis@aztecprotocol.com
More information: https://boards.eu.greenhouse.io/aztec/jobs/4098527101
=nilFoundation
Job PostingClosing date for applications:
Contact: Alex Aristides - Alexisaristdes@nil.foundation
More information: https://nil.foundation/careers/jobs?jobId=eKBawSyO9EDP
University of South-Eastern Norway; Kongsberg, Norway
Job PostingWe are seeking a highly motivated candidate for a PhD in Cybersecurity. This project aims to advance the field of healthcare cybersecurity through innovative and scalable solutions. The candidate will focus on the security and privacy of healthcare systems, including but not limited to developing decentralized, secure, and privacy-preserving methods for sharing health data.
Starting date: The position is available from January 1, 2025. An earlier commencement might be possible.
Application deadline: October 7, 2024.
We offer:
- Fully funded position for three years
- No teaching obligations
- Stimulating research environment
- Competitive salary and benefits, starting salary from NOK 532,200
More information is available at bit.ly/phd25
Closing date for applications:
Contact: Mohsen Toorani (mohsen.toorani@usn.no)
More information: https://bit.ly/phd25
Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai
ePrint Report- We propose the first MPSU protocol based on oblivious transfer and symmetric-key techniques in the standard semi-honest model. This protocol is $4.9-9.3 \times$ faster than Liu and Gao in the LAN setting. Concretely, our protocol requires only $3.6$ seconds in online phase for 3 parties with sets of $2^{20}$ items each. - We propose the first MPSU protocol achieving both linear computation and linear communication complexity, based on public-key operations. This protocol has the lowest overall communication costs and shows a factor of $3.0-36.5\times$ improvement in terms of overall communication compared to Liu and Gao.
We implement our protocols and conduct an extensive experiment to compare the performance of our protocols and the state-of-the-art. To the best of our knowledge, our implementation is the first correct and secure implementation of MPSU that reports on large-size experiments.
Adrian Neal
ePrint ReportZhengjun Cao, Lihua Liu
ePrint ReportFrancesco Berti, Carmit Hazay, Itamar Levi
ePrint ReportIn this paper, we introduce two tailored indistinguishability-based security definitions for leakage-resilient OT, focusing on protecting the sender's state. Second, we propose a practical semi-honest secure OT protocol that achieves these security levels while minimizing the assumptions on the protocol's building blocks and the use of a secret state. Finally, we extend our protocol to support sequential composition and explore efficiency-security tradeoffs.