IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 July 2024
Jan Kristian Haugland, Tron Omland
ePrint ReportTymoteusz Chojecki, Grahame Erskine, James Tuite, Vasyl Ustimenko
ePrint ReportVlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, Dimitris Chatzopoulos
ePrint ReportAggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos
ePrint ReportReconciling these three properties is seemingly paradoxical given that the dominant approach to transaction processing is based on first-price auctions (e.g., as in Bitcoin) or dynamic adjustment of the minimum admissible fee (e.g. as in Ethereum EIP-1559) something that breaks fee predictability. At the same time, in fixed fee mechanisms (e.g., as in Cardano), fees are trivially predictable but are subject to relatively inexpensive bribing or denial of service attacks where transactions may be delayed indefinitely by a well funded attacker, hence breaking delay predictability.
In this work, we set out to address this problem by putting forward blockchain space tokenization (BST), namely a new capability of a blockchain system to tokenize its capacity for transactions and allocate it to interested users who are willing to pay ahead of time for the ability to post transactions regularly for a period of time. We analyze our system in the face of worst-case transaction-processing attacks by introducing a security game played between the mempool mechanism and an adversary. Leveraging this framework, we prove that BST offers predictable and asymptotically optimal delays, predictable fees, and is incentive compatible, thus answering the question posed in the affirmative.
Chen Li, Fangguo Zhang
ePrint ReportTo address these issues, we first define "strong designated-verifier" considering the case where the adversary has access to the secret verification state, then propose a construction of strong designated-verifier zk-SNARKs. The construction inspired by designated verifier signatures based on two-party ring signatures does not use encryption and can be applied on any public-verifiable zk-SNARKs to yield a designated-verifiable variant. We introduce our construction under the circuit satisfiability problem and implement it in Circom, then test it on different zk-SNARKs, showing the validity of our construction.
Reo Eriguchi
ePrint ReportAydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar
ePrint ReportMaria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez
ePrint ReportWe present two new methods that combine previous techniques for finding suitable primes: sieve-and-boost and XGCD-and-boost. We use these methods to find primes for the NIST submission of SQIsign. Furthermore, we show that our methods are flexible and can be adapted to find suitable parameters for other isogeny-based schemes such as AprèsSQI or POKE. For all three schemes, the parameters we present offer the best performance among all parameters proposed in the literature.
Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun
ePrint ReportThomas Espitau, Heorhii Pliatsok
ePrint ReportClémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, Alexandre Wallet
ePrint ReportIn some particular cases, these elements can be computed in polynomial time, making the reduction uniform. This is in particular the case for the Hawk signature scheme: we show that breaking Hawk is no harder than solving a variant of the principal ideal problem in a fixed quaternion algebra (and this reduction is uniform).
15 July 2024
Salt Lake City, USA, 18 October 2024
Event CalendarSubmission deadline: 22 July 2024
Notification: 26 August 2024
University of Luxembourg
Job PostingThe candidate will be based at the University of Luxembourg but also profit from regular visits at and joint research projects with the KASTEL Security Research Labs at KIT, Germany. The candidate’s research will be dealing with privacy-enhancing cryptographic building blocks and protocols for important application scenarios and result in both theoretical contributions (protocol designs, security models and proofs, etc.) and their efficient implementation. Privacy-preserving payments and data analytics, misuse-resistant lawful interception, and anonymous communication are research topics of particular interest to us.
If you are interested in joining our group, please send an email including your CV, transcripts, and two references to andy.rupp@uni.lu. As the position should be filled as soon as possible, your application will be considered promptly.
Closing date for applications:
Contact: Andy Rupp (andy.rupp@uni.lu)
More information: https://www.uni.lu/fstm-en/research-groups/cryptographic-protocols/
University of Amsterdam
Job PostingClosing date for applications:
Contact: Nicolas Resch
More information: https://vacatures.uva.nl/UvA/job/PhD-Position-in-Code-Based-Cryptography/777741202/
Univeristiy of Sydney, School of Computer Science, Sydney, Australia
Job PostingWe are seeking two highly motivated and talented students to join our research group to pursue a Ph.D in the field of cryptography at School of Computer Science, University of Sydney. The student will work on cutting-edge research in topics such as
The University of Sydney is one of the world's leading universities, known for its outstanding research and teaching excellence (ranked 18 in the world - QS rankings 2025 ). Our vibrant campus is located in the heart of Sydney (one of the top livable cities of the world), offering an exceptional environment for both academic and personal growth and the perfect work-life balance. The School of Computer Science is among the top ranked in the world ( ranked 22 in the world for CS - US news and world report 2024-25 ) constantly expanding year-on-year with strong faculty and students.
Application Process: Interested candidates should contact via email withClosing date for applications:
Contact: Sri AravindaKrishnan Thyagarajan aravind.thyagarajan@sydney.edu.au
More information: https://www.sydney.edu.au/courses/courses/pr/doctor-of-philosophy-engineering.html
Technical University of Denmark, Copenhagen, Denmark
Job PostingWe are looking for a bright, ambitious, and motivated PhD student to join the cryptography group in the Cybersecurity Engineering Section at DTU Compute in the Copenhagen region of Denmark. The 3-year PhD position will preferably start on 1 November 2024 (or according to mutual agreement). The goal of the PhD project is to improve the state of threshold post-quantum cryptography. You will join the growing cryptography team at DTU and be able to work with researchers in- and outside of the Copenhagen region and Denmark.
Responsibilities and qualifications
Your main task will be to design new threshold cryptographic algorithms with post-quantum security.
You will investigate distributed alternatives to existing post-quantum algorithms such as Dilithium, Falcon and Picnic, and the long-term security of threshold cryptography, in particular with respect to proactive and post-quantum security. To succeed in this research effort, you will gain familiarity with:
- post-quantum cryptographic primitives such as signatures or OPRFs
- threshold cryptographic techniques such as secret sharing and multiparty computation
- cryptographic foundations of post-quantum cryptography such as lattices, MPC-in-the-head, FHE and similar tools
As formal qualification, you must have a two-year master's degree (120 ECTS points) or a similar degree with an academic level equivalent to a two-year master's degree. Furthermore, to ensure a smooth start into the project, it is preferable that you have previous experience with either threshold or post-quantum cryptography.
Salary and appointment terms
The appointment will be based on the collective agreement with the Danish Confederation of Professional Associations. The allowance will be agreed upon with the relevant union. The period of employment is 3 years. The position is a full-time position and the starting date is 1 November 2024 (or according to mutual agreement).
Closing date for applications:
Contact: Carsten Baum (cabau@dtu.dk)
More information: https://efzu.fa.em2.oraclecloud.com/hcmUI/CandidateExperience/da/sites/CX_1/job/2872/
Eindhoven University of Technology (TU/e), Netherlands
Job PostingWe are looking for a person to extend our team as postdoc in the Horizon Europe Next Generation Internet pilot NGI TALER. Your task will be to carry out foundational research in the context of the payment system GNU Taler. More precisely, you will be tasked with proving the security of post-quantum replacements for the cryptography used to secure GNU Taler. The position is initially 1 year with funding for a 1-year extension available.
GNU Taler is a privacy-preserving payment system. Customers can stay anonymous, but merchants cannot hide their income through payments with GNU Taler. This helps to avoid tax evasion and money laundering while providing users with a privacy-preserving way of electronic payment. As part of a Next Generation Internet pilot, the cryptography used in GNU Taler will be future-proofed by developing post-quantum secure variants of the involved protocols. Your task will be to prove these new protocols secure against quantum adversaries, closely collaborating with the team that develops the protocols.
If you have a PhD in cryptography or a related area, please apply online via the TU/e website.
Closing date for applications:
Contact: Andreas Hülsing a.t.huelsing [put at here] tue.nl and Kathrin Hövelmanns k.hovelmanns [put at here] tue.nl
More information: https://jobs.tue.nl/en/vacancy/postdoc-in-postquantum-cryptography-1094802.html
Aztec Labs
Job Postinghttps://aztec.network/
We’re creating a general-purpose private smart contract layer for Ethereum, affectionately dubbed ‘Aztec 3’.
We utilise bleeding-edge cryptography in our tech stack to realise private transactions on a public blockchain network, particularly in the realm of zero-knowledge cryptography.
As a result we possess a world-class R&D team that has co-authored the Plonk, Plookup and Zeromorph protocols. Plonk in particular is rapidly becoming an industry standard ZK-SNARK technology.
We are looking for experienced cryptographers to expand our R&D team and allow us to further enhance the state-of-the-art when it comes to generating proofs of private computation.
- Role focus:
- * Research techniques to improve both the constant and asymptotic performance of our cryptographic protocols
- * Perform literature reviews to identify new developments that could improve the Prover/Verifier efficiency of our cryptographic protocols (or replace them entirely)
- * Develop security proofs for our ZK-SNARK circuit architectures
- * Liaise with our applied cryptographers to assist them with implementing our cryptographic protocols in software
- Required experience:
- * PhD-level qualification in cryptography or a related field
- * Named author in one or more papers in the field of zero-knowledge cryptography
- * Ability to read and understand software implementations of cryptographic protocols written in C++
- * Familiarity with algorithms, data structures and basic programming concepts
- * Able to provide clear and constructive feedback for more junior cryptographers / applied cryptographers, mentoring where necessary
- What we offer:
- * A highly competitive compensation package (including equity)
- * Flexible and remote work environment
- * 25 days holiday + bank holidays annually
- * An opportunity to work at the cutting edge of blockchain and FinTech with a world class cryptography and engineering team
Closing date for applications:
Contact: travis@aztecprotocol.com
More information: https://boards.eu.greenhouse.io/aztec/jobs/4098527101
=nilFoundation
Job PostingClosing date for applications:
Contact: Alex Aristides - Alexisaristdes@nil.foundation
More information: https://nil.foundation/careers/jobs?jobId=eKBawSyO9EDP
University of South-Eastern Norway; Kongsberg, Norway
Job PostingWe are seeking a highly motivated candidate for a PhD in Cybersecurity. This project aims to advance the field of healthcare cybersecurity through innovative and scalable solutions. The candidate will focus on the security and privacy of healthcare systems, including but not limited to developing decentralized, secure, and privacy-preserving methods for sharing health data.
Starting date: The position is available from January 1, 2025. An earlier commencement might be possible.
Application deadline: October 7, 2024.
We offer:
- Fully funded position for three years
- No teaching obligations
- Stimulating research environment
- Competitive salary and benefits, starting salary from NOK 532,200
More information is available at bit.ly/phd25
Closing date for applications:
Contact: Mohsen Toorani (mohsen.toorani@usn.no)
More information: https://bit.ly/phd25