International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News

Here you can see all recent updates to the IACR webpage. These updates are also available:

email icon
via email
RSS symbol icon
via RSS feed

29 October 2024

Rome, Italy, 10 March - 14 March 2025
School School
Event date: 10 March to 14 March 2025
Expand

28 October 2024

Rochester Institute of Technology, Rochester, New York, USA
Job Posting Job Posting

Do you live in the terminal? Do you like programming? Do you enjoy tinkering with rando embedded devices? Do you have a passion for security geared towards one or more of these topics?

  • side-channel analysis
  • applied cryptography
  • software security
  • hardware-assisted security

If so, this might be the right opportunity for you! The Platform Security Laboratory (PLATSEC) resides in the Department of Cybersecurity at RIT, and is affiliated with RIT's Global Cybersecurity Institute (GCI). This is a 12-month appointment, with possible extensions contingent upon funding. The start date is flexible, but aimed at January or February 2025.

To apply, please e-mail your motivation letter and CV.

Closing date for applications:

Contact: Billy Brumley (bbbics AT rit DOT edu)

More information: https://www.rit.edu/cybersecurity/

Expand
Department of Mathematics at the University of Genova (Italy)
Job Posting Job Posting
There is an open call for a postdoctoral position at the Department of Mathematics at the University of Genova (Italy) in Algebra/Geometry and their applications to Cryptography. The position is funded by the PRIN 2022 Grant, "Mathematical Primitives for Post-Quantum Digital Signatures." It is a one-year position, with no teaching obligations and some research funds. The expected start date is February 2, 2025, with limited flexibility. The annual gross salary is approximately €23,250. ​The selected candidate will work under my supervision and will be encouraged to develop their own research program. Strong familiarity with one or more of the following areas is expected: Commutative Algebra, Algebraic Geometry, Computational Algebra systems (particularly Macaulay2 and Magma), and Cryptography. ​The deadline for applications is November 8, 2024, at 12:00 PM (Italian time). ​Please ensure that your application includes a brief research statement (maximum 1 page), all publications (including preprints and your PhD thesis), and any relevant documents or information. Be sure to complete Forms B and C, as indicated in the application. While letters of recommendation are not mandatory, they are highly appreciated and may be sent directly to me. ​Feel free to contact me for further information. Please note that interviews (conducted via Skype) are scheduled for December 13, 2024, beginning at 14:00. Shortlisted applicants will be notified a few days in advance.

Closing date for applications:

Contact: Alessio Caminata (​alessio.caminata@unige.it)

More information: https://alessiocaminata.wixsite.com/alca/post-doc

Expand
University of Connecticut, School of Computing
Job Posting Job Posting
Several fully-funded PhD student openings for Fall 2025 are available in cryptography, computer security, privacy, and blockchain-based systems at the University of Connecticut (UConn), School of Computing, led by Prof. Ghada Almashaqbeh.

The positions provide a great opportunity for students with interest in interdisciplinary projects that combine knowledge from various fields towards the design of secure systems and protocols. We target real-world and timely problems and aim to develop secure and practical solutions backed by rigorous foundations and efficient implementations/thorough performance testing (with a focus on large-scale distributed systems, including privacy, scalability and interoperability of blockchain-based systems, and applied cryptographic protocols in general). We are also interested in theoretical projects that contribute in devising new models in Cryptography and Privacy (such as MPC, authentication, and zero-knowledge proofs).

For more information about our current and previous projects please check https://ghadaalmashaqbeh.github.io/research/. For interested students, please send your CV to ghada@uconn.edu and provide any relevant information about your research interests, and relevant skills and background.

Closing date for applications:

Contact: Ghada Almashaqbeh, ghada@uconn.edu

More information: https://ghadaalmashaqbeh.github.io/research/

Expand
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
Job Posting Job Posting
The newly established junior research group on Computer-Aided Verification of Physical Security Properties (CAVE) is looking for excellent Ph.D. candidates in the area of hardware security, particularly (but not limited to) those specialized in:
  • Computer-Aided Security Verification: We explore how to perform efficient pre-silicon security verification with respect to physical implementation attacks (Side-Channel Analysis / Fault-Injection Analysis).
  • Physical Implementation Attacks: We deepen the (theoretical) understanding of active and passive physical implementation attacks to build formal attacker models for security verification.
  • Secure Hardware Design: We investigate how to build secure hardware circuits that can resist physical implementation attacks.
If you are interested in applying, please send an email to Dr. Pascal Sasdrich (pascal.sasdrich@rub.de) with the following documents in a single PDF (max. 10 MB) and subject line Application for PhD position:
  1. Your CV, including a transcript of records.
  2. A brief cover letter describing your research interests.
  3. Contact details of 2-3 potential references.
HGI and RUB stand for a collaborative, diverse, and inclusive workplace culture and promote equal opportunities. We strongly encourage applications from members of any underrepresented group in our research area. In particular, we invite and motivate women and individuals with disabilities to apply.

Closing date for applications:

Contact: Dr. Pascal Sasdrich (pascal.sasdrich@rub.de)

Expand
Hochschule RheinMain University of Applied Sciences, Department DCSM, Wiesbaden, Germany
Job Posting Job Posting
The research group of the computer engineering section of the department of Design Computer Sciences and Design (DCSM) at Hochschule RheinMain University of Applied Sciences (HSRM) is currently looking for a PhD student for exciting research opportunities. We are seeking for motivated individuals interested in Automotive Security, Post-Quantum Cryptography (PQC), and crypto agility. Our group is engaged in several ongoing and recently granted projects funded by prominent agencies such as BMBF (Federal Ministry of Education and Research). The vacant PhD position is funded by the BMBF. It focused on crypto agility and the long-term security strategies together with PQC in modern vehicles. This project addresses critical challenges in future-proofing automotive security against emerging quantum threats. If you are passionate about cutting-edge cybersecurity research and wish to contribute to the advancement of secure automotive technologies, we encourage you to apply.

Your profile:
  • Master’s degree with excellent grades in IT security, computer science, or a similar field
  • Extensive knowledge in embedded or IT security and cryptographic engineering
  • Proficient programming skills
  • Knowledge in (post-quantum) cryptography, key management, and automotive security and technologies
  • Excellent English skills, German skills are beneficial
  • Motivated, reliable, creative, and able to work independently

For any questions about this position, please contact Marc Stöttinger at marc.stoettinger@hs-rm.de

Closing date for applications:

Contact: Marc Stöttinger

Expand
University of Surrey, UK
Job Posting Job Posting
The Computer Science Research Centre at the University of Surrey is seeking to recruit an outstanding Research Fellow in the field of applied cryptography and trusted computing for a full-time position. This is a fixed-term appointment for 36 months. The expected start date is Monday 6th January 2025 or as soon as possible thereafter. The post holder will be contributing to an EU-funded research project “Continuum of Trust: Increased Path Agility and Trustworthy Device and Service Provisioning” (the project’s short name is CASTOR). The project aims to develop security, privacy and trust for connected devices. The main responsibility of the post holder will be in the design and development of new cryptographic protocols for trusted computing and secure systems, including verifiable credentials, attribute-based cryptography, anonymous signatures, remote attestation, and distributed ledger technologies. The position offers a platform for the research fellow to develop skills to become an independent researcher. The successful candidate will work under the direction of Professor Liqun Chen and Dr Chaoyun Li. The research fellow will also work with the other colleagues of the Surrey Centre for Cyber Security and collaborate with the other partners of the CASTOR project consortium. More details see https://jobs.surrey.ac.uk/Vacancy.aspx?ref=051224

Closing date for applications:

Contact: Professor Liqun Chen at liqun.chen@surrey.ac.uk or Dr Chaoyun Li at c.li@surrey.ac.uk.

More information: https://jobs.surrey.ac.uk/Vacancy.aspx?ref=051224

Expand
Fermah Inc.: Remote
Job Posting Job Posting
We are seeking a dedicated Proof Systems Integration Engineer to work on cutting-edge ZK-rollup, zkVM, and bridge technologies that we believe are crucial for advancing ZK adoption. The engineering team at Fermah operates with shared accountability and without traditional hierarchy.As an early team member, you will help define not only the technical direction of our integrations but also the values and culture of our company. You will have the freedom and autonomy to influence the trajectory of our platform while bringing your ideas and technical expertise to life. You’ll be tasked with complex and rewarding challenges.This is an exceptional opportunity for you to take ownership of key integrations, drive tangible results, and gain invaluable experience working in one of the most exciting sectors within crypto. Responsibilities: - Integrating proof systems (zkVMs, Rollups, Bridges, etc.) in Rust - Enhancing existing integrations (e.g., adding CUDA support, multi-machine proof generation orchestration) - Writing clean, efficient, and testable Rust code following best practices What You Bring: - 1-2 years of experience in Rust - Familiarity with different proof systems, zkVMs, ZK-rollups, bridges, etc - Strong communication and collaboration skills with an ownership mindset - Relevant open-source contributions in the field are a huge plus Benefits: - Competitive salary and equity - Take-what-you-need vacation - Opportunity to work with a driven, talented, dedicated team that values collaboration, innovation, and making a strong positive impact - Culture built upon mutual respect, empathy, excellence and delivery

Closing date for applications:

Contact: Anna Riabokon

More information: https://www.notion.so/fermah/Proof-Systems-Integration-Engineer-1209ff1f0acb8069beb7c6ee8db7afe6?pvs=4

Expand
Fermah Inc; Remote
Job Posting Job Posting
We are seeking a dedicated Cryptography Research Intern to work on cutting-edge ZK-rollup, zkVM, and bridge technologies that we believe are crucial for advancing ZK adoption. The engineering team at Fermah operates with shared accountability and without traditional hierarchy.As an early team member, you will help define not only the technical direction of our integrations but also the values and culture of our company. You will have the freedom and autonomy to influence the trajectory of our platform while bringing your ideas and technical expertise to life. You’ll be tasked with complex and rewarding challenges.This is an exceptional opportunity for you to take ownership of key integrations, drive tangible results, and gain invaluable experience working in one of the most exciting sectors within crypto. Responsibilities: - Reading technical papers on cryptographic protocols, such as MPC, ZKPs - Contributing to the design and refinement of cryptographic protocols - Writing blogs, papers and documentation to explain complex cryptographic ideas - Code up proof of concepts What You Bring: - Very strong background in mathematics and cryptography with deep knowledge of proof systems - Solid understanding of secure multi-party computation - Ability to translate research and technical specifications into proof-of-concepts - Problem-solving skills with a collaborative and ownership-driven mindset - Experience in Rust is a plus Benefits: - Competitive salary and equity - Take-what-you-need vacation - Opportunity to work with a driven, talented, dedicated team that

Closing date for applications:

Contact: Anna Riabokon

More information: https://www.notion.so/fermah/Cryptography-Research-Intern-1239ff1f0acb80a89565f695d2e23875?pvs=4

Expand
Alan Szepieniec
ePrint Report ePrint Report
This note studies a method of committing to a polynomial in a way that allows executions of low degree tests such as FRI to be batched and even deferred. In particular, it achieves (unlimited-depth) aggregation for STARKs.
Expand
Ashrujit Ghoshal, Ilan Komargodski, Gil Segev
ePrint Report ePrint Report
The indifferentiability framework has become a standard methodology that enables us to study the security of cryptographic constructions in idealized models of computation. Unfortunately, while indifferentiability provides strong guarantees whenever the security of a construction is captured by a ``single-stage'' security game, it may generally provide no meaningful guarantees when the security is captured by a ``multi-stage'' one. In particular, the indifferentiability framework does not capture offline-online games, where the adversary can perform an extensive offline computation to later speed up the online phase. Such security games are extremely common, both in practice and in theory. Over the past decade, there has been numerous attempts to meaningfully extend the indifferentiability framework to offline-online games, however, they all ultimately met with little success. In this work, our contribution is threefold. First, we propose an extension of the classical indifferentiability framework, we refer to as *offline-online-indifferentiability*, that applies in the context of attackers with an expensive offline phase (á la Ghoshal and Tessaro, CRYPTO '23). Second, we show that our notion lends itself to a natural and meaningful composition theorem for offline-online security games. Lastly, as our main technical contribution, we analyze the offline-online-indifferentiability of two classical variants of the Merkle-Damg\aa rd hashing mechanism, one where the key is fed only to the first block in the chain and the other where the key is fed to each block in the chain. For both constructions, we prove a *tight* bound on their offline-online-indifferentiability (i.e., an upper bound and an attack that matches it). Notably, our bound for the second variant shows that the construction satisfies *optimal* offline-online-indifferentiability.
Expand
Arthur Lazzaretti, Charalampos Papamanthou, Ismael Hishon-Rezaizadeh
ePrint Report ePrint Report
In a zero-knowledge proof market, we have two sides. On one side, bidders with proofs of different sizes and some private value to have this proof computed. On the other side, we have distributors (also called sellers) which have compute available to process the proofs by the bidders, and these distributors have a certain private cost to process these proofs (dependent on the size). More broadly, this setting applies to any online resource allocation where we have bidders who desire a certain amount of a resource and distributors that can provide this resource. In this work, we study how to devise double auctions for this setting which are truthful for users, weak group strategy proof, weak budget balanced, computationally efficient, and achieve a good approximation of the maximum welfare possible by the set of bids. We denote such auctions as $\textit{robust}$.
Expand
Yu-Yuan Chou, Hsien-Hung Liu, Jue-Sam Chou
ePrint Report ePrint Report
In 2018 Cai et al. proposed a multi-party quantum key agreement with five-qubit Brown states. They confirmed the security of their proposed scheme. However, Elhadad, Ahmed, et al. found the scheme cannot resist the collusion attack launched by legal participants. They suggested a modification and declared that their improved version is capable of resisting this type of attack. Nevertheless, after analysis, we found that the collusion attack still exists. Subsequently, we proposed a straightforward modification to prevent the attack. After analysis, we conclude that our modification meets the required security and collusion attack requirements, which are very important in the quantum key agreement scheme.
Expand
Zhengjun Cao
ePrint Report ePrint Report
The zeta function $\zeta(z)=\sum_{n=1}^{\infty} \frac{1}{n^z}$ is convergent only for $\text{Re}(z)>1$. The Riemann-Siegel function is $Z(t)=e^{i\vartheta(t)}\zeta(\frac{1}{2}+it)$. If $Z(t_1)$ and $Z(t_2)$ have opposite signs, $Z(t)$ vanishes between $t_1$ and $t_2$, and $\zeta(z)$ has a zero on the critical line between $\frac{1}{2}+it_1$ and $\frac{1}{2}+it_2$. This method to test zeros is too hard to practice for newcomers. The eta function $\eta(z)=\sum_{n=1}^{\infty}\frac{(-1)^{n-1}}{n^z}$ is convergent for $\text{Re}(z)>0$, and $\eta(z)=\left(1-\frac{2}{2^z}\right)\zeta(z)$ for the critical strip $0<\text{Re}(z)<1$. So, $\eta(z)$ and the analytic continuation of $\zeta(z)$ have the same zeros in the critical strip, and the alternating series can be directly used to test the zeros.
Expand
Adam Oumar Abdel-Rahman, Sofiane Azogagh, Zelma Aubin Birba, Arthur Tran Van
ePrint Report ePrint Report
Cloud storage offers convenient data access and sharing, but security concerns remain. Existing secure cloud storage solutions often lack essential features like data integrity, multi-cloud support, user-friendly file sharing, and efficient search. This paper proposes a novel secure cloud storage system that addresses these limitations. Our system uses distributed storage and attribute-based encryption to enhance data availability, access control, and user experience. It also enables private and efficient file search and data retrievability verification. This approach overcomes the trade-offs present in prior work, offering a secure and user-friendly solution for cloud data management.
Expand
Elli Androulaki, Angelo De Caro, Kaoutar El Khiyaoui, Romain Gay, Rebekah Mercer, Alessandro Sorniotti
ePrint Report ePrint Report
Offline payments present an opportunity for central bank digital currency to address the lack of digital financial inclusion plaguing existing digital payment solutions. However, the design of secure offline payments is a complex undertaking; for example, the lack of connectivity during the payments renders double spending attacks trivial. While the identification of double spenders and penal sanctions may curb attacks by individuals, they may not be sufficient against concerted efforts by states or well-funded institutions. It is hence important to also rely on preventive measures that reduce the scale of such attacks. An example of such a measure is secure elements. These however are limited in compute and storage, making the design of solutions that offer comparable privacy guarantees to those of physical cash challenging. We address this with a protocol that offloads most of the payment computation to the user’s mobile device and restricts the computation on the secure element to deleting spent tokens, and generating a signature with a computation equivalent to that of ECDSA. We claim that the use of mobile devices or enhanced smart card-based devices are required for secure consumer-to-consumer payments. To further harden the protocol, we enable the efficient identification of double spenders on the off-chance an attacker successfully double spends. Finally, we prove its security in the ideal/real world paradigm, and evaluate its performance to demonstrate its practicality.
Expand
Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
ePrint Report ePrint Report
We study the (in)feasibility of quantum pseudorandom notions in a quantum analog of the random oracle model, where all the parties, including the adversary, have oracle access to the same Haar random unitary. In this model, we show the following:

• (Unbounded-query secure) pseudorandom unitaries (PRU) exist. Moreover, the PRU construction makes two calls to the Haar oracle.

• We consider constructions of PRUs making a single call to the Haar oracle. In this setting, we show that unbounded-query security is impossible to achieve. We complement this result by showing that bounded-query secure PRUs do exist with a single query to the Haar oracle.

• We show that multi-copy pseudorandom state generators and function-like state generators (with classical query access), making a single call to the Haar oracle, exist.

Our results have two consequences: (a) when the Haar random unitary is instantiated suitably, our results present viable approaches for building quantum pseudorandom objects without relying upon one-way functions and, (b) for the first time, we show that the key length in pseudorandom unitaries can be generically shrunk (relative to the output length). Our results are also some of the first usecases of the new ``path recording'' formalism for Haar random unitaries, introduced in the recent breakthrough work of Ma and Huang.
Expand
Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, Márton Tot Bagi
ePrint Report ePrint Report
A crucial ingredient for many cryptographic primitives such as key exchange protocols and advanced signature schemes is a commutative group action where the structure of the underlying group can be computed efficiently. SCALLOP provides such a group action, based on oriented supersingular elliptic curves. We present PEARL-SCALLOP, a variant of SCALLOP that changes several parameter and design choices, thereby improving on both efficiency and security and enabling feasible parameter generation for larger security levels. Within the SCALLOP framework, our parameters are essentially optimal; the orientation is provided by a $2^e$-isogeny, where $2^e$ is roughly equal to the discriminant of the acting class group.

As an important subroutine we present a practical algorithm for generating oriented supersingular elliptic curves. To demonstrate our improvements, we provide a proof-of-concept implementation which instantiates PEARL-SCALLOP at all relevant security levels. Our timings are more than an order of magnitude faster than any previous implementation.
Expand
Emanuele Bellini, David GERAULT, Juan Grados, Thomas Peyrin
ePrint Report ePrint Report
The search for optimal differential trails for ARX ciphers is known to be difficult and scale poorly as the word size (and the branching through the carries of modular additions) increases.To overcome this problem, one may approximate the modular addition with the XOR operation, a process called linearization. The immediate drawback of this approach is that many valid and good trails are discarded. In this work, we explore different partial linearization trade-offs to model the modular addition through the \emph{window heuristic}, which restricts carry propagation to windows of $w_s$ consecutive positions. This strategy enables the exploration of full linearization ($w_s = 0$), normal modelling ($w_s = n$), and all the different trade-offs between completeness and speed in between. We give the corresponding SAT and MILP model and their parallel versions, and apply them to \chachacore, \speckfamily, \leafamily, and \hightfamily. Our method greatly outperforms all previous modeling of modular addition. In particular, we find the first differential path for 4 rounds of \chachacore with a probability greater than $2^{-256}$, and a corresponding 6 rounds boomerang distinguisher. This indicates that purely differential-based attacks have the potential to become competitive with differential-linear attacks, currently, the best-known attacks against \chachacore and other ARX ciphers. Finally, we exhibit an improved key recovery attack on reduced \leafamily.
Expand
Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan
ePrint Report ePrint Report
We introduce the notion of pseudorandom obfuscation (PRO), a way to obfuscate (keyed) pseudorandom functions $f_K$ in an average-case sense. We introduce several variants of pseudorandom obfuscation and show constructions and applications. For some of our applications that can be achieved using full-fledged indistinguishability obfuscation (iO), we show constructions using lattice-based assumptions alone; the other applications we enable using PRO are simply not known even assuming iO. We briefly summarize our contributions below.

- Constructions of PRO: We show how to construct the strongest version of PRO, assuming the sub-exponential hardness of the learning with errors (LWE) problem, and of the evasive LWE problem (Wee, EUROCRYPT 2022; Tsabary, CRYPTO 2022). - Applications outside the iO World: We show how to construct a succinct witness encryption scheme from PRO, where the size of the ciphertext is independent of the witness size. Such a witness encryption scheme is not known to exist even assuming iO. - Applications in the iO World: Our weakest variant of pseudorandom obfuscation, named obfuscation for identical pseudorandom functions (iPRO), is weaker than iO: rather than obfuscating arbitrary circuits as in iO, iPRO only obfuscates circuits computing pseudorandom functions. We show that iPRO already enables several applications of iO, such as unleveled fully homomorphic encryption (without assuming circular security) and succinct randomized encodings.

- From iPRO to iO: Despite being a seemingly weaker notion than iO, we show two pathways to constructing full-fledged iO from iPRO. Our first construction builds iO from iPRO and (standard assumptions on) cryptographic bilinear maps. Combined with our construction of iPRO, this gives us a construction of iO from a new combination of assumptions, namely LWE, evasive LWE and bilinear maps. Our second construction builds iO (and even ideal obfuscation) from iPRO in the pseudorandom oracle model (Jain, Lin, Luo and Wichs, CRYPTO 2023). To our knowledge, this is the first purely lattice-based, and hence plausibly post-quantum secure, construction of iO with a proof of security from LWE and evasive LWE.

Finally, we highlight some barriers in achieving the strongest version of pseudorandom obfuscation.
Expand
◄ Previous Next ►