IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 October 2024
Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang
ePrint ReportWe answer the question in the affirmative by presenting a lightweight HAVSS with optimal resilience. When executing across $n$ parties to share a secret, it attains a worst-case communication complexity of $\Tilde{\bigO}(\lambda n^3)$ (where $\lambda$ is the cryptographic security parameter) and realizes high-threshold secrecy to tolerate a fully asynchronous adversary that can control $t= \lfloor \frac{n-1}{3} \rfloor$ malicious parties and also learn $t$ additional secret shares from some honest parties. The (worst-case) communication complexity of our lightweight HAVSS protocol matches that of SS24 AVSS---the state-of-the-art lightweight AVSS without high-threshold secrecy. Notably, our design is a direct and concretely efficient reduction to hash functions in the random oracle model, without extra setup assumptions like CRS/PKI or heavy intermediate steps like hash-based zk-STARK.
Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, Vinod Vaikuntanathan
ePrint ReportMuch like in the Gentry-Sahai-Waters fully homomorphic encryption scheme, ciphertexts in our scheme are matrices, homomorphic addition is matrix addition, and homomorphic multiplication is matrix multiplication. Moreover, when encrypting many messages at once and performing many homomorphic evaluations at once, the bit-length of ciphertexts in some of our schemes (before and after homomorphic evaluation) can be arbitrarily close to the bit-length of the plaintexts. The main limitation of our schemes is that they require a large evaluation key, whose size scales with the complexity of the homomorphic computation performed, though this key can be re-used across any polynomial number of encryptions and evaluations.
Ali Babaei, Taraneh Eghlidos
ePrint ReportRazvan Barbulescu, Mugurel Barcau, Vicentiu Pasol
ePrint ReportAlessandro Budroni, Andrea Natale
ePrint ReportNishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
ePrint ReportTim Beyne, Clémence Bouvier
ePrint ReportZewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, Kejie Huang
ePrint ReportZewen Ye, Tianshun Huang, Tianyu Wang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, Kejie Huang
ePrint Report29 October 2024
Gaithersburg, USA, 24 September - 26 September 2025
Event CalendarRome, Italy, 10 March - 14 March 2025
School28 October 2024
Rochester Institute of Technology, Rochester, New York, USA
Job PostingDo you live in the terminal? Do you like programming? Do you enjoy tinkering with rando embedded devices? Do you have a passion for security geared towards one or more of these topics?
- side-channel analysis
- applied cryptography
- software security
- hardware-assisted security
If so, this might be the right opportunity for you! The Platform Security Laboratory (PLATSEC) resides in the Department of Cybersecurity at RIT, and is affiliated with RIT's Global Cybersecurity Institute (GCI). This is a 12-month appointment, with possible extensions contingent upon funding. The start date is flexible, but aimed at January or February 2025.
To apply, please e-mail your motivation letter and CV.
Closing date for applications:
Contact: Billy Brumley (bbbics AT rit DOT edu)
More information: https://www.rit.edu/cybersecurity/
Department of Mathematics at the University of Genova (Italy)
Job PostingClosing date for applications:
Contact: Alessio Caminata (alessio.caminata@unige.it)
More information: https://alessiocaminata.wixsite.com/alca/post-doc
University of Connecticut, School of Computing
Job PostingThe positions provide a great opportunity for students with interest in interdisciplinary projects that combine knowledge from various fields towards the design of secure systems and protocols. We target real-world and timely problems and aim to develop secure and practical solutions backed by rigorous foundations and efficient implementations/thorough performance testing (with a focus on large-scale distributed systems, including privacy, scalability and interoperability of blockchain-based systems, and applied cryptographic protocols in general). We are also interested in theoretical projects that contribute in devising new models in Cryptography and Privacy (such as MPC, authentication, and zero-knowledge proofs).
For more information about our current and previous projects please check https://ghadaalmashaqbeh.github.io/research/. For interested students, please send your CV to ghada@uconn.edu and provide any relevant information about your research interests, and relevant skills and background.
Closing date for applications:
Contact: Ghada Almashaqbeh, ghada@uconn.edu
More information: https://ghadaalmashaqbeh.github.io/research/
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
Job Posting- Computer-Aided Security Verification: We explore how to perform efficient pre-silicon security verification with respect to physical implementation attacks (Side-Channel Analysis / Fault-Injection Analysis).
- Physical Implementation Attacks: We deepen the (theoretical) understanding of active and passive physical implementation attacks to build formal attacker models for security verification.
- Secure Hardware Design: We investigate how to build secure hardware circuits that can resist physical implementation attacks.
- Your CV, including a transcript of records.
- A brief cover letter describing your research interests.
- Contact details of 2-3 potential references.
Closing date for applications:
Contact: Dr. Pascal Sasdrich (pascal.sasdrich@rub.de)
Hochschule RheinMain University of Applied Sciences, Department DCSM, Wiesbaden, Germany
Job PostingYour profile:
- Master’s degree with excellent grades in IT security, computer science, or a similar field
- Extensive knowledge in embedded or IT security and cryptographic engineering
- Proficient programming skills
- Knowledge in (post-quantum) cryptography, key management, and automotive security and technologies
- Excellent English skills, German skills are beneficial
- Motivated, reliable, creative, and able to work independently
For any questions about this position, please contact Marc Stöttinger at marc.stoettinger@hs-rm.de
Closing date for applications:
Contact: Marc Stöttinger
University of Surrey, UK
Job PostingClosing date for applications:
Contact: Professor Liqun Chen at liqun.chen@surrey.ac.uk or Dr Chaoyun Li at c.li@surrey.ac.uk.
More information: https://jobs.surrey.ac.uk/Vacancy.aspx?ref=051224
Fermah Inc.: Remote
Job PostingClosing date for applications:
Contact: Anna Riabokon
More information: https://www.notion.so/fermah/Proof-Systems-Integration-Engineer-1209ff1f0acb8069beb7c6ee8db7afe6?pvs=4
Fermah Inc; Remote
Job PostingClosing date for applications:
Contact: Anna Riabokon
More information: https://www.notion.so/fermah/Cryptography-Research-Intern-1239ff1f0acb80a89565f695d2e23875?pvs=4