IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 October 2024
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, Howon Kim
Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, Mehdi Tibouchi
We demonstrate the usefulness of these notions with two fundamental applications where three-round protocols are known to be useful, but multi-round ones generally fail. First, we show that critical-round proofs yield trapdoor commitment schemes. This result also enables the instantiation of post-quantum secure adaptor signatures and threshold ring signatures from MPCitH, resolving open questions in (Haque and Scafuro, PKC 2020) and in (Liu et al., ASIACRYPT 2024). Second, we show that critical-round proofs can be securely composed using the Cramer-Schoenmakers-Damgård method. This solves an open question posed by Abe et al. in CRYPTO 2024.
Overall, these results shed new light on the potential of multi-round proofs in both theoretical and practical cryptographic protocol design
Toi Tomita, Junji Shikata
Mi-Ying (Miryam) Huang, Baiyu Li, Xinyu Mao, Jiapeng Zhang
Gorjan Alagic, Dana Dachman-Soled, Manasi Shingane, Patrick Struck
Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng
Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang
We answer the question in the affirmative by presenting a lightweight HAVSS with optimal resilience. When executing across $n$ parties to share a secret, it attains a worst-case communication complexity of $\Tilde{\bigO}(\lambda n^3)$ (where $\lambda$ is the cryptographic security parameter) and realizes high-threshold secrecy to tolerate a fully asynchronous adversary that can control $t= \lfloor \frac{n-1}{3} \rfloor$ malicious parties and also learn $t$ additional secret shares from some honest parties. The (worst-case) communication complexity of our lightweight HAVSS protocol matches that of SS24 AVSS---the state-of-the-art lightweight AVSS without high-threshold secrecy. Notably, our design is a direct and concretely efficient reduction to hash functions in the random oracle model, without extra setup assumptions like CRS/PKI or heavy intermediate steps like hash-based zk-STARK.
Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, Vinod Vaikuntanathan
Much like in the Gentry-Sahai-Waters fully homomorphic encryption scheme, ciphertexts in our scheme are matrices, homomorphic addition is matrix addition, and homomorphic multiplication is matrix multiplication. Moreover, when encrypting many messages at once and performing many homomorphic evaluations at once, the bit-length of ciphertexts in some of our schemes (before and after homomorphic evaluation) can be arbitrarily close to the bit-length of the plaintexts. The main limitation of our schemes is that they require a large evaluation key, whose size scales with the complexity of the homomorphic computation performed, though this key can be re-used across any polynomial number of encryptions and evaluations.
Ali Babaei, Taraneh Eghlidos
Razvan Barbulescu, Mugurel Barcau, Vicentiu Pasol
Alessandro Budroni, Andrea Natale
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Tim Beyne, Clémence Bouvier
Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, Kejie Huang
Zewen Ye, Tianshun Huang, Tianyu Wang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, Kejie Huang
29 October 2024
Gaithersburg, USA, 24 September - 26 September 2025
Rome, Italy, 10 March - 14 March 2025
28 October 2024
Rochester Institute of Technology, Rochester, New York, USA
Do you live in the terminal? Do you like programming? Do you enjoy tinkering with rando embedded devices? Do you have a passion for security geared towards one or more of these topics?
- side-channel analysis
- applied cryptography
- software security
- hardware-assisted security
If so, this might be the right opportunity for you! The Platform Security Laboratory (PLATSEC) resides in the Department of Cybersecurity at RIT, and is affiliated with RIT's Global Cybersecurity Institute (GCI). This is a 12-month appointment, with possible extensions contingent upon funding. The start date is flexible, but aimed at January or February 2025.
To apply, please e-mail your motivation letter and CV.
Closing date for applications:
Contact: Billy Brumley (bbbics AT rit DOT edu)
More information: https://www.rit.edu/cybersecurity/
Department of Mathematics at the University of Genova (Italy)
Closing date for applications:
Contact: Alessio Caminata (alessio.caminata@unige.it)
More information: https://alessiocaminata.wixsite.com/alca/post-doc
University of Connecticut, School of Computing
The positions provide a great opportunity for students with interest in interdisciplinary projects that combine knowledge from various fields towards the design of secure systems and protocols. We target real-world and timely problems and aim to develop secure and practical solutions backed by rigorous foundations and efficient implementations/thorough performance testing (with a focus on large-scale distributed systems, including privacy, scalability and interoperability of blockchain-based systems, and applied cryptographic protocols in general). We are also interested in theoretical projects that contribute in devising new models in Cryptography and Privacy (such as MPC, authentication, and zero-knowledge proofs).
For more information about our current and previous projects please check https://ghadaalmashaqbeh.github.io/research/. For interested students, please send your CV to ghada@uconn.edu and provide any relevant information about your research interests, and relevant skills and background.
Closing date for applications:
Contact: Ghada Almashaqbeh, ghada@uconn.edu
More information: https://ghadaalmashaqbeh.github.io/research/