IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
10 January 2025
Nokia Bell Labs, Belgium
Job PostingNote: We are strictly looking for technical researchers with programming skills.
Closing date for applications:
Contact: Emad Heydari Beni (emad.heydari_beni@nokia-bell-labs.com)
King's College London
Job PostingWe are inviting applications for a PhD studentship in the cryptography lab at King's College London. Specifically, we are looking for an applicant to work with Martin Albrecht and Benjamin Dowling.
The PhD could, for example, cover cryptanalysing existing cryptographic technologies/protocols, such as Telegram or WhatsApp, or modelling and designing new cryptographic protocols or primitives.
This PhD will work in a team consisting of social scientists, specifically ethnographers, and us cryptographers. Together, we study what the security needs and wants of participants in large-scale protests are and how these relate to the security guarantees provided by cryptographic solutions.
We encourage applicants to reach out to us to discuss the position informally before applying.
Fine print: This is a fully-funded positions covering both fees and maintenance. The latter is at the UKRI rate. We seek applicants with a strong background in mathematics and/or computer science, preferably with some background in cryptography. We will consider applications on a rolling basis.
Closing date for applications:
Contact: Martin Albrecht martin.albrecht_AT_kcl.ac.uk and Ben Dowling benjamin.dowling_AT_kcl.ac.uk
More information: https://martinralbrecht.wordpress.com/2025/01/07/phd-position-in-cryptography/
Aalto University, Finland
Job PostingWe are looking for postdocs interested in working with us (Chris Brzuska and Russell Lai) on topics including but not limited to:
- Lattice-based cryptography, with special focus on the design, application, and analysis of non-standard lattice assumptions
- Succinct/zero-knowledge/batch proof and argument systems, functional commitments
- Advanced (e.g. homomorphic, attribute-based, functional, laconic) encryption and (e.g. ring, group, threshold, blind) signature schemes
- Time cryptography (e.g. time-lock puzzle, verifiable delay function, proof of sequential work)
- Fine-grained cryptography (e.g. against bounded-space-time adversaries)
- Lower bounds and impossibility results
- Key exchange and secure messaging
Feel free to drop us an email for discussions about the topics.
For more details about the position, and for the instructions of how to apply, please refer to https://www.hiit.fi/hiit-postdoctoral-and-research-fellow-positions/.
Closing date for applications:
Contact: Chris Brzuska and Russell Lai
More information: https://www.hiit.fi/hiit-postdoctoral-and-research-fellow-positions/
Tokyo, Japan, 23 June - 25 June 2025
Event CalendarSubmission deadline: 31 January 2025
Notification: 14 March 2025
Sofia, Bulgaria, 25 March 2025
Event CalendarSubmission deadline: 28 January 2025
Notification: 14 February 2025
Leuven, Belgium, 31 March - 4 April 2025
Event CalendarMadrid, Spain, 4 May -
Event CalendarSubmission deadline: 7 February 2025
Madrid, Spain, 4 May 2025
Event CalendarSubmission deadline: 28 February 2025
Notification: 15 March 2025
Ábel Nagy, János Tapolcai, István András Seres, Bence Ladóczki
ePrint ReportWe introduce and evaluate a new manipulation strategy, the RANDAO forking attack. Unlike block withholding, whereby validators opt to hide a block, this strategy relies on selectively forking out an honest proposer's block to maximize transaction fee revenues and block rewards. In this paper, we draw attention to the fact that the forking attack is significantly more harmful than selfish mixing for two reasons. Firstly, it exacerbates the unfairness among validators. More importantly, it significantly undermines the reliability of the blockchain for the average user by frequently causing already published blocks to be forked out. By doing so, the attacker can fork the chain without losing slots, and we demonstrate that these are later fully compensated for. Our empirical measurements, investigating such manipulations on Ethereum mainnet, revealed no statistically significant traces of these attacks to date.
09 January 2025
Aydin Abadi, Yvo Desmedt
ePrint ReportThis work introduces two scalable OT schemes: (1) Helix OT, a $1$-out-of-$n$ OT, and (2) Priority OT, a $t$-out-of-$n$ OT. Both schemes provide unconditional security, ensuring resilience against quantum adversaries. Helix OT achieves a receiver-side download complexity of $O(1)$. In big data scenarios, where certain data may be more urgent or valuable, we propose Priority OT. With a receiver-side download complexity of $O(t)$, this scheme allows data to be received based on specified priorities. By prioritizing data transmission, Priority OT ensures that the most important data is received first, optimizing bandwidth, storage, and processing resources. Performance evaluations indicate that Helix OT completes the transfer of 1 out of $n=$ 16,777,216 messages in 9 seconds, and Priority OT handles $t=$ 1,048,576 out of $n$ selections in 30 seconds. Both outperform existing $t$-out-of-$n$ OTs (when $t\geq 1$), underscoring their suitability for large-scale applications. To the best of our knowledge, Helix OT and Priority OT introduce unique advancements that distinguish them from previous schemes.
Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao
ePrint ReportAlex Evans, Nicolas Mohnblatt, Guillermo Angeris
ePrint ReportLaia Amorós, James Clements, Chloe Martindale
ePrint ReportAlessandra Scafuro, Tanner Verber
ePrint ReportHowever, all existing works make the assumption that all clients must agree on employing the same servers, and accept the same corruption threshold. In this paper, we challenge this assumption and introduce a new paradigm for server-aided MPC, where each client can choose their own set of servers and their own threshold of corrupted servers. In this new model, the privacy of each client is guaranteed as long as their own threshold is satisfied, regardless of the other servers/clients. We call this paradigm per-party private server-aided MPC to highlight both a security and efficiency guarantee: (1) per-party privacy, which means that each party gets their own privacy guarantees that depend on their own choice of the servers; (2) per-party complexity, which means that each party only needs to communicate with their chosen servers. Our primary contribution is a new theoretical framework for server-aided MPC. We provide two protocols to show feasibility, but leave it as a future work to investigate protocols that focus on concrete efficiency.
Varun Madathil, Alessandra Scafuro, Tanner Verber
ePrint ReportThere is a rich body of literature that provides (black-box) compilers that build malicious OT from OTs that achieve weaker security such as semi-malicious OT and defensibly secure OT, within the minimal number of rounds. However, no round-optimal compiler exists that builds malicious OT from the weakest notion of semi-honest OT, in the plain model.
Correlation intractable hash (CIH) functions are special hash functions whose properties allow instantiating the celebrated Fiat-Shamir transform, and hence reduce the round complexity of public-coin proof systems.
In this work, we devise the first round-optimal compiler from semi-honest OT to malicious OT, by a novel application of CIH for collapsing rounds in the plain model. We provide the following contributions. First, we provide a new CIH-based round-collapsing construction for general cut-and-choose. This gadget can be used generally to prove the correctness of the evaluation of a function. Then, we use our gadget to build the first round-optimal compiler from semi-honest OT to malicious OT.
Our compiler uses the semi-honest OT protocol and the other building blocks in a black-box manner. However, for technical reasons, the underlying CIH construction requires the upper bound of the circuit size of the semi-honest OT protocol used. The need for this upper-bound makes our protocol not fully black-box, hence is incomparable with existing, fully black-box, compilers.
Jingwei Hu, Zhiqi Liu, Cong Zuo
ePrint ReportWe formally define the D-PSI problem and propose a novel construction that extends beyond two-party scenarios to support multi-party settings. Our construction adheres to the D-PSI requirements, including security against semi-honest adversaries, and achieves computational and communication complexities close to the ideal "perfect" D-PSI protocol. Additionally, we demonstrate the practicality of our approach through a baseline implementation and an optimized version that further reduces computational overhead. Our results establish a strong foundation for secure and efficient PSI in real-world cloud computing scenarios.