IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
28 January 2025
Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li
In this paper, we introduce a public key encryption with equality test as a regulatory text for each authentication record to address the above-mentioned challenges. The security of this feature is guaranteed by the verifiability, non-frameability, and round isolation of the proposed scheme. We compared the asymptotic complexity of our scheme with other traceable AC schemes and shows our scheme has advantages in tracing tasks as well as securely outsourcing them. The key feature of our scheme is that the ability of equality test of regulatory texts is independent of the public key, but rather depends on the round identifier of the authentication. We instantiate a traceable, hardware-binding AC scheme based on smart cards and BBS+ signature and give the performance analysis of it.
27 January 2025
Hayder Tirmazi
Ali Şah Özcan, Erkay Savaş
Thomas Pornin
Yunhao Wang, Fan Zhang
In this work, we present Qelect, the first practical constant-round post-quantum secure SSLE protocol. We first adapt the commitment scheme in Boneh \textit{et al.} (AFT'23) into a \textit{multi-party randomizable commitment} scheme, and propose our novel construction based on an adapted version of ring learning with errors (RLWE) problem. We then use it as a building block and construct a \textit{constant-round} single secret leader election (crSSLE) scheme. We utilize the single instruction multiple data (SIMD) property of a specific threshold fully homomorphic encryption (tFHE) scheme to evaluate our election circuit efficiently. Finally, we built Qelect from the crSSLE scheme, with performance optimizations including a preprocessing phase to amortize the local computation runtime and a retroactive detection phase to avoid the heavy zero-knowledge proofs during the election phase. Qelect achieves asymptotic improvements and is concretely practical. We implemented a prototype of Qelect and evaluated its performance in a WAN. Qelect is at least two orders of magnitude faster than the state-of-the-art.
Vasyl Ustimenko
Katharina Boudgoust, Hannah Keller
In this work, we show that the hardness of standard $\mathsf{MLWE}$ implies the hardness of truncated $\mathsf{MLWE}$, both for search and decision versions. Prior works only covered the search variant and relied on the (module) $\mathsf{NTRU}$ assumption, limitations which we are able to overcome. Overall, we provide two approaches, offering different advantages. The first uses a general Rényi divergence argument, applicable to a wide range of secret/error distributions, but which only works for the search variants of (truncated) $\mathsf{MLWE}$. The second applies to the decision versions, by going through an intermediate variant of $\mathsf{MLWE}$, where additional hints on the secret are given to the adversary. However, the reduction makes use of discrete Gaussian distributions.
Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier
Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov
In this work we show such an attack for a standard and popular interactive succinct argument, based on the GKR protocol, for verifying the correctness of a non-determinstic bounded-depth computation. For every choice of FS hash function, we show that a corresponding instantiation of this protocol, which was been widely studied in the literature and used also in practice, is not (adaptively) sound when compiled with the FS transform. Specifically, we construct an explicit circuit for which we can generate an accepting proof for a false statement. We further extend our attack and show that for every circuit $C$ and desired output $y$, we can construct a functionally equivalent circuit $C^*$, for which we can produce an accepting proof that $C^*$ outputs $y$ (regardless of whether or not this statement is true). This demonstrates that any security guarantee (if such exists) would have to depend on the specific implementation of the circuit $C$, rather than just its functionality.
Lastly, we also demonstrate versions of the attack that violate non-adaptive soundness of the protocol -- that is, we generate an attacking circuit that is independent of the underlying cryptographic objects. However, these versions are either less practical (as the attacking circuit has very large depth) or make some additional (reasonable) assumptions on the underlying cryptographic primitives.
Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan
Jonas Schupp, Georg Sigl
26 January 2025
Okinawa Institute of Science and Technology (OIST), Japan
As part of the collaboration between the Okinawa Institute of Science and Technology (OIST) and Partisia (Aarhus, Denmark), the Applied Cryptography Unit at OIST is seeking to hire a postdoctoral scholar to conduct research on applications of Secure Multi-party Computation (MPC) to quantum cryptography.
The postdoc will investigate how MPC techniques may be used to enhance the security and functionality of Quantum Key Distribution (QKD) enabled networks. The project will be led by Prof. Carlos Cid at OIST, with close collaboration with researchers from Partisia. The ideal candidate will have experience in the design and analysis of secure computation protocols, and strong knowledge of quantum cryptography.
We are seeking candidates with excellent post-graduate academic formation in cryptography, mathematics, computer science, or a closely related field, with research strong experience in the design and analysis of secure computation, and in quantum cryptography. Candidates must have a PhD at the time of commencing the position. This is a full-time, fixed-term appointment for 2 years, potentially extended depending of performance and other circumstances.
Starting Date: as soon as possible.
Closing date for applications:
Contact: Carlos Cid (carlos.cid_[at]_oist.jp)
More information: https://www.oist.jp/careers/postdoctoral-scholar-multi-party-computation-and-quantum-cryptography-applied-cryptography-unit
Okinawa Institute of Science and Technology (OIST), Japan
The Applied Cryptography Unit at the Okinawa Institute of Science and Technology (OIST) is seeking to hire a postdoctoral scholar to conduct research on quantum-resistant cryptography.
The postdoc will work on a project, part of a collaboration between Prof. Carlos Cid at OIST and Prof. Ludovic Perret at EPITA Research Lab, EPITA, Paris, France, focusing on the design and benchmarking of novel hybrid protocols for secure satellite communication that use classical and post-quantum cryptography combined with space-based Quantum Key Distribution (QKD). The successful candidate will have experience in the design and analysis of protocols in post-quantum or quantum cryptography, with a strong motivation to work at the intersection of these two domains.
We are seeking candidates with excellent post-graduate academic formation in cryptography, mathematics, computer science, or a closely related field, with research experience in the design and analysis of protocols in post-quantum or quantum cryptography. Candidates must have a PhD at the time of commencing the position. This is a full-time, fixed-term appointment for 2 years, potentially extended depending of performance and other circumstances.
Starting Date: as soon as possible.
Closing date for applications:
Contact: Carlos Cid (carlos.cid_[at]_oist.jp) and Ludovic Perret (ludovic.perret_[at]_epita.fr)
More information: https://www.oist.jp/careers/postdoctoral-scholar-quantum-resistant-cryptography-applied-cryptography-unit
IDEMIA - Courbevoie, France
Since our founding, IDEMIA has been on a mission to unlock the world and make it safer through our cutting-edge identity technologies.
The IDEMIA Smart Identity (ISI) Division of the IDEMIA Group is looking for a Cryptography/Security Engineer to help us secure our products and thus protect your identity from external threats.
The candidate has strong interest and suitable experience in any of the following areas:
• Integration of state-of-the-art cryptography algorithms in embedded systems.
• Physical attacks on embedded systems / smart-cards.
• Automatic vulnerability detection in embedded devices and/or firmware.
Responsabilities: The candidate will support R&D development teams, lead our research in ongoing / upcoming, and contribute to the growth of our activities through working groups.
Requirements:
• Master's degree (or equivalent) or PhD in Mathematics, Cryptography, Computer Science, or Embedded Electronic.
• Solid knowledge and demonstrable experiences in any of the aforementioned areas.
• Experience in developing/analyzing cryptographic primitives’ implementations in one high-level language (e.g., Python, MATLAB) and C/C++. (essential)
• Experience with vulnerabilities research. (desirable)
• Proficiency in English (essential) and French. (essential)
• Problem-solving, independence, communication skills. (essential)
• Knowledge in Side-channel attacks or Fault Injections attacks. (desirable)
• Post-quantum Cryptography (PQC) techniques for any of the aforementioned areas. (desirable)
The candidate will work at our Paris-La Defense office, closely with members of our R&D team in France and abroad. Travel may be required.
Applications will be processed continuously until the position is filled.
Due to the confidential and sensitive nature of the projects we work on, this position requires an on-site presence five days a week.
Closing date for applications:
Contact: Applicants are invited to submit a digital application on our career portal.
More information: https://careers.idemia.com/job/Courbevoie-Ing%C3%A9nieur-en-S%C3%A9curit%C3%A9-2-92400/1162028901/
University of Birmingham, Birmingham, UK
The School of Computer Science is further investing in its already strong Security and Privacy Research group.
We seek to recruit an outstanding researcher with a specific interest in applied cryptography in the context of hardware and embedded systems security. We are particularly interested in researchers with a track record in pre-silicon leakage and/or fault analysis, secure embedded software development, statistical side channel and fault evaluation techniques, machine and deep learning for side channels.
You will be expected to develop your own research agenda over time, and you can expect to contribute to all aspects of school life (teaching, administration), initially guided and supported by Prof. Elisabeth Oswald
The University of Birmingham offers permanent positions, with a defined pathway for progression and promotion.
Further information, (salary, application requirements, etc.) as well as a link for applicants, can be found below. The closing date for applications in 2.3.2025. If you have questions around (working in) Birmingham, then please use the contact provided below.
Closing date for applications:
Contact: Prof. Elisabeth Oswald, m.e. oswald@bham.ac.uk
More information: https://edzz.fa.em3.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_6001/job/6099/?utm_medium=jobshare&utm_source=External+Job+Share
Newcastle University
"Enhancing Privacy-Preserving Federated Learning with Incentives"
This research aims to design secure, reward-based mechanisms that incentivize data contributors to provide their sensitive input data to a collaborative, privacy-preserving federated learning process while ensuring the integrity and privacy of the process.
This has the potential to yield a fairer system and advance the goals of ethical machine learning and responsible AI.
By leveraging techniques from federated learning, cryptography, and game theory, the project will develop technical solutions that fairly reward participants based on their contributions and protect against malicious actors. The expected outcomes include secure formal models, provably secure protocols, practical implementation, and real-world applications in sectors like healthcare and finance, ultimately enhancing the real world adoption of Federated Learning.
Start date and Stipend: You will be expected to start in October of the academic year 2025/2026, the studentship will cover 100% fees and stipend at UKRI level for 4 years full time PhD studies. (2024-2025 UKRI rate £19,237).
Applicant skills/background: Candidates should possess or be highly motivated to acquire, strong knowledge in the following areas: (1) cryptography, (2) Privacy-enhancing technologies, such as FL, (3) mathematics (including number theory and game theory), and (4) computer programming in C++, Java, or Python.
Supervisors: You will be supervised by Dr Aydin Abadi (Newcastle University) and Dr Mohammad Naseri (Flower Labs). There is an opportunity to collaborate with researchers at the National Edge AI Hub, at Newcastle University.
Note: Use code COMPDLA01 when submitting an application.
Deadline: 28 Feb, 2025.
Closing date for applications:
Contact: Aydin Abadi
More information: https://www.ncl.ac.uk/computing/study/postgraduate-research/dla-studentships/
CISPA Helmholtz Center for Information Security
We explore topics including, but not limited to:
- Key exchange and secure messaging
- Public-key encryption with advanced functionalities
- Formalizing new cryptographic primitives and security models
- Modularizing complex primitives
- Developing techniques to achieve concrete (and tight) security bounds
- Designing and analyzing practical instantiations (e.g., based on elliptic curves, lattices, or isogenies)
https://jobs.cispa.saarland/jobs/detail/phd-positions-in-cryptography-and-provable-security-m-f-d-group-riepel-265.
Closing date for applications:
Contact: Doreen Riepel (riepel[at]cispa.de)
More information: https://jobs.cispa.saarland/jobs/detail/phd-positions-in-cryptography-and-provable-security-m-f-d-group-riepel-265
University of Warsaw
The Faculty of Mathematics, Informatics and Mechanics of the University of Warsaw (MIM UW) invites applications for the positions of Assistant Professor in Computer Science, starting on 1st October 2025 or 1st February 2026.
MIM UW is one of the leading Computer Science faculties in Europe. It is known for talented students (e.g., two wins and multiple top tens in the ACM International Collegiate Programming Contest) and strong research teams, especially in algorithms, logic and automata, algorithmic economy, and computational biology. There is also a growing number of successful smaller groups in diverse areas including cryptography, databases and knowledge representation, distributed systems, and machine learning. Seven ERC grants in Computer Science are running at MIM UW at the moment.
In the current call, 7 positions are offered (follow the links for more details):
- Samuel Eilenberg Assistant Professor (2 positions; reduced teaching and increased salary),
- Assistant Professor (3 positions; research and teaching),
- Assistant Professor in Distributed Systems or Programming Languages (1 position; research and teaching),
- Assistant Professor (1 position; teaching only).
Deadline for applications: 14th February 2025.
Closing date for applications:
Contact: Filip Murlak (f.murlak@uw.edu.pl), Oskar Skibski (o.skibski@uw.edu.pl).
More information: https://jobs.uw.edu.pl/en-gb/offer/WMIM_2025/field/ADIUNKT/