IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 July 2015
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
We present a formalization of secure ad-hoc surveys and present:
* an abstract provably-secure implementation based on standard cryptographic building blocks (which in particular are implied by the existence of enhanced trapdoor permutations in the CRS model);
* a practical instantiation of our abstract protocol, called ANONIZE, which is provably-secure in the random oracle model based on cryptographic assumptions on groups with bilinear maps.
As far as we know, ANONIZE constitutes the first implementation of a large-scale secure computation protocol (of non-trivial functionalities) that can scale to millions of users.
Yosuke Todo
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
Robert Granger, Thorsten Kleinjung, Jens Zumbr\\\"agel
Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahm
Sean Hallgren, Adam Smith, Fang Song
Our main contribution is showing the existence of classical two-party protocols for the secure evaluation of any polynomial-time function under reasonable computational assumptions (for example, it suffices that the learning with errors problem be hard for quantum polynomial time). Our result shows that the basic two-party feasibility picture from classical cryptography remains unchanged in a quantum world.
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
We exploit an advanced 64-bit polynomial multiplication (\\texttt{PMULL}) supported by ARMv8
and conduct multiple levels of asymptotically faster Karatsuba multiplication.
Finally, our method conducts binary field multiplication within 57 and 153 clock cycles for B-251 and B-571, respectively.
Our proposed method on ARMv8 improves the performance by a factor of $5.5 \\sim 7.2$ times than previous techniques on ARMv7.
Daniel P. Martin, Jonathan F. O\'Connell, Elisabeth Oswald, Martijn Stam
We provide results for these two challenges. Firstly, we show how to construct an extremely efficient algorithm that accurately computes the rank of a (known) key in the list of all keys, when ordered according to some side channel attack scores. Secondly, we show how our approach can be tweaked such that it can be also utilised to enumerate the most likely keys in a parallel fashion. We are hence the first to demonstrate that a smart and parallel key enumeration algorithm exists.
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
However, slice selection methods are mostly unstudied, and processor manufacturers choose not to publish their designs, nor their design rationale.
In this paper, we present a tool that allows to recover the slice selection algorithm for Intel processors. The tool uses cache access information to derive equations that allow the reconstruction of the applied slice selection algorithm. Thereby, the tool provides essential information for performing last level cache attacks and enables further exploration of the behavior of modern caches.
The tool is successfully applied to a range of Intel CPUs with different slices and architectures. Results show that slice selection algorithms have become more complex over time by involving an increasing number of bits of the physical address. We also demonstrate that among the most recent processors, the slice selection algorithm depends on the number of CPU cores rather than the processor model.
Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
- linear regression using gradient descent, namely finding a reasonable linear relation between data items which remain encrypted. Compared to the best previous work over a simulated dataset of $10^8$ records each with 20 features, our system dramatically reduces the server running time from about 8.75 hours (of the previous work) to only about 10 minutes.
- biometric authentication, in which we show how to reduce ciphertext sizes by half and to do the computation at the server very fast, compared with the state-of-the-art.
Moreover, as key rotation is a vital task in practice and is recommended by many authorized organizations for key management,
- we show how to do key rotation over encrypted data, without any decryption involved, and yet homomorphic properties of ciphertexts remain unchanged. In addition, our method of doing key rotation handles keys of different security levels (e.g., 80- and 128-bit securities), so that the security of ciphertexts and keys in our scheme can be \"updated\", namely can be changed into a higher security level.
Jesper Buus Nielsen, Samuel Ranellucci
things
for the construction of two and three-party secure computation, private
function evaluation and secure outsourcing. Garbling schemes is a primitive
which formalizes the syntax and security properties of garbled circuits.
We define a generalization of garbling schemes called \\emph{reactive garbling
schemes}.
We consider functions and garbled functions taking multiple inputs and giving
multiple outputs.
Two garbled functions can be linked together:
an encoded output of one garbled function can be transformed
into an encoded input of the other garbled function without communication
between the parties.
Reactive garbling schemes also allow partial evaluation of garbled functions
even when only some of the encoded inputs are provided.
It is possible to further evaluate the linked garbled functions
when more garbled inputs become available.
It is also possible to later garble more functions and link them to the
ongoing garbled evaluation.
We provide rigorous definitions for reactive garbling schemes.
We define a new notion of security for reactive garbling schemes called
confidentiality.
We provide both simulation based and indistinguishability based notions of
security.
We also show that the simulation based notion of security
implies the indistinguishability based notion of security.
We present an instantiation of reactive garbling schemes. We present an
application of reactive garbling schemes to reactive
two-party computation secure against a malicious adversary. We demonstrate
how garbling schemes can be used to give abstract black-box descriptions and
proof of several advanced applications of garbled circuits in the literature,
including Minilego
and Lindell\'s forge-and-loose technique.
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
Our scheme only relies on standard assumptions. Specifically we require a pseudorandom number generator, a linear error correcting code and an ideal oblivious transfer functionality. Based on this we prove our scheme secure in the Universal Composability (UC) framework against a static and malicious adversary corrupting any number of parties.
On a practical note, our scheme improves significantly on the non-homomorphic scheme of Cascudo \\emph{et al.} Based on their observations in regards to efficiency of using linear error correcting codes for commitments we conjecture that our commitment scheme might in practice be more efficient than all existing constructions of UC commitment, even non-homomorphic constructions and even constructions in the random oracle model. In particular, the amortized price of computing one of our commitments is less than that of evaluating a hash function once.
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
studies how to steal information securely and subliminally from cryptosystems.
Secure cryptosystems can be broken if they are maliciously implemented
since the adversary may have some backdoors embedded in the implementation.
Although kleptographic attacks have been investigated about two decades ago,
for too long the possibility of kleptographic attacks have been dismissed and
been viewed only as a far-fetched theoretical concept.
This is dramatically changed when real-world examples were recently revealed
by Edward Snowden, demonstrating that such deliberate attacks
(directly inspired by the original work) exist and probably have been used for massive surveillance. In light of such possible failures of basic protective technology,
the security community started to seriously re-investigate this important issue: one notable example is the work of
Bellare, Paterson, and Rogaway [Crypto \'14], which initiated the formal studies of attacks on symmetric key encryption algorithms.
Motivated by the original examples of subverting key generation algorithms in the kleptography papers from Young and Yung [Crypto \'96, Eurocrypt \'97], we initiate the study of cryptography in the case that {\\em all} algorithms are subject to kleptographic attacks---we call it {\\bf cliptography}. As a first step, we formally study the fundamental primitives of one-way function and trapdoor one-way function in this complete subversion model. And more interesting, we investigate the general immunization strategy to clip the power of kleptographic subversions; concretely, we propose a general framework for sanitizing the (trapdoor) one-way function generation algorithm by hashing the function index, and prove that such procedure indeed destroys the connection between a subverted function generation procedure and any possible backdoor. Along the way, we propose a split program model for practical deployment.
We then examine the applications of (trapdoor) one way function secure in the complete subversion model in two ways. First we consider to build ``higher level\" primitives via black-box reductions. In particular, we consider how to use our trapdoor one-way function to defend against key generation sabotage, and showcase a digital signature scheme that preserves existential unforgeability when {\\em all} algorithms (including key generation, which was not considered to be under attack before) are subject to kleptographic attacks.
Also we demonstrate that the classic Blum-Micali pseudorandom generator (PRG) using our ``unforgeable\" one-way function yields a backdoor-free PRG. Second, we generalize our immunizing technique for one way functions, and
propose a new public immunization strategy to randomize the public parameters of a (backdoored) PRG. Since the previous result by Dodis, Ganesh, Golovnev, Juels, and Ristenpart~[Eurocrypt \'15] requires an honestly generated random key, construction of secure PRG in the complete subversion model was also open until our paper.
Miguel Morales Sandoval, Arturo Diaz Perez
Yandong Zheng, Hua Guo
Subhamoy Maitra
Ayantika Chatterjee, Indranil Sengupta
processor. The FURISC architecture supports arbitrary operations on data encrypted
with Fully Homomorphic Encryption (FHE) and allows the execution of encrypted programs stored in processors with encrypted memory addresses. The FURISC architecture is designed based on fully homomorphic single RISC instructions like {\\em Subtract Branch if Negative} (SBN) and {\\em MOVE}. This paper explains how the use of FHE for designing the ultimate RISC processor is better in terms of security compared to previously proposed somewhat homomorphic encryption (SHE) based processor. The absence of randomization in SHE can lead to Chosen Plaintext Attacks (CPA) which is alleviated by the use of the FHE based Ultimate RISC instruction. Furthermore, the use of FURISC helps to develop fully homomorphic applications by tackling the {\\em termination} problem, which is a major obstacle for FHE processor design. The paper compares the MOVE based FHE RISC processor with the SBN alternative, and shows that the later is more efficient in terms of number of instructions and time required for the execution of a program. Finally, an SBN based FURISC processor simulator has been designed
to demonstrate that various algorithms can indeed be executed on data encrypted with FHE, providing a solution to the termination problem for FHE based processors and the CPA insecurity of SHE processors simultaneously.