IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
24 July 2015
Ilan Komargodski, Mark Zhandry
In this work, we consider two very natural extensions of secret sharing. In the first, which we call distributed secret sharing, there is no trusted dealer at all, and instead the role of the dealer is distributed amongst the parties themselves. Distributed secret sharing can be thought of as combining the features of multiparty non-interactive key exchange and standard secret sharing, and may be useful in settings where the secret is so sensitive that no one individual dealer can be trusted with the secret. Our second notion is called functional secret sharing, which incorporates some of the features of functional encryption into secret sharing by providing more fine-grained access to the secret. Qualified subsets of parties do not learn the secret, but instead learn some function applied to the secret, with each set of parties potentially learning a different function.
Our main result is that both of the extensions above are equivalent to several recent cutting-edge primitives. In particular, general-purpose distributed secret sharing is equivalent to witness PRFs, and general-purpose functional secret sharing is equivalent to indistinguishability obfuscation. Thus, our work shows that it is possible to view some of the recent developments in cryptography through a secret sharing lens, yielding new insights about both these cutting-edge primitives and secret sharing.
Mingqiang Wang, Xiaoyun Wang, Kunxian Xia, Jincheng Zhuang
In this paper, we apply the list decoding method to solve search version of LWE. Our algorithm runs in probabilistic polynomial time and results in specific security estimates for a large range of parameters. To our knowledge, it is the first time to apply the list decoding method to recover the key of LWE.
Our algorithm improves Laine and Lauter\'s result.
Gu Chunsheng
Kazuhiko Minematsu
the nonce and the authentication tag. These expansions can be problematic
when messages are relatively short and communication cost is high.
This paper studies a form of AE scheme whose ciphertext is only expanded by
nonce, with the help of stateful receiver which also enables detection of replays.
While there is a scheme having this feature, called AERO, proposed by McGrew and Foley,
there is no formal treatment based on the provable security framework.
We propose a provable security framework for such AE schemes, which we call MiniAE, and
show several secure schemes using standard symmetric crypto primitives.
Most notably, one of our schemes
has a similar structure as OCB mode of operation and uses only one blockcipher call
to process one input block, thus the computation cost is comparable to the
nonce-based encryption-only schemes.
Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Specifically, we consider private-coin argument systems where the answers of the prover can be predicted, given the private randomness of the verifier.
We show that predictable arguments of knowledge (PAoK) can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (two messages) without loss of generality. We then explore constructs of PAoK. For specific relations we obtain PAoK from Extractable Hash Proof systems (Wee, Crypto \'10); we also show that PAoK are equivalent to Extractable Witness Encryption. Unfortunately, the latter poses serious doubts on the existence of PAoK for all NP. However, we show that for the class of random self-reducible problems in NP we can avoid the problem relying on the assumption of public-coin differing-inputs obfuscation (Ishai et al., TCC \'15).
Finally, we apply PAoK in the context of leakage-tolerant PKE protocols.
At PKC \'13 Nielsen et al. have shown that any leakage-tolerant PKE protocol requires long keys already when it tolerates super-logarithmic leakage.
We strengthen their result proving a more fine-grained lower bound for any constant numbers bits of leakage.
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
- n-KDM-projection security, an extension of circular security, where the adversary may also ask for encryptions of negated secret key bits;
- a (1-o(1)) resilience rate in the bounded-memory leakage model of Akavia et al. (TCC 2009); and
- Auxiliary-input security against subexponentially-hard functions.
We introduce homomorphic weak pseudorandom functions, a homomorphic version of the weak PRFs proposed by Naor and Reingold (FOCS \'95) and use them to realize our base encryption scheme. We obtain homomorphic weak PRFs under assumptions including subgroup indistinguishability (implied, in particular, by QR and DCR) and homomorphic hash-proof systems (HHPS). As corollaries of our results, we obtain (1) a projection-secure encryption scheme (as well as a scheme with a (1-o(1)) resilience rate) based solely on the HHPS assumption, and (2) a unifying approach explaining the results of Boneh et al (CRYPTO \'08) and Brakerski and Goldwasser (CRYPTO \'10). Finally, by observing that Applebaum\'s KDM amplification method (EUROCRYPT \'11) preserves both types of leakage resilience, we obtain schemes providing at the same time high leakage resilience and KDM security against any fixed polynomial-sized circuit family.
Can K{\\i}z{\\i}lkale, \\\"{O}mer E\\v{g}ecio\\v{g}lu, \\c{C}etin Kaya Ko\\c{c}
that multiplication in GF$(2^k)$ with a Type 1 optimal normal
basis for can be performed using $k^2-1$ XOR gates irrespective
of the choice of the irreducible polynomial generating the field.
The previous results achieved this bound only with special
irreducible polynomials. Furthermore, the decomposition method
performs the multiplication operation using $1.5k(k-1)$ XOR gates
for Type 2a and 2b optimal normal bases, which matches previous
bounds.
Benoit Libert, Thomas Peters, Moti Yung
constructions secure in the idealized random oracle model. Indeed, the best known solution based on simple assumptions requires 2.8 kB per signature for currently recommended parameters. Reducing this size and presenting techniques for shorter signatures are thus natural questions. In this paper, our first contribution is to significantly reduce this overhead. Namely, we obtain the first fully anonymous group signatures based on simple assumptions with signatures shorter than 2 kB at the 128-bit security level. In dynamic (resp. static) groups, our signature length drops to 1.8 kB (resp. 1 kB). This improvement is enabled by two technical tools. As a result of independent interest, we first construct a new structure-preserving signature based on simple assumptions which shortens the best previous scheme by 25%. Our second tool is a new method for attaining anonymity in the strongest sense using a new CCA2-secure encryption scheme which is simultaneously a Groth-Sahai commitment.
Ege Gulcan, Aydin Aysu, Patrick Schaumont
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
Ruhr-University Bochum
ECRYPT-NET is a research network of six universities and two companies that intends to develop advanced cryptographic techniques for the Internet of Things and the Cloud, and to create efficient and secure implementations of those techniques on a broad range of platforms. ECRYPT-NET is funded by a prestigious Marie Sklodowska-Curie ITN (Integrated Training Network) grant. The network will educate a group of 15 PhD students with a set of interdisciplinary skills in the areas of mathematics, computer science and electrical engineering. The training will be provided in an international context that includes Summer Schools, workshops and internships. Participants are expected to spend at least six months abroad with a network partner, or in one of the seven associated companies. We are looking for highly motivated candidates, ideally with background on cryptology and with proven research abilities.
One of the ECRYPT-NET ESR (Early Stage Researcher) positions will be based at Ruhr-University Bochum, to work on the project Fully Homomorphic Encryption - Design and Analysis.
We are looking for a candidate with a strong background in algorithmics and with a passion for cryptanalysis.
Marie Curie ITN eligibility criteria apply to this position.
Founded in 2001, the Horst-Görtz Institute at Ruhr-University Bochum is a world-leading interdisciplinary research center dedicated to research and education covering all aspects of IT security, with an excellent record of research in cryptography. The Horst-Görtz Institute has 15 professors and over 80 PhD students. It hosts the only German Research Training Group for Doctoral students in Cryptology.
22 July 2015
Hangzhou Normal University, China
Interested candidates please send CV to Qi Xie {qixie68 (at) 126.com}. The positions offer a competitive salary. All candidates will be contacted for further infomation.
21 July 2015
Hoeteck Wee
- Our first framework yields a conceptually simple and unified treatment of the KDM-secure schemes of Boneh et al. (Crypto 2008), Brakerski and Goldwasser (Crypto 2010) and Brakerski, Goldwasser and Kalai (TCC 2011) in the single-key setting.
- Using our second framework, we obtain new dual-mode cryptosystems based on the d-linear, quadratic residuocity and decisional composite residuocity assumptions.
Both of these frameworks build on the notion of smooth projective hashing introduced by Cramer and Shoup (Eurocrypt 2002), with the additional requirement that the hash function is homomorphic, as is the case for all known instantiations.
Tarik Moataz, Erik-Oliver Blass
Alex Biryukov, Gaëtan Leurent, Léo Perrin
When an exclusive-or is used to combine the output of the round function with the other branch, we use the so-called \\textit{yoyo game} which we improved using a heuristic based on particular cycle structures. The complexity of a complete recovery is equivalent to $O(2^{2n})$ encryptions where $n$ is the branch size. This attack can be used against 6- and 7-round Feistel Networks in time respectively $O(2^{n2^{n-1}+2n})$ and $O(2^{n2^{n}+2n})$. However when modular addition is used, this attack does not work. In this case, we use an optimized guess-and-determine strategy to attack 5 rounds with complexity $O(2^{n2^{3n/4}})$.
Our results are, to the best of our knowledge, the first recovery attacks against generic 5-, 6- and 7-round Feistel Networks.
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
Vladimir Shpilrain, Bianca Sosnovski
(semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi)group. In this paper, we focus on hashing with linear functions of one variable over F_p. The corresponding hash functions are very efficient, in particular, due to the fact that a linear function is determined by its values at two points. Thus, we show that hashing a bit string of length $n$ with our method requires just 2n multiplications in F_p, but with particular pairs of linear functions that we suggest, one does not need to perform any multiplications at all. We also give explicit lower bounds on the
length of collisions for hash functions corresponding to these particular pairs of linear functions over F_p.
Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede