IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
12 August 2015
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P.P. Chakrabarti
Juan Garay, Björn Tackmann, Vassilis Zikas
Cleve\'s result ignited a quest for more relaxed, yet meaningful definitions of fairness, with numerous works suggesting such relaxations and protocols satisfying them. A common pattern in these works, however, is that they only treat the case of non-reactive computation--i.e., distributed computation of \"one-shot\" (stateless) functions, in which parties give inputs strictly before any output is computed. Yet, many natural cryptographic tasks are of a reactive (stateful) nature, where parties provide inputs and receive outputs several times during the course of the computation. This is the case, for example, when computing multi-stage auctions or emulating a virtual stock-exchange market, or even when computing basic cryptographic tasks such as commitments and secret sharing.
In this work we introduce the first notion of fairness tailored to reactive distributed computation, which can be realized in the presence of dishonest majorities. Our definition builds on the recently suggested utility-based fairness notion (for non-reactive functions) by Garay, Katz, Tackmann and Zikas [PODC\'15], which, informally, defines the utility of an adversary who wants to break fairness and uses it as a measure of a protocol\'s success in satisfying the property. Similarly to the non-reactive notion, our definition enjoys the advantage of offering a comparative notion of fairness for reactive functions, inducing a partial order on protocols with respect to fairness.
We then turn to the question of finding protocols that restrict the adversary\'s utility. We provide, for each parameter choice of the adversary\'s utility, a protocol for fair and reactive two-party computation, and prove the optimality of this protocol for one (natural) class of parameter values and (non-tight) lower bounds for all remaining values. Our study shows that achieving fairness in the reactive setting is more complex than in the much-studied case of one-shot functions. For example, in contrast to the non-reactive case, (a) increasing the number of rounds used for reconstructing the output can lead to improved fairness, and (b) the minimal number or rounds required in the reconstruction depends on the exact values of the adversary\'s utility.
University of Tartu, Estonia
Successful candidates will help to design and evaluate cryptographically secure mix-nets and perform other research duties to help with the project, coordinate and advise partners on implementing research prototypes (the candidate may or may not participate in implementing), and ensure the smooth administration of the project including the timely delivery of research output. (Some of these duties apply only for the postdoctoral researcher.) We expect candidates to be able to develop and devote significant time to their own research agenda around the theme of the project.
The EU H2020 project PANORAMIX requires travel to and collaboration with colleagues throughout the European Union. Full travel and equipment budget is available to support the activities of the project.
For any inquiries or to apply for the positions, submit a full research curriculum-vitae (cv), names of two references, and a research statement (obligatory for the postdoctoral researcher) to Prof Helger Lipmaa (firstname.lastname (at) ut.ee) clearly indicating the position sought.
The call for expressions of interest will remain open until a suitable candidate is appointed. However, the project starts from September 1, 2015, and will last for three years. In the case of interest, the candidat
11 August 2015
Stian Fauskanger, Igor Semaev
[1] D. Davies and S. Murphy, \"Pairs and Triplets of DES S-boxes\", Journal of Crypt. vol. 8(1995), pp. 1--25
University of Florida, Gainesville, FL, USA
Ideal candidates should have experience in the following areas:
- Applied cryptography and provable security
- Formal methods applied to security protocols
- Information theory
- Embedded and hardware security primitives including PUFs, TRNGs, etc.
The position is available immediately and for a period of up to three years.
Job Requirements:
- PhD in Computer Science, Electrical and Computer Engineering, or related field
- Excellent technical English writing and oral communication skills
- Should have papers published in top tier conferences/journals (IEEE S&P, CCS, USENIX Security, etc.)
- Familiarity with VLSI design principles, CAD tools, and emerging integration approaches (2.5D ICs, 3D ICs) is encouraged, but not required
Application Procedure:
- Interested applicants should send CVs and supporting information (relevant publications, etc.) to Prof. Domenic Forte (dforte (at) ece.ufl.edu) and Prof. Mark Tehranipoor (tehranipoor (at) ece.ufl.edu)
- Only short-listed candidates will be notified for interview
- Application closes when the position is filled
10 August 2015
Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
trace of binary eld multiplication. In order to prevent SCA, we also suggest a mask based binary eld multiplication which ensures a regular and constant time solution without LUT and branch statements.
Jihoon Cho, Kyu Young Choi, and Duk Jae Moon
Scott Fluhrer
Shahram Khazaei, Siavash Ahmadi
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
In this paper, we greatly expand the mining strategy space, and consider a class of stubborn mining strategies where a miner performs better by taking long shot gambles. Consequently, we show that the selfish mining attack is not optimal for a large parameter region.
Further, we show how a miner can further amplify its gain by non-trivially composing mining attacks and network-level attacks. We show that surprisingly, in some strategies desirable for the adversary, victims of an eclipse attack can actually benefit from being eclipsed!
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Specifically, we analyze our protocols in the presence of malicious non-aborting adversaries (for which we obtain full security) and malicious aborting adversaries (for which we obtain 1/p-security, which implies that the simulation fails with probability at most 1/p+negl). We further prove that our security guarantee is tight with respect to the party that obtains the input first.
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
Gangqiang Yang, Mark D. Aagaard, Guang Gong
power consumption requirements in passive RFID systems. Warbler is built upon three nonlinear feedback shift registers (NLFSRs) and four WG-5 transformation modules. We employ two design options to implement Warbler and three different compilation methods to further optimize the area, maximum operating frequency, and power consumption. We can achieve an area of 498 GEs after the place and route phase in a CMOS 65nm ASIC, with a maximum frequency of 1430 MHz and a total power consumption of 1.239 uW at 100 KHz. Accordingly, an area of 534 GEs after the place and route phase, with a maximum frequency of 250 MHz and a total power consumption of 0.296 uW at 100 KHz can be obtained in a CMOS 130nm ASIC. Our results show that the LFSR counter based
design is better than the binary counter-based one in terms of area and power consumption. In addition, we show that the areas of WG-5 transformation look-up tables depend on the specific decimation values.
Pantelimon Stanica
Omer Paneth, Amit Sahai
of multilinear maps follows from iO --- has remained largely open.
We offer an abstraction of multilinear maps called Polynomial Jigsaw Puzzles, and show that iO for circuits implies Polynomial Jigsaw Puzzles. This implication is unconditional: no additional assumptions, such as one-way functions, are needed. Furthermore, we show that this abstraction of Polynomial Jigsaw Puzzles is sufficient to construct iO for NC1, thus showing
a near-equivalence of these notions.
Dennis Hofheinz, Vanishree Rao, Daniel Wichs
In this work, we resolve the above question in the negative and construct a highly contrived encryption scheme which is CPA (and even CCA) secure but is not IND-SOA secure. In fact, it is broken in a very obvious sense by a selective opening attack as follows. A random value is secret-shared via Shamir\'s scheme so that any t out of n shares reveal no information about the shared value. The n shares are individually encrypted under a common public key and the n resulting ciphertexts are given to the adversary who selectively chooses to see t of the ciphertexts opened. Counter-intuitively, this suffices for the adversary to completely recover the shared value. Our contrived scheme relies on strong assumptions: public-coin differing inputs obfuscation and a certain type of correlation intractable hash functions.
We also extend our negative result to the setting of SOA attacks with key opening (IND-SOA-K) where the adversary is given a collection of ciphertexts under different public keys and selectively chooses to see some subset of the secret keys.
Rabih Mohsen, Alexandre Miranda Pinto
Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
Doubling and Additions of points on the given elliptic curve require several additions and multiplications in the base field and this number is not the same for the two operations.
The idea of the atomicity protection is to use a fixed pattern, i.e. a small number of instructions and rewrite the two basic operations of ECC using this pattern. Dummy operations are introduced so that the different elliptic curve operations might be written with the same atomic pattern. In an adversary point of view, the attacker only sees a succession of patterns and is no longer able to distinguish which one corresponds to addition and doubling.
Chevallier-Mames, Ciet and Joye were the first to introduce such countermeasure.
In this paper, we are interested in studying this countermeasure and we show a new vulnerability since the ECDSA implementation succumbs now to C Safe-Error attacks. Then, we propose an effective solution to prevent against C Safe-Error attacks when using the Side-Channel Atomicity. The dummy operations are used in such a way that if a fault is introduced on one of them, it can be detected. Finally, our countermeasure method is generic, meaning that it can be adapted to all formulae. We apply our methods to different formulae presented for side-channel Atomicity.
Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
An optimal key enumeration algorithm (OKEA) was proposed by Charvillon et al. at SAC\'12. Given the ranked key chunks together with their probabilities, this algorithm outputs the full combined keys in the optimal order - from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find the right key can be prohibitively high.
To tackle this problem, we propose a score-based key enumeration algorithm (SKEA). Though it is suboptimal in terms of the output order of cadidate combined keys, SKEA\'s memory and running time requirements are more practical than those of OKEA. We verify the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time and memory. We also compare SKEA to the probabilistic key enumeration algorithm (PKEA) by Meier and Staffelbach and show its practical superiority in this case. We propose a high-performance solution for the entire conquer stage of side-channel attacks that includes SKEA and the subsequent full key testing, using AES-NI on Haswell Intel CPUs.
07 August 2015
Cape Town, South Africa, November 15 - November 17
From November 15 to November 17
Location: Cape Town, South Africa
More Information: http://sdiwc.net/conferences/infosec2015/