IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
18 August 2015
Varsha Bhat, Harsimran Singh, Sudarshan Iyengar
the identity of the parties. As part of the protocol, we present and make use of a technique to compute a random assignment of the numbers
{1, 2, ..., n} to n people. Our work has direct applications in the data collection stage of Social Network Analysis, where, it is of vital importance to compute the underlying network without compromising on the personal information or identity of the parties involved.
Wei Dai, Berk Sunar
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
improved by Clavier et alii and presented at INDOCRYPT 2012. At SAC 2013, Bauer et alii presented the rst attack based on the Big Mac principle on implementations based on elliptic curves with simulation results.
In this work, we improve the attack presented by Bauer et alii to considerably increase the success rate. Instead of comparing only two multiplications, the targeted implementation
permits to compare many multiplications. We give experiment results with traces taken from a real target to prove the soundness of our attack. In fact, the experimental results show that the original Big Mac technique given by Walter was better
that the technique given by Clavier et alii. With our experiments on a real target, we show that the theoretical improvements are not necessarily the more suitable methods depending on the targeted implementations.
KU Leuven Cosic Leuven
For the above position the candidates must hold a Master’s Degree in engineering, mathematics or computer science, have good grades and have a keen interest in cryptography. We prefer candidates who can demonstrate that they have developed their research skills during their Master’s studies. For postdocs a PhD degree in the relevant area is required.
Why working at KU Leuven COSIC?
COSIC is a top research group in the crypto and security field
KU Leuven is one of Belgium’s leading research institutions
the campus offers high-class educational and recreational facilities
both the research group and the university provide a dynamic and international environment
the working language is English, the knowledge of Dutch is not required
ample networking opportunities with people working in the security field
Good future job prospects
Leuven is a lively, friendly university city located near Brussels
17 August 2015
Ritam Bhaumik, Mridul Nandi
Qingji Zheng, Xiangxue Li, Aytac Azgin
ciphertexts without compromising keyword security. We further investigate this problem and propose a novel variant, dubbed certificateless keyword search on encrypted data (CLKS). CLKS not only supports keyword search on encrypted data, but also brings promising features due to the certificateless cryptography. In contrast to the certificated-based keyword search, CLKS requires no validation on the trustworthy of the public key before encrypting keywords; in contrast to the identity-based
keyword search, CLKS prevents the key issuer (e.g., key generator center) from penetrating any information on keyword ciphertexts by leveraging the capability of accessing all data users\' (partial) private keys. Specifically, we rigorously define the syntax and security definitions for CLKS, and present the construction that is provably secure in the standard model under the Decisional Linear assumption. We implemented the proposed CLKS scheme and evaluated its performance. To the best of our knowledge, this is the first attempt to integrate certificateless cryptography with keyword search on encrypted data.
Mohammad Mahmoody, Ameer Mohammedy
Our proof relies on the reconstruction paradigm of Gennaro and Trevisan (FOCS 2000) and Haitner et al (FOCS 2007) and extends their techniques for one-way and trapdoor permutations to the setting of HIBE. A technical challenge for our separation of HIBE stems from the adaptivity of the adversary who is allowed to obtain keys for different identities before she selects the attacked identity. Our main technical contribution is to show how to achieve compression/reconstruction in the presence of such adaptive adversaries.
Tel Aviv, Israel, January 10 - January 13
From January 10 to January 13
Location: Tel Aviv, Israel
More Information: http://www.cs.tau.ac.il/conferences/tcc2016/call_for_papers.html
16 August 2015
Singapore University of Technology and Design (SUTD)
Candidates should have a Master or Bachelor Degree (EE or CS) and preferably have networking and network simulation background. This position will give good opportunity to engage in the theoretical research and the implementation.
How to apply: Interested candidates kindly send their CV to Dr. Alfonso Iacovazzi (email: alfonso.iacovazzi (at) uniroma1.it) or to Prof. Yuval Elovici (email: yuval_elovici (at) sutd.edu.sg). Initial screening of applications will begin immediately and only shortlisted candidates will be notified. The position will remain open until filled.
About iTrust@SUTD:
iTrust is a multidisciplinary research centre located at the Singapore University of Technology and Design (SUTD), established collaboratively by SUTD and the Ministry of Defence, Singapore (MINDEF). iTrust researchers focus on the development of advanced tools and methodologies to ensure security and safety of current and future Cyber Physical Systems, Enterprise security and Internet of Things. The Singapore University of Technology and Design (SUTD) is established in collaboration with Massachusetts Institute of Technology (MIT) to advance knowledge and nurture technically grounded leaders and innovators to serve social needs.
14 August 2015
Alex Biryukov, Léo Perrin, Aleksei Udovenko
We managed to reverse-engineer this S-Box and describe its unpublished structure. Our decomposition allows a much more efficient hardware implementation but the choice of the components used is puzzling from a cryptographic perspective.
This extended abstract does not explain \\emph{how} we found this decomposition. We will describe our process in an extended version of this paper.
Alan Szepieniec, Bart Preneel
1. A tally-hiding voting system, in which the tally that is released consists of only the winner without the vote count. Our proposal builds on a novel solution to the millionaire problem which is of independent interest.
2. A self-tallying vote, in which the tally can be calculated by any observer as soon as the last vote has been cast --- but before this happens, no information about the tally is leaked.
3. Authentication of voting credentials, which is a new approach for electronic voting systems based on anonymous credentials. In this approach, the vote authenticates the credential so that it cannot afterwards be used for any other purpose but to cast that vote. We propose a practical voting system that instantiates this high-level concept.
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
This property has been instrumental in constructing round-efficient protocols for various tasks [KO04,DPV04,YZ07,SV12]. In all such constructions, the WI proofs are used to prove the OR composition of statements that are specified at different stages of the main protocol. The special property of LS proofs is used precisely to allow a player of the main protocol to start a proof, even if only one of the statements of the OR relation is available, thus saving rounds of communication.
If, on the one hand, the usage of LS proofs saves rounds, on the other hand it necessarily requires \\NP-reductions to Graph Hamiltonicity. As such, even if each of the statements to be proved in the main protocol admits an efficient Sigma-protocol (e.g., if the statement consists in proving knowledge of a committed value or of a secret key), the reduced round complexity is paid for with a loss of efficiency. Hence, round-efficient constructions that rely on LS proofs are typically inefficient.
A natural question is why one would go through the NP-reduction to use LS proof, instead of composing the Sigma-protocols using the OR composition technique introduced in [CDS94]. The answer is that the CDS technique requires both statements to be available at the beginning of the protocol. Due to this limitation, constructions that use the CDS technique have in some cases a worse round complexity than the ones based on LS proofs.
In this paper we introduce a new OR composition technique for Sigma-protocols that needs only one statement to be fixed when the proof begins. This seemingly weaker property is sufficient to replace the use of LS proofs in many applications that do not need both theorems to be undefined when the proof starts. In fact, we show how the new OR composition technique can directly improve the round complexity of
the efficient perfectly simulatable argument of [Pass03] (from four to three rounds) and of efficient resettable WI arguments (from five to four rounds).
Our OR technique can not compose any arbitrary pair of Sigma-protocols.
Nevertheless, we provide a precise classification of the Sigma-protocols that can be composed and show that all the widely used Sigma-protocols can be composed with our technique.
Chrysanthi Mavromati
based on the ARX methodology. In this paper, we present key-recovery
attacks against Chaskey in the single and multi-user setting. These attacks are based on recent work by Fouque, Joux and Mavromati presented at Asiacrypt 2014 on Even-Mansour based constructions. We first
show a simple attack on the classical single-user setting which confirms
the security properties of Chaskey. Then, we describe an attack in the
multi-user setting and we recover all keys of 2^{43} users by doing 2^{43} queries
per user. Finally, we show a variant of this attack where we are able to
recover keys of two users in a smaller group of 2^{32} users.
NEC Laboratories Europe, Heidelberg, Germany
A good understanding of most of the following areas is required:
- Distributed systems and protocols, especially secure management of distributed resources e.g. IoT devices, software, services and data
- Security technologies and protocols, including applied cryptography and Privacy Enhancing Technologies
- Operating system internals and software development including experience with programming languages, such as Java, Scala or C/C++
- Deep knowledge of Linux as a development platform. Experience with OpenStack is a plus.
We are looking for individuals with a broad background in Computer Science and Software Engineering and we expect a master’s degree with some relevant professional experience in development for the security area.
Symphony.com
DUTIES
? Define the Product that solves needs of customers, involving Engineering and Design to craft a feasible, performing and delightful experience
? Partner with Engineering to define the development plan and implement the Product
REQUIRED
? BA/BS in computer science or related field; strong technical skills
? 3+ years as a software engineer in an enterprise software company
? 7+ years as Product Mgr
? Security domain expertise - at least one of the following: cloud and infrastructure security, cryptography, secure protocols, software hardening and mobile security
Full description on our website.
Symphony.com
Reports to the CSO and is based in our HQ in Palo Alto, CA.
DUTIES
• Conduct advanced penetration tests to identify vulnerabilities in applications and computer systems for our corporate and SaaS environment, using automated tools, ad-hoc tools, and manual testing
• Conduct penetration testing against different technological domains including, but not limited to, web applications, web services, wireless networks, databases, virtualized environments
REQUIRED
?• BSCS
• 10+ years InfoSec
• Security certs (e.g., CISSP, GSEC, CEH, etc.)
• Exp w/ penetration testing and forensics tools/platforms such as AppScan, Fortify, Maltego. Kali Linux, Nessus, nmap, OpenVAS
• Exp w/ exploitation frameworks, such as Metasploit, w3af, Core Impact, Canvas
Salaried position with bonus, benefits, stock options
Mihir Bellare, Joseph Jaeger, Daniel Kane
13 August 2015
Xi'an, China, May 31
Notification: 15 February 2016
From May 31 to May 31
Location: Xi'an, China
More Information: http://icsd.i2r.a-star.edu.sg/cpss16/
12 August 2015
Sumit Chakraborty
Keywords: Secure multi-party computation, Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao