IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
15 December 2015
Oregon State University, Corvallis OR, USA
Job PostingFor full consideration, apply online by February 15, 2016.
Closing date for applications: 15 February 2016
Contact: Brenda Langley, Brenda.Langley (at) oregonstate.edu
More information: http://jobs.oregonstate.edu/applicants/Central?quickFind=68792
12 December 2015
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, L\'aszl\'o T\'oth
ePrint ReportKhodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, L\'aszl\'o T\'oth
ePrint ReportNico Doettling, Dominique Schröder
ePrint ReportInstantiating our paradigm with specific number theoretic assumptions, we construct a PRF based on $k$-LIN (and thus DDH) that is faster than all known constructions, which reduces almost tightly to the underlying problem, and which has shorter keys. Instantiating our paradigm with general assumptions, we construct a PRF with very flat circuits whose security almost tightly reduces to the security of some small domain PRF. As an exemplifying instance, we use the PRF of Banerjee, Peikert, and Rosen (EUROCRYPT'12) based on LWE, as the underlying small domain PRF and we obtain a construction that is secure (for large domains) under a weaker assumption, with a tighter proof of security, and the resulting circuit is shallower than instantiating the BPR scheme with a large domain directly.
Alan Szepieniec, Jintai Ding, Bart Preneel
ePrint ReportEsha Ghosh, Olga Ohrimenko, Roberto Tamassia
ePrint ReportNicky Mouha
ePrint ReportZhiqiang Lin, Dingyi Pei, Dongdai Lin
ePrint Report11 December 2015
Institute of Science and Technology Austria (IST Austria)
Job Posting- Cryptocurrencies
- Leakage-Resilient Cryptography
- Symmetric Cryptography
- Computational Entropy (aka Pseudoentropy)
- Adaptive Security
- Memory-Hard Functions
Postdocs applicants are expected to have a solid publication record in cryptography, including at least some papers in top crypto or TCS conferences like Crypto, Eurocrypt, TCC, FOCS, STOC, ICALP,... and should contact Krzysztof Pietrzak directly ( pietrzak (at) ist.ac.at )
Closing date for applications: 8 January 2016
Contact: Krzysztof Pietrzak
https://ist.ac.at/research/research-groups/pietrzak-group/
pietrzak (at) ist.ac.at
More information: http://pub.ist.ac.at/crypto/
10 December 2015
Northern Arizona University, Flagstaff, Arizona USA
Job PostingJob Description: Northern Arizona University is launching a Cyber-Security research program focusing at first on hardware authentication, and the design of secure circuits with embedded secure memories, Physically Unclonnable Functions (PUFs), Random Number Generators (RNG), and crypto-processors.
The Job responsibilities include but are not limited to:
- Design memory state machines with FPGA (or/and ASIC) and surrounding analog interface to drive the PUFs, RNG, and other cryptographic functions.
- Design micro-controller based test board to emulate full authentication, Challenges and Responses of the PUFs, and extract Challenge/Response Pair error rate
- Conduct autonomous research work to study innovative architectures
- Consider ways to test the new structures, and incorporate Build In Self Test (BIST) in the state machine
Minimum Qualifications:
- Earned PhD in Electrical Engineering, Microelectronics, or related field by the time of the appointment
Preferred Qualifications:
- Demonstrated experience in at least one of the following field: mixed mode design, memory design, state machine architecture, BIST,
- Experience in installing and debugging FPGA boards, and micro-controller systems, including embedded software
- Strong publication record
- Experience and/or commitment to work effectively with NAU’s diverse faculty, staff, and student populations.
Knowledge Skills and Abilities:
- Proficiency in using ASIC or FPGA software development tools
- Ability to understand hardware architecture and VHDL design methodology
- Understanding how the basic operations of a memory state machine operate: Read, Program, Erase
- Creative, and independent
- Ability to work effectively in diverse, interdisciplinary research environment
Closing date for applications: 29 January 2016
Contact: Bertrand Cambou, Bertrand.cambou (at) nau.edu
More information: http://nau.edu/Human-Resources/Careers/Staff-Welcome-Page/
Bucharest, Romania, 9 June - 10 June 2016
Event CalendarSubmission deadline: 4 March 2016
Notification: 4 May 2016
CWI Amsterdam, The Netherlands
Job PostingClosing date for applications: 29 February 2016
Contact:
Ronald Cramer (Head of the CWI Cryptology Group & Professor, Math Inst, Leiden U.) and Leo Ducas (Scientific Staff Member, CWI Cryptology Group).
Email: {cramer,ducas}@cwi.nl
09 December 2015
Ignat Korchagin, Eugene Pilyankevich
ePrint ReportKenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
ePrint ReportVipul Goyal, Omkant Pandey, Silas Richelson
ePrint Report\begin{itemize} \item The protocol has only \emph{three rounds} of interaction. Pass (TCC 2013) showed an impossibility result for a two-round non-malleable commitment scheme w.r.t. a black-box reduction to any ``standard" intractability reduction. Thus, this resolves the round complexity of non-malleable commitment at least w.r.t. black-box security reductions. Our construction is secure as per the standard notion of non-malleability w.r.t. commitment.
\item Our protocol is \emph{truly efficient}. In our basic protocol, the entire computation of the committer is dominated by just three invocations of a non-interactive statically binding commitment scheme, while, the receiver computation (in the commitment stage) is limited to just sampling a random string. Unlike many previous works, we directly construct a protocol for large tags and hence avoid any non-malleability amplification steps.
\item Our protocol is based on a black-box use of any non-interactive statistically binding commitment scheme. Such schemes, in turn, can be based on any one-to-one one-way function (or any one-way function at the cost of an extra initialization round). Previously, the best known black-box construction of non-malleable commitments required a larger (constant) number of rounds.
\item Our construction is public-coin and makes use of only black-box simulation. Prior to our work, no public-coin constant round non-malleable commitment schemes were known based on black-box simulation.
\end{itemize}
Our techniques depart \emph{significantly} from the techniques used previously to construct non-malleable commitment schemes. As a main technical tool, we rely on non-malleable codes in the split state model. Our proofs of security are purely combinatorial in nature.
In addition, we also present a simple construction of constant round non-malleable commitments from any one-way function. While this result is not new, the main feature is its simplicity compared to \emph{any} previous construction of non-malleable commitments (in any number of rounds). We believe the construction is simple enough to be covered in a graduate level course on cryptography. The construction uses non-malleable codes in the split state model in a black-box way.
Jakob Jakobsen, Claudio Orlandi
ePrint ReportOur main discovery is that the symmetric encryption scheme used in Telegram -- known as MTProto -- is not IND-CCA secure, since it is possible to turn any ciphertext into a different ciphertext that decrypts to the same message.
We stress that this is a theoretical attack on the definition of security and we do not see any way of turning the attack into a full plaintext-recovery attack. At the same time, we see no reason why one should use a less secure encryption scheme when more secure (and at least as efficient) solutions exist.
The take-home message (once again) is that well-studied, provably secure encryption schemes that achieve strong definitions of security (e.g., authenticated-encryption) are to be preferred to home-brewed encryption schemes.
Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
ePrint ReportTo this end, we first analyze the multiplicative depth required for an equality test algorithm with respect to the plaintext space inhabited by general FHE schemes. The primary reason for this approach is that given an equality test algorithm, its efficiency is measured in terms of the multiplicative depth required to construct its arithmetic circuit expression. Indeed, the implemented equality test algorithm dominates the entire performance of FHE-based query solutions, apart from the performance of the underlying FHE scheme. Then, we measure the multiplicative depth considering an FHE scheme that takes an extension field as its plaintext space and that supports the depth-free evaluation of Frobenius maps. According to our analysis, when the plaintext space of an FHE scheme is a field of characteristic $2$, the equality test algorithm for $\ell$-bit messages requires the lowest multiplicative depth $\lceil\log{\ell}\rceil$. Furthermore, we design a set of private query protocols for conjunctive, disjunctive, and threshold queries based on the equality test algorithm. Similarly, applying the equality test algorithm over $\F_{2^{\ell}}$, our querying protocols require the minimum depths. More specifically, a multiplicative depth of $\lceil\log{\ell}\rceil+\lceil\log{(1+\rho)}\rceil$ is required for conjunctive and disjunctive queries, and a depth of $\lceil\log{\ell}\rceil+2\lceil\log{(1+\rho)}\rceil$ is required for threshold conjunctive queries, when their query conditions have $\rho$ attributes to be compared. Finally, we provide a communication-efficient version of our solutions, though with additional computational costs, when an upper bound $\delta$~($0\leq \delta\leq 1$) on the selectivity of a database is given. Consequently, we reduce the communication cost from $n$ to approximately $\lfloor\delta n\rfloor$ ciphertexts with $\lceil\log{n}\rceil$ additional depth when the database consists of $n$ tuples.
Beijing, China, 20 April - 22 April 2016
Event CalendarSubmission deadline: 15 January 2016
Kowloon, Hong Kong, 16 March - 18 March 2016
Event CalendarSubmission deadline: 23 December 2015
08 December 2015
CipherQ, Toronto, Canada
Job PostingThis position requires a sound academic background in both analytical and theoretical fields. The positions will primarily focus on work such as characterizing secure data communications in terms of encryption, encoding and other signal modifications and then providing the necessary technical elaboration to help engineering teams develop and implement techniques to efficiently handle these signals.
In this position, it would be a requirement to develop mathematical techniques to find solutions and then implement the solutions as efficiently as possible in both computer hardware and software. These techniques will also be used to evaluate cryptographic algorithms and protocols as well as provide guidance on the design and development of cryptographic systems. Areas of mathematics particularly applicable to this position at CipherQ include:
- Abstract algebra (especially finite field theory)
- Computational number theory
- Linear algebra and numerical methods
- Statistics
- Combinatorics
- Cryptography and Applied Cryptanalysis
- Theoretical computer science
Expertise and applied knowledge of modern cryptographic algorithms and protocols is a mandatory requirement. Additional capabilities in cryptography that will be an asset include but are not limited to:
- Lattice-based
- Multivariate
- Hash-based
- Code-based
- Discrete Finite Fields and Elliptic Curves
- Quantum key distribution
Other areas of knowledge that would be considered key assets:
- Strong knowledge of computer programming languages: C/C++, Java, Python, Octave/Mathematica/Maple/Matlab environments.
- Knowledge of telecommunications and networking principles
- An understanding of modern computer architectures and information technology architectures including cloud computing
Education: Doctoral degree in Mathematics, or equivalent degree in other mathematical sciences or engineeri
Closing date for applications: 31 March 2016
Contact: Dr. Christian Weedbrook