IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 March 2016
Santos Merino Del Pozo, François-Xavier Standaert
ePrint ReportArno Mittelbach, Daniele Venturi
ePrint ReportWe initiate the study of complementary positive results, namely, studying classes of interactive protocols where the FS transform *does* have standard-model instantiations. In particular, we show that for a class of "highly sound" protocols that we define, instantiating the FS transform via a $q$-wise independent hash function yields NIZK arguments and secure signature schemes. In the case of NIZK, we obtain a weaker "$q$-bounded" zero-knowledge flavor where the simulator works for all adversaries asking an a-priori bounded number of queries $q$; in the case of signatures, we obtain the weaker notion of random-message unforgeability against $q$-bounded random message attacks.
Our main idea is that when the protocol is highly sound, then instead of using random-oracle programming, one can use complexity leveraging. The question is whether such highly sound protocols exist and if so, which protocols lie in this class. We answer this question in the affirmative in the common reference string (CRS) model and under strong assumptions. Namely, assuming indistinguishability obfuscation and puncturable pseudorandom functions we construct a compiler that transforms any 3-move interactive protocol with instance-independent commitments and simulators (a property satisfied by the Lapidot-Shamir protocol, Crypto '90) into a compiled protocol in the CRS model that is highly sound. We also present a second compiler, in order to be able to start from a larger class of protocols, which only requires instance-independent commitments (a property for example satisfied by the classical protocol for quadratic residuosity due to Blum, Crypto '81). For the second compiler we require dual-mode commitments.
We hope that our work inspires more research on classes of (efficient) 3-move protocols where Fiat-Shamir is (efficiently) instantiable.
Universite Libre de Bruxelles
Job PostingPost-doc Position in Cloud Security
Applications are invited for a two-years Post-Doc position to work on the analysis and the design of secure protocols for cloud environments.
Candidates are expected to publish papers in well-known security related conferences and journals and should:
- Hold a PhD degree in Computer Science, Mathematics or related fields
- Have solid background on computer security and cryptography
- Have a good publication record
- Demonstrate an excellent level of spoken and written English. Knowledge of French is a plus.
Applications must include:
- a curriculum vitae, including a list of publications
- copies of diplomas
- two (or more) references
Closing date for applications: 10 April 2016
Contact: Applications can be send by email to Prof. Olivier Markowitch, olivier.markowitch (at) ulb.ac.be
More information: http://qualsec.ulb.ac.be/research/post-doc/
Ivica Nikolic, Yu Sasaki
ePrint ReportBin Zhang, Chao Xu, Willi Meier
ePrint Report20 March 2016
Bing Zeng , Christophe Tartary , Chingfang Hsu
ePrint ReportZeng Bing , Tang Xueming, Xu Peng, Jing Jiandu
ePrint ReportThe DDH-based instantiation of our first framework costs the minimum communication rounds and the minimum computational overhead, compared with existing practical protocols for oblivious transfer with fully simulatable security against covert adversaries or malicious adversaries.
Though our second framework is not efficient, compared with existing practical protocols with one-sided simulatable security against malicious adversaries. However, it first provides a way to deal with general $OT^{n}_{h}$ on this security level. What is more, its DDH-based instantiation is more efficient than the existing practical protocols for oblivious transfer with fully simulatable security against malicious adversaries.
19 March 2016
Chalmers University of Technology, Sweden
Job PostingThe PhD student is expected to have a MSc degree or equivalent, and strong background in mathematics and/or theoretical computer science, with some background in cryptography.
The position is fully funded for five years. The call for expressions of interest will remain open until a suitable candidate is appointed.
For any inquiries or to apply for the position, submit a full research curriculum-vitae (cv), names of two references, and a research statement to Prof. Katerina Mitrokotsa (aikmitr@ chalmers.se) clearly indicating the position sought.
Successful candidates will help to design and evaluate cryptographically reliable and privacy-preserving authentication protocols.
Closing date for applications: 31 March 2016
Contact: Katerina Mitrokotsa
Associate Professor
Chalmers University of Technology
Department of Computer Science and Engineering
Göteborg, Sweden
Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turke
Job Posting- For more information about our group and projects, visit
https://crypto.ku.edu.tr
- For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit
https://gsse.ku.edu.tr/en/academics/computer-science-and-engineering/program-overview/
Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.
For Ph.D. applicants from China and Hong Kong, we have the prestigious Fung scholarship:
https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong
- For summer internship opportunities (at both undergraduate and graduate level), visit
http://kusrp.ku.edu.tr
- For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü directly, including full CV, sample publications, a research proposal, and 3 reference letters sent directly by the referees.
http://home.ku.edu.tr/~akupcu
Late applications will be accepted, though early applications will be given precedence.
Closing date for applications: 12 June 2016
Contact: gsse (at) ku.edu.tr
https://gsse.ku.edu.tr/phd-computer-science-and-engineering
More information: https://gsse.ku.edu.tr/en/academics/computer-science-and-engineering/program-overview/
IMDEA Software Institute
Job PostingApplications are open for a PhD position in the field of privacy enhancing technologies with the Security Group of IMDEA Software Institute (http://software.imdea.org/). The successful applicant can start from April 2016.
Candidates should either have graduated in Computer Science, Engineering, Mathematics or a related MSc course. A good engineering mathematics background and a strong interest in Security and Privacy is necessary. Inquisitiveness, commitment, and a critical attitude is expected. The working language at the institute is English, and candidates can be of any nationality.
The successful applicant will work under the supervision of Dr. Carmela Troncoso on the design and evaluation of privacy-preserving systems. The project will tackle the definition of privacy metrics, the development of techniques to compute them and their integration in the design and engineering of privacy enhancing technologies.
The IMDEA Software Institute is based in Madrid, Spain. The typical duration of a PhD grant at the IMDEA Software Institute is between 3 and 5 years and salaries are internationally competitive, including attractive conditions such as access to an excellent public healthcare system.
Applicants interested in the position should send an email to Carmela Troncoso and submit the application documents at https://careers.imdea.org/software/. Review of applications starts immediately until the position is filled. The application requires:
- Curriculum Vitae
- Motivation letter describing at least one research question you would like to work on
- Names (and e-mail) of 3 persons that can provide references about you and your work
For any question send Carmela Troncoso an email
Closing date for applications: 31 July 2016
Contact: Informal enquiries can be sent to Carmela Troncoso at carmela.troncoso AT imdea.org
More information: https://software.imdea.org/~carmela.troncoso/openpositions.html
18 March 2016
Qian Guo, Thomas Johansson, Paul Stankovski
ePrint ReportCeline Chevalier, Fabien Laguillaumie, Damien Vergnaud
ePrint ReportRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
ePrint ReportMarshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
ePrint ReportYevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
ePrint ReportWe show that backdoored PRGs are equivalent to public-key encryption schemes with pseudorandom ciphertexts. We use this equivalence to build backdoored PRGs that avoid a well known drawback of the Dual EC PRG, namely biases in outputs that an attacker can exploit without the trapdoor. Our results also yield a number of new constructions and an explanatory framework for why there are no reported observations in the wild of backdoored PRGs using only symmetric primitives.
We also investigate folklore suggestions for countermeasures to backdoored PRGs, which we call {\em immunizers}. We show that simply hashing PRG outputs is not an effective immunizer against an attacker that knows the hash function in use. Salting the hash, however, does yield a secure immunizer, a fact we prove using a surprisingly subtle proof in the random oracle model. We also give a proof in the standard model under the assumption that the hash function is a universal computational extractor (a recent notion introduced by Bellare, Tung, and Keelveedhi).
17 March 2016
University College London
Job PostingUniversity College London is one of Europe\'s highest ranked universities. The department is ranked as the best in computer science in the UK and recognized by the EPSRC and GCHQ as an Academic Centre of Excellence in Cyber Security Research. We are located at UCL\'s main campus in the centre of London.
Closing date for applications: 8 April 2016
Contact: Informal enquiries can be sent to Jens Groth at j.groth AT ucl.ac.uk
More information: http://www.cs.ucl.ac.uk/staff/J.Groth/openings.html
Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey
Job Posting- For more information about our group and projects, visit https://crypto.ku.edu.tr
- For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit https://gsse.ku.edu.tr/phd-computer-science-and-engineering
Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.
For applicants from China and Hong Kong, we have the prestigious Fung scholarship https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong - For summer internship opportunities (at both undergraduate and graduate level), visit http://kusrp.ku.edu.tr
- For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü direcly, including full CV, sample publications, and a research proposal. http://home.ku.edu.tr/~akupcu
Closing date for applications: 1 June 2016
Contact: gsse (at) ku.edu.tr
https://gsse.ku.edu.tr/phd-computer-science-and-engineering
More information: https://gsse.ku.edu.tr/phd-computer-science-and-engineering
PACE, Nanyang Technological University, Singapore
Job PostingThe candidate will perform the research on hardware design/analysis of cryptosystems in FPGA/ASIC/Microcontrollers, with prime focus on PKC/PQC. The underlying work will involve design, analysis and lab. testing in equal parts.
The initial contract will be one year with strong possibilities of further extensions. Supported by government research fundings, we concentrate on cutting-edge research, candidates are expected to have good publication record, especially those with conferences/workshops of IACR. Besides an active group to work with, we also offer globally competitive salaries, including basic monthly salary and performance-based bonus, besides other allowances.
Only shortlisted candidates will be contacted for interview.
Contact: Shivam Bhasin, Co Principal Investigator. Email: sbhasin (at) ntu.edu.sg
Closing date for applications: 30 June 2016