IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
31 May 2016
Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
Mihir Bellare, Daniel Kane, Phillip Rogaway
Alberto Battistello, Jean-Sebastien Coron, Emmanuel Prouff, Rina Zeitoun
In this paper we investigate the security of an implementation when the previous condition is not satisfied, for example when the masking order $n$ increases for a constant noise $\sigma$. We exhibit two (template) horizontal side-channel attacks against the Rivain-Prouff's secure multiplication scheme and we analyze their efficiency thanks to several simulations and experiments.
Eventually, we describe a variant of Rivain-Prouff's multiplication that is still provably secure in the original ISW model, and also heuristically secure against our new attacks.
University of Bergen, Norway
About the Department:
The Department has 6 research groups, Algorithms, Bioinformatics, Optimization, Programming Theory, Reliable Communication and Visualization. The Department is ranked first in Norway with respect to the quality of its research by the Research Council of Norway. For more information visit our Web pages: http://www.uib.no/en/ii
About the project/work tasks:
• Focus is on mathematical methods of cryptography, in particular Elliptic Curve Cryptography and algebraic attacks.
• Develop new methods of algebraic cryptanalysis and apply them to modern cryptographic primitives.
• Advance theoretical understanding of the complexity of Elliptic Curve Discrete Logarithm Problem.
The fellowship position is for a fixed term of 3 years. Closing date for application: 30 June 2016
Closing date for applications: 30 June 2016
Contact: Professor Tor Helleseth, Tor.Helleseth (at) uib.no / phone (+47) 55 58 41 60,
Professor Igor Semaev, igor (at) uib.no / phone (+47) 55 58 4279
More information: https://www.jobbnorge.no/en/available-jobs/job/126236/phd-position-in-cryptography?p=1&reset=1
Léo Perrin, Aleksei Udovenko, Alex Biryukov
Carsten Baum, Ivan Damgård, Kasper Larsen, Michael Nielsen
Our new protocol yields improved proofs of plaintext knowledge for (Ring-)LWE-based cryptosystems, where such general techniques were not known before. Moreover, they can be extended to prove preimages of homomorphic hash functions as well.
Palash Sarkar, Shashank Singh
Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
We first show that an answer to this question would resolve a long standing open problem in multiparty communication complexity: finding a function that is hard to compute with low communication complexity in the simultaneous message model, but easy to compute in the fully adaptive model.
On a more positive side: we also show some implications in the other direction, i.e.: we prove that lower bounds on the communication complexity of certain multiparty problems imply existence of PBC primitives. Using this result we then show two attractive ways to "bypass" our hardness result: the first uses the random oracle model, the second weakens the locality requirement in the bounded-storage model to online computability. The random oracle construction is arguably one of the simplest proposed so far in this area. Our results indicate that constructing improved provably secure protocols for PBC requires a better understanding of multiparty communication complexity. This is yet another intriguing example where negative results in one area (in our case: lower bounds in multiparty communication complexity) can be used to construct secure cryptographic schemes.
Chen Zhan, Wang Xiaoyun
Tomer Ashur, Bart Mennink
In this work we show how a nonce-misusing adversary can forge a message for the original p-OMD using only 3 queries (including the forgery). As a second contribution, we generalize and simplify p-OMD. This is done via the introduction of the authenticated encryption scheme Spoed. The most important difference is the usage of a generalized padding function GPAD, which neatly eliminates the need for a case distinction in the design specification and therewith allows for a significantly shorter description of the scheme and a better security bound. Finally, we introduce the authenticated encryption scheme Spoednic, a variant of Spoed providing authenticity against a nonce-misusing adversary at a modest price.
Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
Tomer Ashur, Achiya Bar-On, Orr Dunkelman
In 2015, a new version of GOST was suggested by Russia's standardization body (TC 26), with the purpose of mitigating such attacks. In this paper, we show that similar weaknesses exist in the new version as well. More specifically, we present a fixed-point attack on the full cipher with time complexity of $2^{237}$ encryptions. We also present a reflection attack with time complexity of $2^{192}$ for a key that is chosen from a class of $2^{224}$ weak keys. Finally, we discuss an impossible reflection attack and several possible related-key attacks.
Alexandre Gélin, Antoine Joux
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Designing cryptographic primitives immune to kleptographic subversion is an active area which has led to remarkable new models and techniques; many of these are realizable by systems and can reduce the threat of such strong attacks. The feasibility of public-key encryption that is kleptographically secure in the CPA sense has been open till now.
30 May 2016
University College London
The position focuses on the cryptographic and privacy-related design challenges of distributed ledgers. As such, we expect successful candidates to explore research topics such as balancing the transparency of distributed ledgers with the sensitive data that may be stored on them, developing formal cryptographic models for the auditability and privacy guarantees of distributed ledgers, and methods for establishing identity and credential infrastructures using such ledgers.
We expect candidates to have a PhD in Computer Science, Economics, or a related field, and a strong track record in cryptography, systems and network security, privacy-enhancing technologies, or similar topics.
For any enquiries or to apply for the position, please submit a full curriculum vitae and a research statement to me (s.meiklejohn at ucl.ac.uk), or apply online at http://www.jobs.ac.uk/job/ANT392/research-associate-in-the-security-and-privacy-of-distributed-ledgers/. The position is available starting September 2016 (with the start date negotiable) and will last for two years, with the possibility to extend by another 6-12 months. In a somewhat less cryptographic vein, the project is also hiring two other postdocs; these vacancies can be found here (http://www.jobs.ac.uk/job/ANQ770/research-associate-in-the-foundations-of-distributed-ledgers/) and here (http://www.jobs.ac.uk/job/ANR854/research-associate-in-the-economics-and-usability-of-distributed-ledgers/).
Closing date for applications: 16 June 2016
Contact: Sarah Meiklejohn (s.meiklejohn [at] ucl [dot] ac [dot] uk)
More information: http://www.jobs.ac.uk/job/ANT392/research-associate-in-the-security-and-privacy-of-distributed-ledgers/
EPFL, Lausanne, Switzeland
Our lab is committed to laying the foundations and developing the tools for protecting privacy in tomorrow’s hyper-connected world. We are recruiting a post-doctoral researcher in the area of data privacy and security, with an emphasis on health-related data (including genomic data).
Required skills and expertise:
- Very good knowledge of written and spoken English (French is not required)
- Strong background in security, privacy, and applied cryptography (some familiarity with homomorphic encryption, secure multi-party computation, or hardware security would be welcome)
- Some background in databases, statistics, networking, electronic health records, genomics, game theory, microeconomics, or machine learning would be an asset
- Strong analytical skills
- Good knowledge of languages and tools such as C, C++, Java, Go, Python, and MATLAB
Education: a PhD degree in computer science, electrical engineering, communication systems, computer engineering, or a similar area; with a strong publication track record in information security and privacy or in cryptography.
Mission: The contribution to the research efforts of the group will involve many interactions with PhD and undergraduate students, senior researchers, and external partners (from industry, academia, and hospitals); some participation in teaching is also expected. The research activities will include notably the design and the validation of protocols and algorithms.
We offer:
- A fascinating investigation topic of global prominence in security and privacy
- A young, dynamic, and international team
- Collaboration with strategic external partners, including the Lausanne University Hospital (CHUV)
- A modern working environment
- A substantial help to obtain a faculty position (usually in another institution) at the end of the stay here.
Annual salary: 80,000 Swiss Francs (around US$80,000) and above, based on experience.
Closing date for applications: 15 June 2016
Contact: Prof. Jean-Pierre Hubaux
EPFL
More information: http://emploi.epfl.ch/page-132462-en.html
29 May 2016
Antonio Faonio, Daniele Venturi
The model of bounded tamper resistance was recently put forward by Damg{\aa}rd {\em et al.} (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro {\em et al.}, TCC 2010), while still being able to capture realistic tampering attacks.
Thomas Espitau, Antoine Joux
Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi
Jinhyuck Jeong, Taechan Kim
In this article, we show that exTNFS algorithm enjoys their best complexity as well for arbitrary composite extension degree $n$: we show that the discrete logarithm problem over $\mathbb{F}_{p^n}$ for a medium-sized prime $p$ and $n= \eta\kappa$, with $\eta$ and $\kappa >1$ not necessarily coprime, can be solved in time $L_{p^n}(1/3, (48/9)^{1/3})$ for a general prime $p$ and $L_{p^n}(1/3, (32/9)^{1/3})$ for a special prime $p$.
The result asserts that one should be careful of choosing parameters in the pairing-based construction regarding with the best-complexity of the variant by Kim-Barbulescu whenever the embedding degree is composite.