IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
07 June 2016
International Max Planck Research School for Computer Science, Saarbrücken
Job PostingThe International Max Planck Research School for Computer Science (IMPRS-CS) is a graduate program jointly run by the Max Planck Institute for Informatics, the Max Planck Institute for Software Systems and Saarland University.
The IMPRS-CS offers a PhD program upon successful completion of which students receive a Doctoral Degree in Computer Science from Saarland University. The program is open to students who hold or are about to receive a research-oriented Master\'s degree in Computer Science (or an equivalent degree). Successful candidates will typically have ranked at or near the top of their classes, have already engaged in research and published their results, and be highly proficient in written and spoken English.
Admitted students receive a support contract that covers all living expenses and tuition fees. They enjoy a research-oriented education with close supervision by world-renowned scientists in a competitive, yet collaborative, environment rich in interaction with other students, post-docs, and scientists.
Applications are accepted all year round; the current round closes on July 31st, 2016.
Further information, including instructions on how to apply, can be found here: http://www.imprs-cs.de
Closing date for applications: 31 July 2016
Contact: Jennifer Gerling, IMPRS-CS Coordinator
E-Mail: imprs (at) mpi-inf.mpg.de
Phone: +49 681 9325 1800
06 June 2016
Cyber Security Practice - United Arab Emirates
Job PostingThey are currently seeking experienced Crypto Experts with the following knowledge to join their team:
- Proficient in AES algorithm design.
- Expert in block and stream cipher, key management, hybrid approach, hashing.
- Knowledge in substitution, permutation, confusion & diffusion mechanism.
- Cryptanalysis: Differential, Linear, Side channel attack, Plain & Cipher text etc,.
- Knowledge in crypto events, such as, Caesar competition.
- History of different symmetric key algorithms.
- Mathematics degree is preferred.
- Should be ready to start design algorithm as soon as join.
On offer is an attractive TAX FREE expatriate package, the opportunity to learn from some of the most highly qualified in the business and genuine career opportunities.
Contact: Hilary (at) talentboutique.ae
Closing date for applications: 19 August 2016
Yang Xie; Ankur Srivastava
ePrint ReportJacob Alperin-Sheriff, Daniel Apon
ePrint ReportIn this work we show two (incomparable) dimension-preserving reductions from LWE to LWR in the case of a \emph{polynomial-size modulus}. Prior works either required a superpolynomial modulus $q$, or lost at least a factor $\log(q)$ in the dimension of the reduction. A direct consequence of our improved reductions is an improvement in parameters (i.e. security and efficiency) for each of the known applications of poly-modulus LWR.
Our results directly generalize to the ring setting. Indeed, our formal analysis is performed over ``module lattices,'' as defined by Langlois and Stehl\'{e} (DCC 2015), which generalize both the general lattice setting of LWE and the ideal lattice setting of RLWE as the single notion M-LWE. We hope that taking this broader perspective will lead to further insights of independent interest.
Eric Miles, Amit Sahai, Mark Zhandry
ePrint ReportHowever, this model is inadequate: there have been several attacks on multilinear maps that exploit extra information revealed by the zero-test procedure. In particular, the authors [Crypto16] recently gave a polynomial-time attack on several iO candidates when instantiated with the multilinear maps of Garg, Gentry, and Halevi [Eurocrypt13], and also proposed a new "weak multilinear map model" that captures all known polynomial-time attacks on GGH13.
Subsequent to those attacks, Garg, Mukherjee, and Srinivasan [ePrint16] gave a beautiful new candidate iO construction, using a new variant of the GGH13 multilinear map candidate, and proved its security in the weak multilinear map model assuming an explicit PRF in NC^1.
In this work, we give a simpler candidate iO construction, which can be seen as a small modification or generalization of the original iO candidate of Garg, Gentry, Halevi, Raykova, Sahai, and Waters [FOCS13], and we prove its security in the weak multilinear map model. Our work has a number of benefits over that of GMS16.
Our construction and analysis are simpler. In particular, the proof of our security theorem is 4 pages, versus 15 pages in GMS16.
We do not require any change to the original GGH13 multilinear map candidate.
We prove the security of our candidate under a more general assumption. One way that our assumption can be true is if there exists a PRF in NC^1.
GMS16 required an explicit PRF in NC^1 to be "hard-wired" into their obfuscation candidate. In contrast, our scheme does not require any such hard-wiring. In fact, roughly speaking, our obfuscation candidate will depend only on the minimal size of such a PRF, and not on any other details of the PRF.
Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov
ePrint ReportThomas Shrimpton; Martijn Stam; Bogdan Warinschi
ePrint ReportIn this paper we propose cryptographic models for the security of such APIs. The key feature of our approach is that it enables modular analysis. Specifically, we show that a secure cryptographic API can be obtained by combining a secure API for key-management together with secure implementations of, for instance, encryption or message authentication. Our models are the first to provide such compositional guarantees while considering realistic adversaries that can adaptively corrupt keys stored on tokens. We also provide a proof of concept instantiation (from a deterministic authenticated-encryption scheme) of the key-management portion of cryptographic API.
Elette Boyle; Niv Gilboa; Yuval Ishai
ePrint Report- A secure 2-party computation protocol for evaluating any branching program of size $S$, where the communication complexity is linear in the input size and only the running time grows with $S$.
- A secure 2-party computation protocol for evaluating any layered boolean circuit of size $S$ and $m$ outputs with communication complexity $O(S/\log S)+m\cdot\poly(\lambda)$.
-A 2-party {\em function secret sharing} scheme, as defined by Boyle et al. (Eurocrypt 2015), for general branching programs (with inverse polynomial error probability).
- A 1-round 2-server {\em private information retrieval} scheme supporting general searches expressed by branching programs.
Ranjit Kumaresan; Srinivasan Raghuraman; Adam Sealfon
ePrint ReportMelissa Chase; Chaya Ganesh; Payman Mohassel
ePrint ReportWe design new constructions obtaining the best of both worlds: combining the efficiency of the garbled circuit approach for non-algebraic statements and that of sigma protocols for algebraic ones. We then discuss how to use these as building-blocks to construct privacy-preserving credential systems based on standard RSA and (EC)DSA signatures.
Other applications of our techniques include anonymous credentials with more complex policies, the ability to efficiently switch between commitments (and signatures) in different groups, and secure two-party computation on committed/signed inputs.
Tanujay Saha
ePrint ReportJan Camenisch; Maria Dubovitskaya; Alfredo Rial
ePrint ReportWe address this gap by presenting a UC functionality for non-interactive commitments that enables modular constructions of complex protocols within the UC framework. We also show how the new functionality can be used to construct hybrid protocols that combine different UC functionalities and use commitments to ensure that the same inputs are provided to different functionalities.
We further provide UC functionalities for attribute tokens and revocation that can be used as building blocks together with our UC commitments. As an example of building a complex system from these new UC building blocks, we provide a construction (a hybrid protocol) of anonymous attribute tokens with revocation. Unlike existing accumulator-based schemes, our scheme allows one to accumulate several revocation lists into a single commitment value and to hide the revocation status of a user from other users and verifiers.
Akshay Degwekar; Vinod Vaikuntanathan; Prashant Nalini Vasudevan
ePrint Report\medskip \item AC$^0$-cryptography: We construct (unconditionally secure) pseudo-random generators with arbitrary polynomial stretch, weak pseudo-random functions, secret-key encryption and perhaps most interestingly, {\em collision-resistant hash functions}, computable in $\ACZ$ and secure against all $\ACZ$ circuits. Previously, one-way permutations and pseudo-random generators (with linear stretch) computable in $\ACZ$ and secure against $\ACZ$ circuits were known from the works of H\aa stad and Braverman. \end{enumerate}
Patrick Derbez; Pierre-Alain Fouque
ePrint ReportIn this paper we describe a generic algorithm exhausting the best meet-in-the-middle and impossible differential attacks on a very large class of block ciphers from byte to bit-oriented, SPN, Feistel and Lai-Massey block ciphers. Contrary to previous tools that target to find the best differential / linear paths in the cipher and leave the cryptanalysts to find the attack using these paths, we automatically find the best attacks by considering the cipher and the key schedule algorithms. The building blocks of our algorithm led to two algorithms designed to find the best simple meet-in-the-middle attacks and the best impossible truncated differential attacks respectively. We recover and improve many attacks on AES, mCRYPTON, SIMON, IDEA, KTANTAN, PRINCE and ZORRO. We show that this tool can be used by designers to improve their analysis.
05 June 2016
Barcelona, Barcelona, 14 November - 18 November 2016
SchoolSubmission deadline: 15 July 2016
04 June 2016
Florida Atlantic University
Job PostingResearch areas of particular interest for this position include, but are not limited to, mathematical foundations of public key cryptography, post-quantum cryptography, computational algebra, and algorithmic number theory.
Applicants must possess a Ph.D. in Mathematics or a closely related field. Candidates in all areas of cryptology and information security will be considered.
For additional information, please contact us by email to mathsearch (at) fau.edu. This position is open until filled and may close without prior notice. Priority consideration will be given to applications received by August 13, 2016. To be considered for the position, all applicants must apply and complete the Faculty, Administrative, Managerial & Professional Position Application form available online through the Office of Human Resources at: https://jobs.fau.edu. Please submit a cover letter, vita, copy of your transcript, research statement and a teaching statement through this website.
In addition, please arrange to have three letters of recommendation sent by first class mail to: Chair of the Search Committee, Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Rd., Boca Raton, FL 33431 or by email to mathsearch (at) fau.edu.
A background check will be required for the candidate selected for this position.
Florida Atlantic University is an Equal Opportunity/Affirmative Action Institution. Individuals with disabilities, requiring accommodation, please call 561-297-3057, 711.
Closing date for applications: 13 August 2016
Contact: Search Committee Chair, Department of Mathematical Sciences, 777 Glades RD, Boca Raton, FL 33431
Email: mathsearch (at) fau.edu
Phone: (561) 297-3340
Fax: (561) 297-2436
More information: https://jobs.fau.edu
Institute for Infocomm Research, Singapore
Job PostingInterested candidates please send CV to Jianying Zhou. Fresh PhD is welcome to apply. Review of applications will begin immediately and will continue until the positions are filled. Only short-listed candidates will be contacted for interview.
Closing date for applications: 31 July 2016
Contact: Dr. Jianying Zhou, Dept Head, Infocomm Security, Institute for Infocomm Research. Email: jyzhou@i2r.a-star.edu.sg
More information: http://icsd.i2r.a-star.edu.sg/
03 June 2016
Philadelphia, USA, 19 October 2016
Event CalendarSubmission deadline: 3 July 2016
Notification: 3 August 2016
Fukuoka, Japan, 5 September - 7 September 2016
Event CalendarGran Sasso Science Institute
Job PostingFor more info, see http://www.gssi.infn.it/phd/
Closing date for applications: 1 September 2016
Contact: Giuseppe Persiano (giuper (at) gmail.com) or any member of the Institute