IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 July 2016
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
Paul Kirchner, Pierre-Alain Fouque
Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou
We propose the first Bitcoin-like protocol that is secure in the presence of a malicious majority of computing power. On top of Bitcoin's brilliant ideas of utilizing the power of the honest miners, via their computing power together with blocks, to secure the blockchain, we further leverage the power of the honest users, via their coins together with transactions, to achieve this goal. In particular, we propose a novel strategy for selecting the best blockchain from many competing chains by carefully comparing coins in these blockchains. In addition, we rigorously prove important security properties of our protocol in an extension of the blockchain analysis framework by Garay et al [Eurocrypt 2015].
Tim Beyne, Begül Bilgin
Peter Schwabe, Ko Stoffelen
Shi Bai, Thijs Laarhoven, Damien Stehlé
Basel Halak, Said Subhan Waizi, Asad Islam
19 July 2016
Goethe University Frankfurt
Closing date for applications: 27 July 2016
Contact: Prof. Dr. Kai Rannenberg
More information: https://m-chair.de/images/documents/career/Ausschreibung_wiss_Mat_allgemein_20160523_GER_JT.pdf
Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany
The Horst Görtz Institute for IT-Security (HGI) at Ruhr-University Bochum is one of Europe’s leading research centers in IT security. The DFG, or German Research Foundation, awarded more than €4 million to the HGI for the establishment of the interdisciplinary research training group “New Challenges for Cryptography in Ubiquitous Computing”. We are looking for a candidate with outstanding Master/Diplom in the fields of computer science, electrical engineering, mathematics or related areas.
The research training group will study problems which are fundamental for securing the Internet of Things. The research is structured in three levels: cryptographic primitives, device and system level. The research topics range from cryptographic foundations such as fully homomorphic encryption for privacy in cloud computing, over security for medical implants to internet security solutions involving new national ID cards. A central goal of the doctoral training is an interdisciplinary and structured education at the highest scientific level. Establishing networks to top internationally research groups is part of the training.
A group of internationally renowned researchers together with excellent funding provides an extremely interesting scientific environment. The HGI is known for its good working atmosphere.
- Start: earliest possible
- Competitive salary (TV-L 13)
- Application: Send your documents by August 7, 2016, to grako (at) hgi.rub.de
- Required Documents: CV, certificates, transcript (Master or Diplom), motivation for applying (1 page), names of at least two people who can provide reference letters (email addresses are sufficient)
Further information: www.ubicrypt.org
Closing date for applications: 7 August 2016
More information: http://www.ubicrypt.hgi.rub.de/index.html.en
18 July 2016
Hugo Krawczyk
Mostafa Taha, Arash Reyhani-Masoleh, Patrick Schaumont
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Dana Dachman-Soled, Angela Park, Ben San Nicolas
Jan Camenisch, Robert R. Enderlein, Ueli Maurer
The contribution of this paper is three-fold. First, we provide a formal model of erasable memory. A memory device allows a user to store, retrieve, and delete data, and it is characterised by a leakage function defining the extent to which erased data is still accessible to an adversary.
Second, we investigate how the erasability of such memories can be amplified. We provide a number of constructions of memories with strong erasability guarantees from memories with weaker guarantees. One of these constructions of perfectly erasable memories from imperfectly erasable ones can be considered as the prototypical application of Canetti et al.'s All-or-Nothing Transform (AoNT). Motivated by this construction, we propose some new and better AoNTs that are either perfectly or computationally secure. These AoNTs are of possible independent interest.
Third, we show (in the constructive cryptography framework) how the construction of erasable memory and its use in cryptographic protocols (for example to achieve adaptive security) can naturally be composed to obtain provable security of the overall protocol.
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
Nicolas T. Courtois
Sebastian R. Verschoor, Tanja Lange
Technische Universität Darmstadt, Germany
The Department of Computer Science of the Technische Universität Darmstadt invites applications for positions of
Research Assistants in Cryptography and Complexity Theory
both on doctoral and postdoctoral level, in the group of Professor Marc Fischlin. The positions are funded through various research projects, all in the area of complexity-based cryptography. These are: SecOBig for secure computation on Big Data, CROSSING about signature schemes supporting special operations, and CRISP about secure channels. More information about the projects and our research is available under www.cryptoplexity.de.
The starting date is immediate. The initial funding for the positions is for approximately two years, but the contract should be renewable, based upon availability of funding. Candidates are expected to perform scientific research in the areas of the projects, and to contribute to the teaching, research, and administrative tasks of the group.
Requirements: Master’s degree (or equivalent) in Computer Science, Mathematics, or a similar discipline; extensive knowledge in the areas of cryptography and IT security, for postdoctoral candidates proven in the form of publications in these areas; fluent English language skills; experience in IT system administration is welcome
Applications should include: a curriculum vitae, including references; copies of relevant diplomas and certificates; copies of 3 selected publications (for postdoctoral candidates) or, alternatively, a research statement.
The application data should be bundled into a single PDF file. Applications and enquires should be sent to: jobs (at) cryptoplexity.de. Applications should be received no later than September 30th, 2016, but review of applications will begin immediately on a rolling basis, and the positions may be filled earlier.
Closing date for applications: 30 September 2016
Contact: jobs (at) cryptoplexity.de
More information: http://www.cryptoplexity.de
Technische Universität Darmstadt, Germany
Closing date for applications: 31 August 2016
Contact: Informal enquiries by email may be addressed to Professor Johannes Buchmann: buchmann (at) cdc.informatik.tu-darmstadt.de
More information: https://www.tu-darmstadt.de/karriere_planen/allgemeineausschreibung/stellen_details_201153.en.jsp