IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 September 2016
Léo Ducas, Wessel P.J. van Woerden
ePrint ReportFor the primal case $A_m \otimes A_n$, we provide a full characterization of the Voronoi region in terms of simple cycles in the complete directed bipartite graph $K_{m+1,n+1}$. This leads ---relying on the Bellman-Ford algorithm for negative cycle detection--- to a CVP algorithm running in *polynomial time*. Precisely, our algorithm performs $O(l\ m^2 n^2 \min\{m,n\})$ operations on reals, where $l$ is the number of bits per coordinate of the input target. For the dual case, we use a gluing-construction to solve CVP in sub-exponential time $O(n m^{n+1})$.
Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
ePrint ReportKalikinkar Mandal, Basel Alomair, Radha Poovendran
ePrint ReportSchool of Computer Science & Engineering, UNSW Australia
Job PostingThe appointment would be:
• at level D ($143k – $157k per annum) or level E ($183k per annum), plus 17% superannuation and leave loading, commensurate with academic qualifications and experience,
• full time,
• to a Convertible Tenure Track Employment Contract for an initial fixed term period, with conversion to continuing appointment based on satisfactory performance and there being sufficient productive work available.
The Faculty reserves the right to offer an appointment on a continuing basis or to directly appoint to advertised positions.
About you
We are looking for an exceptional candidate to provide academic leadership and foster excellence in research, innovative teaching and professional activities. Applicants with industry experience are especially welcome.
As the successful candidate, you will have:
• A PhD in Cyber Security or a related field
• A significant track record of high impact international research
• Demonstrated leadership in building engagement and partnerships with the profession and industry
• Record of outstanding delivery of high quality teaching and student experience
UNSW desires to be the exemplar Australian university and employer of choice for people from diverse backgrounds. UNSW aspires to ensure equality in recruitment, development, retention and promotion of staff, paying particular attention to ensuring no-one is disadvantaged on the basis of their gender, cultural background, disability or Indigenous origin.
Engineering strongly encourages female applicants and actively supports women to succeed through specific Faculty and UNSW initiatives and generous parental leave provisions and flexible work practices.
Closing date for applications: 9 October 2016
Contact: Any enquiries can be forwarded to Professor Maurice Pagnucco, Head of School:
E: morri (at) cse.unsw.edu.au
T: +61 9385 5518
More information: https://www.engineering.unsw.edu.au/about-us/careers/academic-positions
16 September 2016
Peihan Miao
ePrint ReportIn this paper we provide a cut-and-choose technique for garbled RAM. This gives the first constant round two-party secure computation protocol for RAM programs secure against malicious adversaries that makes only black-box use of the underlying cryptographic primitives. Our protocol allows for garbling multiple RAM programs being executed on a persistent database. Security of our construction is argued in the random oracle model.
Tianren Liu
ePrint ReportAlthough $\textsf{SIVP}$ is hard in its exact version, Guruswami, et al (CCC 2004) showed that $\textsf{gapSIVP}_{\sqrt{n/\log n}}$ is in $\textbf{NP} \cap \textbf{coAM}$ and thus unlikely to be $\textbf{NP}$-hard. Indeed, any language that can be reduced to $\textsf{gapSIVP}_{\tilde O(\sqrt n)}$ (under general probabilistic polynomial-time adaptive reductions) is in $\textbf{AM} \cap \textbf{coAM}$ by the results of Peikert and Vaikuntanathan (CRYPTO 2008) and Mahmoody and Xiao (CCC 2010). However, none of these results apply to reductions to search problems, still leaving open a ray of hope: can $\textbf{NP}$ be reduced to solving search SIVP with approximation factor $\tilde O(n)$?
We show that any language that can be reduced to solving search $\textsf{SIVP}$ with approximation factor $\tilde O(n)$ lies in $\textbf{AM}$ intersect $\textbf{coAM}$, eliminating the possibility of basing current constructions on NP-hardness.
15 September 2016
Masoumeh Safkhani, Nasour Bagheri
ePrint ReportPratish Datta, Ratna Dutta, Sourav Mukhopadhyay
ePrint ReportUeli Maurer, Renato Renner
ePrint ReportThe purpose of this short paper is to describe how the indifferentiability notion was a precursor to the theory of constructive cryptography and thereby to provide a simplified and generalized treatment of indifferentiability as a special type of constructive statement.
Bin Liu, Bogdan Warinschi
ePrint ReportNext, we establish two results that clarify the strength of our definition when compared with existing ones that use the game-based definitional approach. On the positive side, we demonstrate that both read and write-access guarantees in the sense of game-based security are implied by UC security of an access control system. Perhaps expected, this result serves as confirmation that the definition we propose is sound.
Our main technical result is a proof that simulation-based security requires impractical assumptions on the encryption scheme that is employed. As in other simulation-based settings, the source of inefficiency is the well known ``commitment problem'' which naturally occurs in the context of cryptographic access control to file systems.
Mathilde Igier, Serge Vaudenay
ePrint ReportArthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
ePrint ReportIn this paper, we develop a quantitative approach to objectively compare the privacy of adblockers. We propose a model based on a set of privacy metrics that captures not only the technical web architecture, but also the underlying corporate institutions of the problem across time and geography.
We investigate experimentally the effect of various combinations of ad-blocking software and browser settings on 1000 Web sites. Our results highlight a significant difference among adblockers in terms of filtering performance, in particular affected by the applied configurations. Besides the ability to judge the filtering capabilities of existing adblockers and their particular configurations, our work provides a general framework to evaluate new adblocker proposals.
Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn
ePrint ReportUlm University, Germany
Job PostingThe ideal candidate brings expertise in one or more of the topics listed below, documented by high-quality publications, a Ph.D. degree in computer science, or a closely related discipline, from an internationally-renowned university, and a strong motivation to become part of our team. Proficient knowledge of written and spoken English is required. Conversational German skills are an advantage.
Topics of interest include:
• System security of cyber-physical-systems, Internet-of-Things, and vehicular networks
• Machine learning in security & privacy
• Applied cryptography
Our group has a broad range of activities and projects in security and privacy of cyber-physical-systems. Please check our website for details and address in your application, how your research can complement our expertise. We offer a unique environment for your research with excellent facilities and highly competitive salary.
If you are interested, please send us your application including your CV with publication list, a list of up to three references, and a motivational letter that specifically addresses this job offer. If you have a public Google Scholar author profile, please also provide the URL.
Please submit your application immediately but not later than 31. October 2016. The position is available immediately. The appointment will be for an initial duration of two years with the option of being extended.
Ulm University is committed to increasing the share of women in research and teaching positions and therefore explicitly encourages female candidates to apply. Job sharing is always possible for full time positions. Physically disabled applicants receive favourable consideration when equally qualified. The appointment to this position is made by the central university administration.
Closing date for applications: 31 October 2016
Contact: Candidates are invited to submit their application via email to vs-jobs (at) uni-ulm.de. Please start your subject line with “[VS-PD]”. In case of questions on this position, feel free to contact Prof. Dr. Frank Kargl (frank.kargl (at) uni-ulm.de) and Dr. Christoph Bösch (christoph.boesch (at) uni-ulm.de).
More information: https://www.uni-ulm.de/in/vs/
University of Westminster, Faculty of Science and Technology, Computer Science Department
Job PostingThis is a full-time, permanent post and the successful candidate will join a Department with a widely recognised reputation for teaching Computer Science in the heart of London. The Department hosts several well-established undergraduate and postgraduate courses for both full-time and part-time students.
The appointee will be expected to join an energetic and innovative team of academic staff who deliver undergraduate and postgraduate teaching. In collaboration with our current team in cyber security, the applicant will contribute to teaching in our postgraduate courses and embed cyber security in all levels of our undergraduate courses. The cyber security curriculum in our programmes was recently redesigned around the CISSP themes so they are kept aligned with (ICS)2 both in current state and in the way our modules get updated. Supervision of student projects forms an important component of our staff’s professional practice.
Staff are also encouraged to develop their external research profile and the appointee to this post will be expected to contribute to one or more of the Faculty of Science and Technology’s multidisciplinary Research Groups that include the Cyber Security research group, the Centre for Parallel Computing, Distributed and Intelligent Systems, Software Systems Engineering.
Closing date for applications: 2 October 2016
Contact:
For an informal discussion on the post please contact: Dr Aleka Psarrou, Head of Department of Computer Science at psarroa (at) westminster.ac.uk or telephone 020 7911 4846.
More information: https://vacancies.westminster.ac.uk/Hrvacancies/default.aspx?id=50045128
14 September 2016
Sha Tao, Elena Dubrova
ePrint ReportGérald Gavin
ePrint ReportMuhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran
ePrint Report13 September 2016
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
ePrint ReportChun Guo, Dongdai Lin
ePrint ReportWe present a proof for the indifferentiability of 3 rounds and thus closing the aforementioned gap. This also separates EM ciphers with non-invertible key derivations from those with invertible ones in the full indifferentiability setting. Prior work only established such a separation in the weaker sequential-indifferentiability setting (DCC, 2015). Our results also imply 3-round EM indifferentiable under multiple random known-keys, partially settling a problem left by Cogliati and Seurin (FSE 2016).
The key point for our indifferentiability simulator is to pre-emptively obtain some chains of ideal-cipher-queries to simulate the structures due to the related-key boomerang property in the 3-round case. The length of such chains have to be as large as the number of queries issued by the distinguisher. Thus the situation somehow resembles the context of hash-of-hash $H^2$ considered by Dodis et al. (CRYPTO 2012). Besides, a technical novelty of our proof is the absence of the so-called distinguisher that completes all chains.