IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
04 March 2017
Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, QiangTang, Bing Wang
ePrint ReportNijmegen, The Netherlands, 13 November - 15 November 2017
Event CalendarReggio Calabria, Italy, 29 August - 1 September 2017
Event CalendarSubmission deadline: 24 April 2017
Notification: 24 May 2017
02 March 2017
Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
ePrint ReportAn interesting consequence of our work is that, with current techniques, constant round MPC for binary circuits is not much more expensive than practical, non-constant round protocols. We estimate that the concrete communication cost of our preprocessing protocol improves upon previous works by up to three orders of magnitude, and with low computational complexity. We also improve asymptotically by reducing the overall communication complexity from $O(n^3)$ to $O(n^2)$, and our construction is even highly competitive in the two-party setting.
Ghazal Kachigar, Jean-Pierre Tillich
ePrint ReportCraig Costello, Benjamin Smith
ePrint Report01 March 2017
University of Campinas. Brazil
Job PostingPost-doc position in Secure Execution of Cryptographic Algorithms
We have an open position, starting immediately, for a one-year post-doctoral fellowship at the University of Campinas’ Institute of Computing, Brazil, to work in research and development of efficient and secure implementation of cryptographic algorithms. The candidate will be part of a collaborative effort, working on a project funded by Intel and FAPESP, the State of São Paulo research agency.
The aim of the project encompasses both curve-based and post-quantum crypto algorithms, and is not restricted to software. In fact, we use the whole gamut of possibilities to address the problem of efficient and side-channel-immune code, including the co-design (software and hardware) of solutions.
Candidates should have a good background in implementation of cryptographic algorithms and, desirably, experience in system security. A collaborative attitude and leadership are also an asset.
The fellowship amounts to around US$ 27,000 plus limited travel funds for conferences. Basic free health care is provided by UNICAMP and the Brazilian Public Health System.
The University of Campinas, UNICAMP, is located in Campinas, the center of a vibrant region, with a population of about three-million, distant 100 km from São Paulo and 500 km from Rio de Janeiro, served by an international airport and excellent highways. For a very good introduction to Campinas in English, please watch this short video: https://www.youtube.com/watch?v=MnF3IW1Rekc. Different rankings put UNICAMP in the top-three positions in Brazil and Latin America. Some of its graduate programs lead their areas in Latin America and are prominent worldwide. Please access this page for a brief summary and intro video about UNICAMP: http://www.unicamp.br/unicamp/english.
Interested candidates should email their CV to
Ricardo Dahab - rdahab (at) ic.unicamp.br
Deadline for applications: March 20, 2017
Closing date for applications: 20 March 2017
Contact: Ricardo Dahab
Associate Professor
IC-UNICAMP
rdahab (at) ic.unicamp.br
Royal Holloway, University of London, UK
Job PostingOne position is a 4 year-post and is teaching-focussed, with 10% time available for research. The other is a permanent position with a regular balance between teaching and research. This position is roughly equivalent to a tenure-track Assistant Professor in North America or a Junior Professor in Europe.
For the teaching-focussed position, the post holder will contribute to the creation and/or revision, delivery and assessment of postgraduate (MSc) and undergraduate teaching modules across a wide range of topics in the field of information/cyber security. Applicants should have a Ph.D. in a relevant subject or equivalent and have a sound knowledge of information/cyber security. Applicants should be able to demonstrate an enthusiasm for teaching and communicating with diverse audiences, as well as show an awareness of contemporary issues relating to cyber security.
For the permanent position, applications are invited from researchers whose interests are related to, or complement, current strengths of the ISG. We are particularly interested in applicants with outstanding research achievements and/or potential in relevant information/cyber security areas. Applicants should have a Ph.D. in a relevant subject or equivalent, be a self-motivated researcher, and have a strong publication record. Applicants should be able to demonstrate an enthusiasm for teaching and communicating with diverse audiences, as well as show an awareness of contemporary issues relating to cyber security.
We particularly welcome female applicants as they are under-represented at this level in the Department.
4 year teaching-position: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0217-089
Permanent regular position: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0217-090
Closing date for applications: 9 April 2017
Contact: Professor Keith Mayes
keith.mayes (at) rhul.ac.uk.
More information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0217-090
Radboud University Nijmegen
Job PostingClosing date for applications: 2 April 2017
Contact: Jaap-Henk Hoepman (associate professor), jhh (at) cs.ru.nl
More information: http://www.ru.nl/werken/details/details_vacature_0/?recid=596939
28 February 2017
James Alderman, Keith M. Martin, Sarah Louise Renwick
ePrint ReportCharles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
ePrint ReportWe ask if it is also possible for noisy sources to directly replace private keys in asymmetric cryptosystems. We propose a new primitive called public-key cryptosystems with noisy keys. Such a cryptosystem functions when the private key varies according to some metric. An intuitive solution is to combine a fuzzy extractor with a public key cryptosystem. Unfortunately, fuzzy extractors need static helper information to account for noise. This helper information creates fundamental limitations on the resulting cryptosytems.
To overcome these limitations, we directly construct public-key encryption and digital signature algorithms with noisy keys. The core of our constructions is a computational version of the fuzzy vault (Juels and Sudan, Designs, Codes, and Cryptography 2006). Security of our schemes is based on graded encoding schemes (Garg et al., Eurocrypt 2013, Garg et al., TCC 2016). Importantly, our public-key encryption algorithm is based on a weaker model of grading encoding. If functional encryption or indistinguishable obfuscation exist in this weaker model, they also exist in the standard model.
In addition, we use the computational fuzzy vault to construct the first reusable fuzzy extractor (Boyen, CCS 2004) supporting a linear fraction of errors.
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
Qipeng Liu, Mark Zhandry
ePrint ReportSylvain Ruhault
ePrint ReportGizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
ePrint ReportYongge Wang
ePrint ReportAnindya Shankar Bhandari, Dipanwita Roy Chowdhury
ePrint ReportTomer Ashur, Daniël Bodden, Orr Dunkelman
ePrint ReportMarshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
ePrint ReportThe PoWs that we propose are based on delegating the evaluation of low-degree polynomials originating from the study of average-case fine-grained complexity. We prove that, beyond being hard on the average (based on worst-case hardness assumptions), the task of evaluating our polynomials cannot be amortized across multiple~instances.
For applications such as Bitcoin, which use PoWs on a massive scale, energy is typically wasted in huge proportions. We give a framework that can utilize such otherwise wasteful work.
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
ePrint ReportWe prove our hardness results in each case by showing fine-grained reductions from solving one of three problems -- namely, Orthogonal Vectors (OV), 3SUM, and All-Pairs Shortest Paths (APSP) -- in the worst case to computing our function correctly on a uniformly random input. The conjectured hardness of OV and 3SUM then gives us functions that require $n^{2-o(1)}$ time to compute on average, and that of APSP gives us a function that requires $n^{3-o(1)}$ time. Using the same techniques we also obtain a conditional average-case time hierarchy of functions.
Based on the average-case hardness and structural properties of our functions, we outline the construction of a Proof of Work scheme and discuss possible approaches to constructing fine-grained One-Way Functions. We also show how our reductions make conjectures regarding the worst-case hardness of the problems we reduce from (and consequently the Strong Exponential Time Hypothesis) heuristically falsifiable in a sense similar to that of (Naor, CRYPTO '03).