IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
01 August 2017
Iraklis Leontiadis, Reza Curtmola
ePrint ReportIn addition, ReDup employs transparent deduplication, which means that users get a proof attesting the deduplication level used for their files at each replica server, and thus are able to benefit from the storage savings provided by deduplication. The proof is obtained by aggregating individual proofs from replica servers, and has a constant size regardless of the number of replica servers. Our solution scales better than state of the art and is provably secure under standard assumptions.
Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
ePrint ReportHanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
ePrint ReportYogesh Swami
ePrint ReportSince cryptographic protocols do not compose well, especially when run concurrently, SGX remote attestation is only a necessary pre-condition for securely instantiating an enclave. In practice, one needs to analyze all the different interacting enclaves as a \textit{single protocol} and make sure that no sub-computation of the protocol can be simulated outside of the enclave. In this paper we describe protocol design problems under (a) sequential-composition, (b) concurrent-composition, and (c) enclave state malleability that must be taken into account while designing new enclaves. We analyze Intel provided EPID \textsf{Provisioning} and \textsf{Quoting} enclave and report our (largely positive) findings. We also provide details about how SGX uses EPID Group Signatures and report (largely negative) results about claimed anonymity guarantees.
TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
ePrint ReportDakshita Khurana
ePrint ReportWhile three-round constructions of non-malleable commitments have been achieved, beginning with the work of Goyal, Pandey and Richelson (STOC 2016), current constructions require super-polynomial assumptions.
In this work, we settle the question of whether three-round non-malleable commitments can be based on polynomial hardness assumptions. We give constructions based on polynomial hardness of Decisional Diffie-Hellman assumption or Quadratic Residuosity or Nth Residuosity, together with ZAPs. Our protocols also satisfy concurrent non-malleability.
Yongge Wang
ePrint ReportMarc Joye
ePrint ReportThis problem was elegantly addressed by Nikolaenko et al. (S\&P 2013). They suggest an approach that combines homomorphic encryption and Yao garbled circuits. The solution presented in this report only involves homomorphic encryption. This improves the performance as Yao circuits were the main bottleneck in the previous solution.
Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
ePrint ReportIn this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing.
We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
31 July 2017
Yang Yu, Léo Ducas
ePrint ReportSubhabrata Samajder, Palash Sarkar
ePrint ReportGiulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
ePrint ReportMichael Scott
ePrint ReportDavid FONTAINE AND Olivier VIVOLO
ePrint ReportGiulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
ePrint ReportGiulia Traverso, Denise Demirel, Johannes Buchmann
ePrint Report30 July 2017
Beijing, China, 6 December - 8 December 2017
Event CalendarSubmission deadline: 1 September 2017
28 July 2017
Singapore University of Technology and Design (SUTD)
Job PostingI am looking for PhD interns on cyber-physical system security (IoT, autonomous vehicle, power grid, and water treatment etc.), especially on the topics such as 1) Lightweight and low-latency crypto algorithms for CPS devices, 2) Resilient authentication of devices and data in CPS, 3) Advanced SCADA firewall to filter more sophisticated attacking packets in CPS, 4) Big data based threat analytics for detection of both known and unknown threats, 5) Attack mitigation to increase the resilience of CPS. The attachment will be at least 3 months. Allowance will be provided for local expenses.
Interested candidates please send your CV with a research statement to Prof. Jianying Zhou.
Closing date for applications: 31 August 2017
Contact: Jianying Zhou
More information: http://jianying.space/
Real World Crypto
CHES
As of 2018, CHES has moved to an open-access journal/conference hybrid model. Following the success of similar initiatives at analogous events such as FSE, this decision was made as a means of improving review and publication quality while retaining the highly successful, community-focused event.
A complete call for papers can be found at
https://ches.iacr.org/2018/ches2018-cfp.pdf
with a comprehensive set of FAQs plus instructions for authors available via both the CHES and TCHES websites. The important dates and deadlines relating to CHES 2018 are as follows:
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 1
- Submission: 15 October 2017
- Rebuttal: 20--27 November 2017
- Notification: 15 December 2017
- Camera-ready: 14 January 2018
- Submission: 15 January 2018
- Rebuttal: 20--27 February 2018
- Notification: 15 March 2018
- Camera-ready: 14 April 2018
- Submission: 15 April 2018
- Rebuttal: 20--27 May 2018
- Notification: 15 June 2018
- Camera-ready: 14 July 2018