IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
22 February 2018
Benjamin Timon
ePrint ReportGhous Amjad, Seny Kamara, Tarik Moataz
ePrint ReportKrzysztof Pietrzak
ePrint ReportThe first contribution of this paper is a security proof for the PoS from [DFKP15] in the random oracle model (the original proof only applied to a restricted class of adversaries which can store a subset of the data an honest prover would store). When this PoS is instantiated with recent constructions of maximally depth robust graphs, our proof implies basically optimal security.
As a second contribution we introduce and construct proofs of catalytic space (PoCS), which are defined like classical PoS, but most of the space required by the prover can at the same time be used to store useful data. Our first construction has almost no overhead (i.e., the useful data is almost as large as the dedicated space), whereas our second construction has a slightly larger overhead, but allows for efficient updates of the data. Our constructions are extensions of the [DFKP15] PoS, and our tight proof for the PoS extends (non-trivially) to the PoCS.
As our last contribution we construct a proof of replication (PoR), coming up with such an object has recently been stated as an open problem in the Filecoin paper. Also this construction (and its proof) are extensions of the [DFKP15] PoS.
Michael Scott
ePrint Report21 February 2018
Ruhr-Universität Bochum
Job PostingThe crypto group is part of the Horst Görtz Institute for IT Security (HGI) which currently hosts 21 professors and their teams, conducting research in electrical engineering and information technology, mathematics as well as the humanities and social sciences. This interdisciplinary environment covers nearly all aspects of IT security, from basic research in cryptography to internet security, security for the Internet of Things, usability and data protection. With some 200 scientists, the HGI is one of the largest and most highly respected university institutes for IT security in Europe.
A PhD student in Germany is employed, pays no fees related to the PhD position, and has a decent monthly salary based on the German TVL-E13 scale (100%).
Applicants should hold a Master in IT-security, mathematics, computer science or related disciplines, with excellent marks. There should be good knowledge in theoretical cryptography.
Application material: CV, Masters diploma and transcripts with grades, letter of motivation, 2 names for letters of reference.
Closing date for applications: 4 March 2018
Contact: Eike Kiltz
More information: https://www.stellenwerk-bochum.de/jobboerse/wissenschaftl-mitarbeiterin-wiss-mitarbeiterin-3983-stdwoche-3-jahre-bo-2018
IoTeX
Job PostingIoTeX is a young blockchain startup located at Silicon Valley, USA. IoTeX is building the next generation blockchain platform for IoT (Internet-of-Things) with focus on scalability, privacy and enabling of autonomous device coordination. IoTeX, while still in stealth mode, is a well-funded company in blockchain sector and has partnered with leading players in IoT space.
We are looking for a talent cryptography and distributed systems engineer to work on various aspects of the core IoTeX blockchain technologies, with emphasis on the design, analysis and implementation of innovative and efficient cryptographic algorithms and protocols that improve on the scalability, security and privacy of existing blockchain methodologies and pave the way for securing a wide range of Internet of Things (IoT) applications with IoTex blockchains.
Requirements
- Eligible to work in the US
- Master’s or PhD in cryptography, mathematics, computer science, or related fields
- Solid background in cryptographic algorithms and protocols such as elliptic curve cryptography, digital signature, commitment scheme, zero-knowledge proof, secure multiparty computation, etc.
- Experience designing novel cryptographic primitives and protocols
- Experience drafting and validating security specification and proofs
- Experience implementing cryptographic primitives and protocols in various platforms using C/C++, Golang or Python
Bonus
- Cryptocurrency and blockchain technology
- Smart contracts
- Security and privacy for distributed systems
- Experience designing novel cryptographic primitives and protocols
- Security and privacy for various IoT systems (e.g., wireless sensor networks, RFID systems, smart grid, vehicular ad-hoc networks, etc.)
Review of applications will start immediately and will continue until positions are filled.
Closing date for applications: 31 May 2018
Contact: To apply, please send your CV and in English to hello (at) iotex.io
More information: https://www.iotex.io/article/careers
DarkMatter - Abu Dhabi
Job PostingAs SVP Cryptographic Algorithms and Systems, you will:
Manage research and development of crypto-dependent systems for authentication and authorization platforms that leverage blockchain technology designed for constrained devices and critical infrastructure
Anticipate threats and client needs to design and combine algorithms that solve emerging cyber security problems and defend against attack vectors of the future
Lead, develop and inspire a dedicated team of research scientists and engineers to consistently produce high-quality results
Work with potential clients to gather requirements towards commercialization and productizing of our research output
You will lead clients to the cryptographic solutions they’ll need in the future while leading your team in developing libraries and services for their existing algorithms. Our commitment to end-to-end solutions gives you the freedom to make your dreams come to life. Create your own algorithms for enhanced security in each area of our business. Our Test & Validation Labs and Innovation Center are being built to provide both depth of knowledge and a collaborative approach to research and development.
To guard against the threats of the future, you’ll need:
20+ years of technical and leadership experience, including extensive industry experience managing teams of cybersecurity researchers and engineers
Eagerness to oversee the development of cryptographic algorithms, protocols and systems for enterprise-grade cyber security products in mobile, cloud and web
Bachelor’s degree in Engineering, Computer Science, Mathematics or Physics, with a Masters or Ph.D. preferred
Closing date for applications: 18 November 2018
Contact: Sheila Morjaria
More information: https://grnh.se/2wr6cqjn1
Technical University of Denmark (DTU), Denmark
Job PostingYou can apply for fully funded or partially funded scholarships from DTU Compute. For partially funded DTU Compute scholarships, documentation for the remaining funding must be provided with the application. The purpose of the co-funded scholarships is to increase the total volume of scholarships and to promote innovation in collaboration with external parties.
Our department is an internationally unique academic environment spanning the science disciplines mathematics, statistics and computer science. At the same time, we are an engineering department developing informatics and communication technologies in their broadest sense.
DTU Compute strives to achieve research excellence in its basic science disciplines, to achieve technological leadership in research and innovation, and to address societal challenges in collaboration with partners at DTU and other academic institutions, nationally and internationally, and, equally important, with industries and organizations.
We play a central role in education at all levels of the engineering programs at DTU - both in terms of our scientific disciplines and our didactic innovation.
Projects
Cyber Security - Cyber security examines the methods, techniques and tools for securing computer systems that are accessible through a network, typically the Internet, which is often known as cyberspace.
Qualifications
The ideal PhD student is curious, creative, independent and yet able to collaborate as a team player in a research group. Candidates must hold a M.Sc. degree in engineering or an equivalent degree. Furthermore, good command of the English language is essential.
Closing date for applications: 13 April 2018
Contact: Dr. Christian D. Jensen (cdje (at) dtu.dk), or Dr. Weizhi Meng (weme (at) dtu.dk)
More information: http://www.dtu.dk/job/job?id=9bbc3ae7-6dec-45ed-8e5c-bffbda1099d6
20 February 2018
Tokyo, Japan, 25 September - 27 September 2018
Event CalendarSubmission deadline: 1 April 2018
Notification: 25 May 2018
Toronto, Canada, 15 October - 19 October 2018
Event CalendarSubmission deadline: 8 May 2018
Notification: 23 July 2018
19 February 2018
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
ePrint ReportMichael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
ePrint ReportThis primitive offers a unified approach to the modular construction of signature schemes with privacy-preserving components. Namely, we show how to build the first ring signature scheme in the plain model without trusted setup, where signature size depends only sub-linearly on the number of ring members. Moreover, we show how to combine our primitive with structure-preserving signatures on equivalence classes (SPSEQ) to construct static group signatures and self-blindable certificates. When properly instantiated, the result is a group signature scheme that has a shorter signature size than the current state-of-the-art scheme by Libert, Peters, and Yung from Crypto'15.
In its own right, our primitive has stand-alone applications in the cryptocurrency domain. In particular it enables the straightforward implementation of so-called stealth addresses.
Sikhar Patranabis, Debdeep Mukhopadhyay
ePrint ReportPascal Sasdrich, René Bock, Amir Moradi
ePrint ReportStephen D. Miller, Noah Stephens-Davidowitz
ePrint ReportSean Bowe, Ariel Gabizon
ePrint ReportDaniel R. L. Brown
ePrint ReportLet $\sigma:s\mapsto sG$ and $\rho:R\mapsto -rR$ where $r$ is an integer representation of the point $R$. The free sum of $\rho$ and $\sigma$ is $\nu: (R,s) \mapsto \rho(R)+\sigma(s)$. A RKHD signature $(R,s)$ verifies if and only if $\nu(R,s) = hQ$, where $h$ is the hash of the message and $Q$ is the public key. So RKHD security relies upon, among other things, the assumption that free sum $\nu$ is 1-way (or unforgoable, to be precise).
Other free sums are 1-way under plausible assumptions: elliptic curve discrete logs, integer factoring, and secure small-key Wegman--Carter--Shoup authentication. Yet other free sums of 1-way functions (integer-factoring based) fail to be 1-way. The ease with which these free sums arise hints at the ease determining RKHD security.
RKHD signatures are very similar to ECGDSA (an elliptic curve version Agnew--Mullin--Vanstone signatures): variable-$G$ forgers of the two schemes are algorithmically equivalent. But ECGDSA requires the signer to do one modular inversion, a small implementation security risk.
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
ePrint ReportYongjun Zhao, Sherman S. M. Chow
ePrint ReportMoreover, we consider an ``outsourced'' setting with a service provider coordinating the PSI execution, instead of having two strangers to be online simultaneously for executing a highly-interactive PSI directly with each other. Outsourcing our two protocols are arguably optimal, namely, the two users perform $O(|C|)$ and $O(1)$ decryptions, for unlocking the private set $C$ and the outcome whether a match has been found.
Technical University of Denmark (DTU), Denmark
Job Posting
The programme is named after Hans Christian Ørsted, discoverer of electro-magnetism and founder of the University and achieves the goals of Marie Sklodowska-Curie COFUND by increasing the European-wide mobility possibilities for training and career development of experienced researchers. The Programme will contribute to the researcher’s career development, broadening and deepening individual competencies through exposure to an international and multidisciplinary environment. The Programme is based on incoming mobility and will enable experienced researchers from all over the world to carry out curiosity-driven, bottom-up research projects within all branches of engineering science at DTU.
To enable the unique identification of each application, applicants must assign their application with an acronym.
DTU fully acknowledges the importance of equal opportunities and welcomes applications from all interested candidates irrespective of age, gender, disability, religion or ethnicity.
To further promote equal opportunities, DTU will implement gender blinded reviews. Applicants should refrain from using their names and gender specific pronouns in the research plan (he/she, his/hers etc.). Names and nationality listed in the templates for the research plan and CV will be hidden by the secretariat prior to the external peer review.
Closing date for applications: 23 February 2018
Contact: Dr. Christian D. Jensen (cdje (at) dtu.dk), or Dr. Weizhi Meng
More information: http://www.dtu.dk/english/Research/Research-at-DTU/Postdoc-programmes/H-C-Oersted-COFUND-Postdoc