IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 September 2018
Tampere University of Technology, Tampere, Finland
The Information Security Group is currently looking for up to 3 motivated and talented researchers (Postdoctoral Researchers and/or Doctoral Students) to contribute to research projects related to applied cryptography, security and privacy. The successful candidates will be working on the following topics (but not limited to):
- Analysis and design of Searchable Encryption schemes and data structures enabling efficient search operations on encrypted data;
- Restricting the type of access given when granting access to search over one\'s data;
- Processing of encrypted data in outsourced and untrusted environments;
- Applying encrypted search techniques to SGX environments;
- Revocable Attribute-Based Encryption schemes and their application to cloud services;
- Privacy-Preserving Analytics;
- IoT Security.
The positions are strongly research focused. Activities include conducting both theoretical and applied research, design of secure and/or privacy-preserving protocols, software development and validation, reading and writing scientific articles, presentation of the research results at seminars and conferences in Finland and abroad, acquiring (or assisting in acquiring) further funding.
Closing date for applications: 11 October 2018
Contact: For more information please contact: Antonis Michalas antonios.michalas (at) tut.fi
More information: https://tut.rekrytointi.com/paikat/?o=A_A&jid=42
12 September 2018
Christchurch, New Zealand, 3 July - 5 July 2019
Submission deadline: 15 February 2019
Notification: 1 April 2019
Marseille, France, 10 June - 14 June 2019
San Francisco, USA, 20 May - 22 May 2019
Submission deadline: 1 December 2018
11 September 2018
Early registration deadline is Oct 31
The deadline for early registration is October 31, 2018.
Asiacrypt 2018 will be held in Brisbane, Australia, December 2-6. Looking forward to see you at the conference!
University of Warsaw
Successful candidates can work on several projects related to cryptography, in particular on smart contracts, blockchain, leakage-resilient and tamper-resilient algorithms, and on countermeasures against hardware Trojans.
The salary will depend on qualifications and will be in the range of approximately PLN 7000 - 8,500 (net/month).
Successful candidates can start from October 2018 or later.
Closing date for applications: 1 February 2019
Contact: Stefan Dziembowski
More information: http://www.crypto.edu.pl/positions
Algorand
Algorand is the next generation blockchain platform and digital currency. Possessing a thorough and thoughtfully constructed decentralized economy where all transactions are safe, fast and uncensored while scalable to billions of users, Algorand will help unleash the economic potential of people across the globe as we democratize access to financial instruments.
The Team
The Algorand team combines technological luminaries and proven business leaders. Algorand is founded by Silvio Micali, MIT Ford Professor of Engineering and recipient of the Turing Award in Computer Science.
Our office is located in the heart of downtown Boston. All positions are in this location, though remote work is possible for exceptional candidates.
The Role
This is a senior level role where you will have the opportunity to influence the design and implementation of Algorand’s core cryptographic protocols and schemes.
You’ll be working closely with senior cryptographers at the company to research and prototype new cryptographic schemes and protocols. This involves contribution to cutting-edge research, and industry standards.
Cryptography research engineers are expected to have deep domain knowledge or cryptography, math, algorithms, and be comfortable studying research papers and prototyping.
Responsibilities
You will join a small, extremely capable, and enthusiastic Boston-based team. Your ideas and your innovation will help shape the new blockchain and cryptocurrency ecosystem of tomorrow. The current suite of projects are implemented in primarily Go and C++.
The core product will be open sourced.
Closing date for applications: 1 July 2019
Contact: Sergey Gorbunov, sergey (at) algorand.com
More information: https://www.algorand.com/careers/
09 September 2018
San Juan, Puerto Rico, 3 December - 4 December 2018
Submission deadline: 1 October 2018
07 September 2018
San Fransco, USA, 8 April - 12 April 2019
Submission deadline: 16 November 2018
Notification: 17 December 2018
06 September 2018
Huseyin Hisil, Joost Renes
Keita Xagawa, Takashi Yamakawa
Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
Kai Bemmann, Johannes Bl\"{o}mer, Jan Bobolz, Henrik Br\"{o}cher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilli
Using $\mathsf{CLARC}$, users can receive attribute-based credentials from issuers. They can efficiently prove that their credentials satisfy complex (access) policies in a privacy-preserving way. This implements anonymous access control with complex policies.
Furthermore, $\mathsf{CLARC}$ is the first ACS that is combined with an anonymous reputation system where users can anonymously rate services. A user who gets access to a service via a credential, also anonymously receives a review token to rate the service. If a user creates more than a single rating, this can be detected by anyone, preventing users from spamming ratings to sway public opinion.
To evaluate feasibility of our construction, we present an open-source prototype implementation.
Dennis Hofheinz, Dingding Jia, Jiaxin Pan
Jie Chen, Junqing Gong, Hoeteck Wee
- Our first IPE scheme is based on the standard $k$-Lin assumption and has shorter master public key and shorter secret keys than Okamoto and Takashima's IPE under weaker DLIN=$2$-lin assumption.
- Our second IPE scheme is adapted from the first one; the security is based on the XDLIN assumption (as Okamoto and Takashima's IPE) but now it also enjoys shorter ciphertexts.
Technically, instead of starting from composite-order IPE and applying existing transformation, we start from an IPE scheme in a very restricted setting but already in the prime-order group, and then gradually upgrade it to our full-fledged IPE scheme. This method allows us to integrate Chen et al.'s framework [Eurocrypt '15] with recent new techniques [TCC '17, Eurocrypt '18] in an optimized way.
Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
Keita Xagawa
Roy, Morozov, Fukushima, Kiyomoto, and Takagi recently gave a patch and call the patched scheme as RaCoSS-R (ISEC Conf. on 25 Jul. 2018).
This short note describes how to break RaCoSS-R by modifying the forgery attack against RaCoSS.
Andreas Wiemers
Wutichai Chongchitmate, Rafail Ostrovsky
In this work, we construct a new broadcast extension protocol for $t<n$ with information-theoretic security. Our protocol improves the round complexity to $\mathcal{O}(n^3)$ while maintaining the optimal communication complexity for long messages. Our result shortens the gap between the information-theoretic setting and the computational setting, and between the optimal communication protocol and the optimal round protocol in the information-theoretic setting for $t<n$.