IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 September 2018
Charles University in Prague
Potential research topics may include (but are not limited to):
- cryptographic hardness of total search problems,
- verifiable delegation of computation,
- applications of game theory in cryptography.
The position is funded by the Primus Research Programme of Charles University. The funding is available for one year with a flexible starting date from October 2018, a competitive salary and a possibility of extension. The applicants should hold a PhD degree (or be near its completion) in computer science, mathematics or a related field.
Applications should include a CV and a research statement and may be sent directly to Pavel Hubacek (informal inquiries are welcome).
The applications will be considered until the position is filled.
Closing date for applications: 30 November 2018
Contact: Pavel Hubacek, hubacek (at) iuuk.mff.cuni.cz
Friedrich-Alexander-University Erlangen-Nuremberg
The city of Nuremberg is very international with over 20% of foreigners and the teaching language for our MSc courses is English. Therefore, there is no need to speak/learn German.
The position is initially offered for one year, with the option of an extension to two or more years (up to six years). The starting date is December 1st or later. There is no closing date for applications, the position remains open until filled.
To apply for this position, please send a single pdf document with the following content:
- Cover letter
- research and teaching statement
- CV and a list of publications
- Optional: one or two letter(s) of recommendation
- Optional: further supporting material
Incomplete applications or obvious mass applications that do not specifically address the offered position can not be considered.
Please submit applications by e-mail to Dominique Schröder and using the tag [POSTDOC] in the subject.
Closing date for applications: 1 November 2018
Contact: Dominique Schröder
dominique.schroeder (at) fau.de
More information: http://chaac.tf.fau.de
17 September 2018
New York University (NYU) Abu Dhabi
Closing date for applications: 15 October 2018
Contact: Christina Pöpper
More information: https://apply.interfolio.com/52873
ING Netherlands
At ING, increasing the pace of innovation is a strategic priority of the Think Forward strategy. We need to get faster and better at innovating so we can stay abreast of the pace of change around us. Blockchain technology is one of the innovation enablers at ING and the Blockchain program encompasses all of our efforts to explore and unlock its business value. As such, the Blockchain program at ING is directly responsible for all DLT related initiatives at ING globally.
The Blockchain program is also responsible for identifying and piloting the most promising use cases. To do so, we constantly scope the environment for relevant opportunities, actively engage with and educate the organization about the technology’s potential as well as researching trends within the industry. This allows us to have a comprehensive approach in our delivery of business value.
We are looking for a cryptographer to strengthen the team. Your main tasks that you will be performing are:
Research:
- Follow the developments in cryptography, with a focus on subjects important to DLT, such as zero-knowledge protocols, secret sharing, ring signatures, homomorphic encryption, etc.
- Implement interesting protocols in a proof-of-concept fashion
- Present interesting advances/protocols to the DLT team
Experimenting:
Participate in projects that experiment with DLT solutions, with a focus on cryptography, security and privacy components
- Advise on the cryptographic solutions to be used and how these should be used
Analysis:
- Analyse solutions and implementations thereof to verify if the implementation is correct and the privacy and/or security requirements ING has are met
Relevant stakeholders: you will be working with the DLT team, and reporting to the Chapter Lead and squad’s Customer Journey Expert / Product Owner.
You will be fully part of an enthusiastic multi-disciplinary team that has a willingness to help you grow and learn as much as possible throughout your position.
Closing date for applications: 22 December 2018
Contact: Mariana Gómez de la Villa
Global Program Manager Distributed Ledger Technology
ING Wholesale Banking Innovation
AMP G.04, Bijlmerplein 888, 1102 MG Amsterdam Zuidoost
P.O. Box 1800, 1000 BV Amsterdam, The Netherlands
M +31649420406
E mariana.gomez.de.la.villa (at) ing.nl
More information: https://www.ing.jobs/Global/Careers/Job-opportunities/Vacancy/DLT-Blockchain-Engineer-4.htm?org=searchresult
Singapore University of Technology and Design (SUTD)
Candidates should have a strong interest in the blockchain technology and an excellent background in at least one of the following fields: cryptography, security protocol analysis, network or system security, distributed systems, networking, or related. If you are interested, please send your CV to Pawel Szalachowski.
Closing date for applications: 1 January 2019
Contact: Pawel Szalachowski
pawel (at) sutd.edu.sg
New York University (NYU) Abu Dhabi
Deadline coming up soon: Dec 12 (through Courant) and Dec 15 (through Tandon).
Closing date for applications: 12 December 2018
Contact: Christina Pöpper
More information: https://nyuad.nyu.edu/en/academics/graduate/global-phd-student-fellowship-in-computer-science.html
New York University (NYU) Abu Dhabi
Closing date for applications: 15 November 2018
More information: https://apply.interfolio.com/52873
16 September 2018
Craig Costello
14 September 2018
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
With this in mind, we utilize the Universal Composability framework [Canetti, 2001] to introduce an expressive cryptographic model for email ``ecosystems'' that can formally and precisely capture various well-known privacy notions (unobservability, anonymity, unlinkability, etc.), by parameterizing the amount of leakage an ideal-world adversary (simulator) obtains from the email functionality.
Equipped with our framework, we present and analyze the security of two email constructions that follow different directions in terms of the efficiency vs. privacy tradeoff. The first one achieves optimal security (only the online/offline mode of the users is leaked), but it is mainly of theoretical interest; the second one is based on parallel mixing [Golle and Juels, 2004] and is more practical, while it achieves anonymity with respect to users that have similar amount of sending and receiving activity.
Venkata Koppula, Brent Waters
In particular, we consider a PRG with an $n$ bit input $s \in {0,1}^n$ and $n\cdot \ell$ bit output $y_1, ..., y_n$ where each $y_i$ is an $\ell$ bit string. Then for a randomly chosen $s$ the following two distributions should be computationally indistinguishable. In the first distribution $r_{i,s_i} = y_i$ and $r_{i, \bar{s}_i}$ is chosen randomly for $i \in [n]$. In the second distribution all $r_{i,b}$ are chosen randomly for $i \in [n], b \in {0,1}$.
Jia Xu, Jianying Zhou
Fuyuki Kitagawa, Keisuke Tanaka
The above framework based on projective hash function captures only KDM-CCA security in the single user setting. However, we can prove the KDM-CCA security in the multi user setting of our concrete instantiations by using their algebraic structures explicitly. Especially, we prove that our DDH based scheme satisfies KDM-CCA security in the multi user setting with the same parameter setting as in the single user setting.
Jean Paul Degabriele, Marc Fischlin
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
In this paper, we propose the first ABS scheme for a very general policy class, all deterministic Turin machines, from a standard assumption, namely, the Symmetric External Diffie-Hellman (SXDH) assumption. We also propose the first ABS scheme that allows nondeterministic finite automata (NFA) to be used as policies. Although the expressiveness of NFAs are more restricted than Turing machines, this is the first scheme that supports nondeterministic computations as policies.
Our main idea lies in abstracting ABS constructions and presenting the concept of history of computations; this allows a signer to prove possession of a policy that accepts the string associated to a message in zero-knowledge while also hiding the policy, regardless of the computational model being used. With this abstraction in hand, we are able to construct ABS for Turing machines and NFAs using a surprisingly weak NIZK proof system. Essentially we only require a NIZK proof system for proving that a (normal) signature is valid. Such a NIZK proof system together with a base signature scheme are, in turn, possible from bilinear groups under the SXDH assumption, and hence so are our ABS schemes.
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions
Akinori Hosoyamada, Kan Yasuda
Nico Döttling, Ryo Nishimaki
Our contributions are twofold. One is a definitional work. We define the syntax and security of UPRE. The other is showing the feasibility of UPRE. More precisely, we present three generic constructions of UPRE. One is a UPRE based on probabilistic indistinguishability obfuscation (PIO). It can re-encrypt ciphertexts polynomially many times. Another is a relaxed variant of UPRE based on function secret sharing (FSS). It can re-encryption ciphertexts constant times. The relaxed variant means that decryption algorithms for re-encrypted ciphertext are slightly modified though we use only original delegatee secret keys for decryption. The other is the relaxed variant of UPRE based on oblivious transfer and garbled circuits. It can re-encryption ciphertexts polynomially many times.
The supported PKE schemes by the first and second generic constructions vary in the underlying hard problems or cryptographic tools. The third generic construction supports any CPA-secure PKE. The security levels of our UPRE schemes vary in the underlying hard problems or cryptographic tools that they rely on.
Worcester Polytechnic Institute
The successful candidate will have a strong background in the broad area of Cybersecurity and privacy, with expertise subdomains including Blockchains and decentralized trust, secure computation, hardware security and side-channel analysis, adversarial learning, and security in the cloud and IoT devices.
Candidates must have a Ph.D. degree in Electrical Engineering, Computer Engineering or related areas with outstanding academic credentials that clearly demonstrate their ability to conduct independent and successful research in their areas of expertise and to build cross-disciplinary research programs. Applicants must show potential for an innovative and sustainable research and teaching career. WPI expects faculty to be involved in a balance of research, teaching and service activities, including mentoring student project and thesis work at the undergraduate, master’s and doctoral levels.
Applications should include curriculum vitae, statements of teaching and research interests, and a list of five professional references. This search will remain open until the position is filled.
Closing date for applications: 1 July 2019
Contact: Berk Sunar, sunar\'at\'wpi.edu
More information: https://careers.wpi.edu/postings/6131
Alibaba Group
ALIBABA GROUP’S MISSION IS TO MAKE IT EASY TO DO BUSINESS ANYWHERE. Our businesses are comprised of core commerce, cloud computing, digital media and entertainment, and innovation initiatives. An ecosystem has developed around our platforms and businesses that consists of consumers, merchants, brands, retailers, other businesses, third-party service providers and strategic alliance partners.
The Group
We are a cryptography research group that aim to secure data sharing in Alibaba. We do research in state-of-the-art cryptographic techniques, and integrate them in Alibaba’s daily business. Our group is looking for talented developers to join our team as (senior) cryptography engineers. The job involves studying advanced cryptography techniques and developing libraries and applications based on them.
Requirement and responsibilities:
- Good knowledge of C/C++/Java/Python (at least one of them)
- Solid cryptography background, e.g., good knowledge of symmetric/asymmetric encryption, hash algorithms, etc.
- Enthusiastic in learning advanced crypto schemes, and able to apply them in practice.
- Strong interest in information security, and willingness to devote into the business of data privacy protection in the big data era.
Any knowledge below is a strong plus (but not required):
- Publication in top-tier security conferences
- Experience in secure processing of big data
- Knowledge of machine learning
- Knowledge and practice in state-of-the-art crypto techniques: homomorphic encryption, multiparty computation, post-quantum cryptography, differential privacy, etc.
Location:
Hangzhou or Beijing in China (strong applicants can be based in US depending on the interviews)
Closing date for applications: 1 July 2019
Contact: Cheng Hong (Email: vince.hc (at) alibaba-inc.com)