IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 October 2018
Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
ePrint ReportIshai et al. (Eurocrypt 2011) showed how to construct NISC protocols that only use parallel calls to an ideal oblivious transfer (OT) oracle, and additionally make only a black-box use of any pseudorandom generator. Combined with the efficient 2-message OT protocol of Peikert et al. (Crypto 2008), this leads to a practical approach to NISC that has been implemented in subsequent works. However, a major limitation of all known OT-based NISC protocols is that they are subject to selective failure attacks that allows a malicious sender to entirely compromise the security of the protocol when the receiver's first message is reused.
Motivated by the failure of the OT-based approach, we consider the problem of basing \emph{reusable} NISC on parallel invocations of a standard arithmetic generalization of OT known as oblivious linear-function evaluation (OLE). We obtain the following results:
- We construct an information-theoretically secure reusable NISC protocol for arithmetic branching programs and general zero-knowledge functionalities in the OLE-hybrid model. Our zero-knowledge protocol only makes an absolute constant number of OLE calls per gate in an arithmetic circuit whose satisfiability is being proved. As a corollary, we get reusable NISC/OLE for general Boolean circuits using any one-way function. - We complement this by a negative result, showing that reusable NISC/OT is impossible to achieve, and a more restricted negative result for the case of the zero-knowledge functionality. This provides a formal justification for the need to replace OT by OLE. - We build a universally composable 2-message OLE protocol in the CRS model that can be based on the security of Paillier encryption and requires only a constant number of modular exponentiations. This provides the first arithmetic analogue of the 2-message OT protocols of Peikert et al. (Crypto 2008). - By combining our NISC/OLE protocol and the 2-message OLE protocol, we get protocols with new attractive asymptotic and concrete efficiency features. In particular, we get the first (designated-verifier) NIZK protocols where following a statement-independent preprocessing, both proving and verifying are entirely ``non-cryptographic'' and involve only a constant computational overhead.
Marcella Hastings, Nadia Heninger, Eric Wustrow
ePrint ReportIraklis Leontiadis, Serge Vaudenay
ePrint ReportDespite the merits of the message franking protocols [GLR17], our observation which launched this work, is that all the designs be it compositional or the CEP construction, leak too much when the receiver needs to open the abusive message to the third party. Namely, the receiver opens the entire message along with the opening key to the third party, thus confidentiality of the message is entirely broken. Moreover, the opening of the entire message increases the communication cost of the protocol and in cases of big messages being exchanged (attachments, videos, multimedia files, etc.) it might be unnecessary. We provide to the best of our knowledge the first formal treatment of message franking protocols with minimum leakage whereby only the abusive blocks are opened, while the rest non-abusive blocks of the message remain private.
First we give a new definition for multi-opening indistinguishability with partial opening (MO-IND-PO), which forces an adversary to distinguish encryptions of abusive blocks. We then design and analyze two protocols CEP-AOP1 (Committing Encrypt and PRF with After Opening Privacy) and CEP-AOP2, which adhere to the new privacy definition. As a side contribution we show a multi-opening secure CEP-AOP2 construction using only one PRF evaluation over the message, in a weaker but meaningful security model, relying only on standard assumptions of the underlying symmetric primitives.
Mathias Wagner, Stefan Heyse
ePrint Report04 October 2018
Stockholm, Sweden, 16 June - 20 June 2018
Event CalendarSubmission deadline: 11 November 2018
Notification: 3 December 2018
Thessaloniki, Greece, 7 December - 9 December 2018
Event CalendarSubmission deadline: 1 November 2018
03 October 2018
DarkMatter, Abu Dhabi
Job PostingDesign, implement and deploy cryptographic algorithms tailored for a cloud environment.
Conduct research and development in differential privacy, secret sharing, multi-party secure computation and fully homomorphic encryption.
Perform security assessments of crypto-primitives, cryptosystems and cloud security solutions at the theoretical and implementation level.
Work closely with the other teams in the organization to design and deploy safe cloud-based solutions .
Be involved in the integration of developed cryptosystems within DarkMatter products.
Enjoy all the cultural, educational and travel opportunities Abu Dhabi offers
To bring your dream to life, you’ll need:
PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics or Computer Science.
Extensive experience developing in various programming languages.
A desire to innovate in the UAE
Closing date for applications: 3 March 2019
Contact: Sheila Morjaria
Mehdi Messaoudi
More information: https://grnh.se/d694fd601
DarkMatter, Abu Dhabi
Job Posting
• Design, implement and deploy cryptographic algorithms tailored for resource-constrained devices.
• Conduct research and development in lightweight cryptography.
• Perform security assessments of crypto-primitives and cryptosystems suitable for resource-constrained devices at the theoretical and implementation level.
• Work closely with the other teams in the organization to deploy secure embedded systems.
• Be involved in the integration of developed cryptosystems within DarkMatter products.
• Enjoy all the cultural, educational and travel opportunities Abu Dhabi offers.
To bring your dream to life, you’ll need:
• MS or PhD degree in Computer Science, Computer Engineering, Electrical Engineering, Cryptography or related field.
• Development experience within embedded systems, RFID and sensor networks.
• Knowledge of Unix/Linux environments and kernel development.
• Knowledge of one or more of the following: Microcontrollers, SoC, TrustZone, ARM processors, performance optimization, bootloading, firmware, x86 assembly, system BIOS or hardware/software integration.
• Knowledge of side-channel attacks and countermeasures.
• Experience coding in C/C++.
• A desire to innovate in the UAE
Closing date for applications: 3 April 2019
Contact: Sheila Morjaria
Mehdi Messaoudi
More information: https://grnh.se/fb5c073f1
Cloudflare
Job PostingCloudflare’s Technology team is working on building the future of Cloudflare by tackling strategic projects that have a large impact on the way Cloudflare systems, and the Internet at large, work. Engineers in the Technology team are expected to research new ideas and technologies, dive into existing codebases to make meaningful changes, work independently on greenfield projects, and collaborate closely with the engineering organization to achieve common goals.
The Cryptography team is a sub-team of the Technology team focused on solving difficult problems in security, performance, and privacy at scale using cryptographic tools. This involves systems engineering, open source software development, protocol design, the implementation of cryptographic primitives, contributions to cutting-edge research in collaboration with academia, participation in Internet standards organizations like the IETF, and more.
Closing date for applications: 1 July 2019
Contact: Nick Sullivan
More information: https://www.cloudflare.com/careers/departments/technology-research/
Technical University of Denmark
Job PostingThe department, DTU Compute, is an internationally unique academic environment spanning the science disciplines mathematics, statistics and computer science. At the same time, we are an engineering department covering informatics and communication technologies (ICT) in their broadest sense. Finally, we play a major role in addressing the societal challenges of the digital society where ICT is a part of every industry, service, and human endeavor.
Responsibilities and tasks
Through the position, the University seeks to strengthen the research within cyber security. The cyber security section at DTU has experts in cryptology, in particular the design and analysis of ciphers and hash functions, but wishes to further strengthen its research within cryptology.
Topics of particular interest include but are not limited to:
• symmetric cryptology
• lightweight and resource-efficient cryptography
• post-quantum cryptology
• provable security of cryptographic primitives
• side-channel attacks and physical cryptanalysis
• analysis and protection of cryptographic implementations
• algorithmic aspects of cryptology
• efficient implementation of cryptographic primitives
Candidates with strong expertise in any other area of cryptology are also encouraged to apply.
Application procedure
To apply, please read the full job advertisement at www.career.dtu.dk
Please submit your online application no later than 1 December 2018.
Closing date for applications: 31 December 2018
02 October 2018
Singapore University of Technology and Design (SUTD), Singapore
Job PostingClosing date for applications: 8 January 2019
Contact: Prof. Jianying Zhou
Email: jianying_zhou (at) sutd.edu.sg
More information: http://jianying.space/
Graz University of Technology
Job PostingAt the Graz University of Technology / Faculty of Computer Science and Biomedical Engineering the position of
University Professor of Information Security
is to be filled at the institute of Applied Information Processing and Communications (IAIK) as a full time permanent position according to section 98 of the Austrian Universities Act (§98 UG). IAIK is an internationally visible research center at TU Graz where more than 60 researchers work on a multitude of topics in information security.
We are seeking a candidate with proven scientific expertise who will represent the field of Information Security in research and teaching. The successful candidate will complement existing strengths at the institute and be an engaged teacher in the Computer Science programs at the bachelor, master, and PhD level.
Closing date for applications: 3 December 2018
Contact: Stefan Mangard, Email: Stefan.Mangard (at) iaik.tugraz.at
More information: https://www.tugraz.at/fakultaeten/infbio/news/vacancies/professor-of-information-security/
01 October 2018
James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
ePrint ReportIn this work, we conduct an extensive study of simple conjunction obfuscation techniques.
- We abstract the Bishop et al. scheme to obtain an equivalent yet more efficient "dual'' scheme that can handle conjunctions over exponential size alphabets. This scheme admits a straightforward proof of generic group security, which we combine with a novel combinatorial argument to obtain distributional VBB security for $|S|$ of any size.
- If we replace the Reed-Solomon code with a random binary linear code, we can prove security from standard LPN and avoid encoding in a group. This addresses an open problem posed by Bishop et al. to prove security of this simple approach in the standard model.
- We give a new construction that achieves information theoretic distributional VBB security and weak functionality preservation for $|S| \geq n - n^\delta$ and $\delta < 1$. Assuming discrete log and $\delta < 1/2$, we satisfy a stronger notion of functionality preservation for computationally bounded adversaries while still achieving information theoretic security.
Subhabrata Samajder, Palash Sarkar
ePrint ReportYuichi Komano, Hideo Shimizu, Hideyuki Miyake
ePrint ReportFerucio Laurentiu Tiplea, Constantin Catalin Dragan
ePrint ReportIn this paper we propose the first asymptotically ideal CRT-based secret sharing schemes for (disjunctive, conjunctive) multilevel and compartmented access structures. Our approach is compositional and it is based on a variant of the Asmuth-Bloom secret sharing scheme where some participants may have public shares. Based on this, we show that the proposed secret sharing schemes for multilevel and compartmented access structures are asymptotically ideal if and only if they are based on 1-compact sequences of co-primes.
Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
ePrint ReportJung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
ePrint ReportIn this paper, we present a variant of approximate homomorphic encryption which is optimal for implementation on standard computer system. We first introduce a new structure of ciphertext modulus which allows us to use both the RNS decomposition of cyclotomic polynomials and the NTT conversion on each of the RNS components. We also suggest new approximate modulus switching procedures without any RNS composition. Compared to previous exact algorithms requiring multi-precision arithmetic, our algorithms can be performed by using only word size (64-bit) operations.
Our scheme achieves a significant performance gain from its full RNS implementation. For example, compared to the earlier implementation, our implementation showed speed-ups 17.3, 6.4, and 8.3 times for decryption, constant multiplication, and homomorphic multiplication, respectively, when the dimension of a cyclotomic ring is 32768. We also give experimental result for evaluations of some advanced circuits used in machine learning or statistical analysis. Finally, we demonstrate the practicability of our library by applying to machine learning algorithm. For example, our single core implementation takes 1.8 minutes to build a logistic regression model from encrypted data when the dataset consists of 575 samples, compared to the previous best result 3.5 minutes using four cores.