IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 November 2018
Kanazawa University, Japan
An appointee is expected on duty on April 1st, 2019 or at an early possible time after that.
Research budget: In case of tenure-track assistant professor, Kanazawa University plans to provide a start-up research fund of approximately 800,000 JPY in the first year in addition to faculty research expense.
Closing date for applications: 4 January 2019
Contact: Masahiro Mambo (Contact information can be found below.)
More information: http://www.t.kanazawa-u.ac.jp/collegeschool/20_se/en/position/20190104_ec_tt_en.pdf
12 November 2018
Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
Felix Wegener, Christian Baiker, Amir Moradi
Kuala Lumpur, Malaysia, 26 November - 28 November 2019
Submission deadline: 8 June 2019
Notification: 29 July 2019
Copenhagen, Denmark, 17 July - 19 July 2019
Submission deadline: 12 January 2019
Notification: 1 March 2019
11 November 2018
Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Tetsu Iwata
09 November 2018
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
Bertram Poettering
In this note we show how the attacks of Inoue and Minematsu can be extended to also break the confidentiality of OCB2. We do this by constructing an IND-CCA adversary that requires minimal resources and achieves an overwhelming distinguishing advantage.
Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
We address two fundamental aspects of the two-party setting: 1) what is the communication complexity, and 2) can it be accomplished securely, without Alice and Bob learning extra information about each other's input. Besides closeness testing, we also study the independence testing problem, where Alice and Bob have $t$ samples from distributions $a$ and $b$ respectively, which may be correlated; the question is whether $a,b$ are independent of $\epsilon$-far from being independent. Our contribution is three-fold:
$\bullet$ Communication: we show how to gain communication efficiency as we have more samples, beyond the information-theoretic bound on $t$. Furthermore, the gain is polynomially better than what one may obtain by adapting one-party algorithms.
For the closeness testing, our protocol has communication $s = \tilde{\Theta}_{\varepsilon}\left(n^2/t^2\right)$ as long as $t$ is at least the information-theoretic minimum number of samples. For the independence testing over domain $[n] \times [m]$, where $n\ge m$, we obtain $s = \tilde{O}_{\varepsilon}(n^2 m/t^2 + n m/t + \sqrt{m})$.
$\bullet$ Lower bounds: we prove tightness of our trade-off for the closeness testing, as well as that the independence testing requires tight $\Omega(\sqrt{m})$ communication for unbounded number of samples. These lower bounds are of independent interest as, to the best of our knowledge, these are the first 2-party communication lower bounds for testing problems, where the inputs represent a set of i.i.d. samples.
$\bullet$ Security: we define the concept of secure distribution testing and argue that it must leak at least some minimal information when the promise is not satisfied. We then provide secure versions of the above protocols with an overhead that is only polynomial in the security parameter.
Vitaly Kiryukhin
Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
We present a PSIR framework that reduces an online query to performing one single-server PIR on a sub-linear number of database records. All other operations beyond the single-server PIR consist of cryptographic hashes or plaintext operations. In practice, the dominating costs of resources occur due to the public-key operations involved with PIR. By reducing the input database to PIR, we are able to limit expensive computation and avoid transmitting large ciphertexts. We show that various instantiations of PSIR reduce server CPU by up to 10x and online network costs by up to 10x over the previous best PIR construction.
Chen-Dong Ye, Tian Tian
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
Yiwen Gao, Yongbin Zhou, Wei Cheng
Elaine Shi
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Previously, IT-MPC protocols in the plain model either required a larger number of rounds, or a smaller minority of corruptions.