IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 November 2018
Dima Grigoriev, Vladimir Shpilrain
Victoria Vysotskaya
Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
Lunzhi Deng
Thijs Veugen
15 November 2018
Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
In this work, we identify the three phases of private decision tree evaluation protocols: feature selection, comparison, and path evaluation. We systematize protocols for each of these phases to identify the best available instantiations using the two main paradigms for secure computation: garbling techniques and homomorphic encryption. There is a natural tradeoff between runtime and communication considering these two paradigms: garbling techniques use fast symmetric-key operations but require a large amount of communication, while homomorphic encryption is computationally heavy but requires little communication.
Our contributions are as follows: Firstly, we systematically review and analyse state-of-the-art protocols for the three phases of private decision tree evaluation. Our methodology allows us to identify novel combinations of these protocols that provide better tradeoffs than existing protocols. Thereafter, we empirically evaluate all combinations of these protocols by providing communication and runtime measures, and provide recommendations based on the identified concrete tradeoffs.
Tomer Ashur, Siemen Dhooghe
Michael Schliep, Nicholas Hopper
Qipeng Liu, Mark Zhandry
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Wen-Ran Zhang
14 November 2018
Microsoft Redmond, WA
Interested candidates please send cover letter and resume to CryptIntCV@microsoft.com. Applications will be considered through the spring until all positions are filled, but for full consideration please apply by January 15, 2019.
Closing date for applications: 1 June 2019
Contact: CryptIntCV@microsoft.com
University of Bergen, Norway
Although the positions are intended for the whole department, the Reliable and Secure Communication group is interested in candidates in domains of cryptography and cryptographic Boolean functions.
For more information check
https://www.jobbnorge.no/en/available-jobs/job/160197/phd-position-4-in-computer-science
Closing date for applications: 9 December 2018
Contact: For applicants in cryptography please contact Prof. Tor Helleseth tor.helleseth (at) uib.no
For applicants in cryptographic Boolean functions please contact Dr. habil. Lilya Budaghyan lilya.budaghyan (at) uib.no
More information: https://www.jobbnorge.no/en/available-jobs/job/160197/phd-position-4-in-computer-science
University of Bergen
For more details see
https://www.jobbnorge.no/en/available-jobs/job/160195/researcher-position-in-cryptology
Closing date for applications: 1 December 2018
Contact: Prof. Tor Helleseth
More information: https://www.jobbnorge.no/en/available-jobs/job/160195/researcher-position-in-cryptology
CISPA Helmholtz Center for Information Security
The Information Security & Cryptography group is one of the world-leading research groups concentrating on cutting-edge research in security and privacy. As part of CISPA, the group is located at Saarbruecken, Germany. CISPA is the newest member of the Helmholtz Association, the largest scientific organization in Germany fully committed to scientific excellence and to tackling the grand research challenges in their respective fields. CISPA as the first investment of Helmholtz in computer science is one of the top research centers in information security, it is constantly ranked top-3 in the field worldwide, see, e.g., CSrankings.org (http://csrankings.org/#/index?sec&world).
Requirements:
- A bachelor/master degree in Computer Science, Information Security, Mathematics with excellent grades
- Excellent English
- Excellent programming skills
- Good knowledge about machine learning and/or cryptography
What we offer:
- Full-time working contract
- Excellent research environment
- Strong supervision
- World-class collaborations
To apply, please send your
- CV
- Transcripts
- Motivation letter
- Contact information of two references
to yang.zhang (at) cispa.saarland
Closing date for applications: 1 April 2019
Contact: Yang Zhang, yang.zhang (at) cispa.saarland
University of South Florida, Tampa, FL 33620, USA
Topics: Secure and Reliable Blockchain and Cryptocurrencies
• Post-quantum secure blockchains
• Use of blockchains to enhance cyber-security of critical infrastructures
Secure and Reliable Internet of Things and Systems
• Post-quantum secure IoTs and secure voting systems
• Cryptographic primitives for IoTs
Trustworthy Machine Learning (TML)
• Privacy-preserving machine learning
• Adversarial machine learning
Breach-Resilient Cyber-Infrastructures:
• New searchable encryption and Oblivious RAM schemes
• Privacy Enhancing Technologies for genomic and medical data
Requirements:
• A BS degree in computer science, electrical engineering or mathematics with a high-GPA.
• Very good programming skills (e.g., C, C++), familiarity with OS/Systems.
• Good Academic Writing and Presentation Skills.
• MS degree in computer science, electrical engineering or mathematics is a big plus. Publications in security and privacy are highly desirable.
Please send (by e-mail): (i) Transcripts, (ii) Curriculum vitae, (iii) Three reference letters, (iv) Research statement, (v) GRE and TOEFL scores,
Closing date for applications: 1 February 2019
Contact: Dr. Attila A. Yavuz is an Assistant Professor and the Director of Applied Cryptography Research Laboratory in the Department of Computer Science and Engineering at University of South Florida.
http://www.csee.usf.edu/~attilaayavuz/
attilaayavuz (at) usf.edu
More information: http://www.csee.usf.edu/~attilaayavuz/article/PositionDescrption_at_USF_Fall2019.pdf
Singapore University of Technology and Design (SUTD)
Candidates should have an excellent background (with Bachelor or Master degree and CGPA>80%) in mathematics or computer science/engineering and the ability to work on inter-disciplinary research projects. Acquaintance with cryptography and network/system security concepts as well as some programming skills will be considered as strong assets.
For the Sept 2019 intake, the application deadline is 31st Dec 2018. More information of the PhD program is available at https://istd.sutd.edu.sg/phd/phd-overview/.
Interested candidates please send your CV to Prof. Jianying Zhou
Closing date for applications: 31 December 2018
Contact: Jianying Zhou
More information: http://jianying.space/
University of Twente, Netherlands
For more information, please check the link provided below.
Closing date for applications: 1 December 2018
More information: https://www.utwente.nl/en/organization/careers/vacancy/!/562764/assistant-professor-in-digital-security-privacy
University of Warsaw
The successful candidate will be required to conduct research and teach in some of the following areas: concurrent programming, operating systems, computer networks, web applications, security of computer systems or cryptography. The contract is for 4 years, with a possible extension to indefinite employment after a positive result of an employee evaluation.
MIM UW is one of the strongest computer science faculties in Europe. It is known for talented students (e.g., two wins and 13 times in top ten at the ACM International Collegiate Programming Contest) and strong research teams, especially in theoretical aspects of computer science like algorithms, logic and automata, cryptography (e.g., 9 ERC grants in these fields). For an overview of research areas represented in the Faculty, see http://www.mimuw.edu.pl/en/dziedziny-badan
Requirements:
- PhD degree in computer science or mathematics
- Strong publication record in international computer science journals/conferences
- Teaching experience
- Mobility record (participation in conferences, postdoc positions, etc.)
Deadline for applications: 30th November 2018.
Closing date for applications: 30 November 2018
Contact: Lukasz Kowalik (kowalik (at) mimuw.edu.pl) or Aleksy Schubert (alx (at) mimuw.edu.pl)
More information: https://www.mimuw.edu.pl/rozne/konkursy-pliki/2018/praca-adiunkt-nauk-sys-komp-II-30-11-2018-en.pdf
Tampere University of Technology, Tampere, Finland
The Network and Information Security Group (NISEC) is currently looking for up to 2 motivated and talented researchers (Postdoctoral Researchers) to contribute to research projects related to applied cryptography, security and privacy.
The successful candidates will be working on the following topics (but not limited to):
- Analysis and design of Searchable Encryption schemes and data structures enabling efficient search operations on encrypted data;
- Restricting the type of access given when granting access to search over one\'s data;
- Processing of encrypted data in outsourced and untrusted environments;
- Applying encrypted search techniques to SGX environments;
- Revocable Attribute-Based Encryption schemes and their application to cloud services;
- Privacy-Preserving Analytics;
- IoT Security.
The positions are strongly research focused. Activities include conducting both theoretical and applied research, the design of secure and/or privacy-preserving protocols, software development and validation, reading and writing scientific articles, presentation of the research results at seminars and conferences in Finland and abroad, acquiring (or assisting in acquiring) further funding.,
Closing date for applications: 20 November 2018
Contact:
Antonis Michalas
antonis.michalas (at) tut.fi
www.amichalas.com
University of Manchester, School of Computer Science
In the last decade, the energy sector has been undertaking a significant shift in the way electricity is generated, traded and consumed. With the introduction of smart meters - devices that can measure and communicate users\' electricity consumption every several minutes - more and more innovative services become available to users.
One of these services is the peer-to-peer (p2p) electricity trading that allows users to trade electricity among themselves (via trading platforms), rather than buying from (or selling to) their suppliers. For example, a user with a solar panel can sell directly his/her excess electricity to another user, and vice versa. Such markets have huge potentials as, apart from bringing extra profit to their participants, they can also contribute to increasing the uptakes of renewables.
However, such p2p trading requires complex interactions and data exchanges among various existing and new market players, inevitably introducing several security and privacy issues. Considering the time and computational constraints of the market operations, as well as the interconnectedness and interdependence between different market players, ensuring secure data exchanges in p2p markets is not trivial. Entities need to authenticate each other and be assured of the integrity of the messages they receive. Similarly, ensuring that personal data of users are not revealed to any party is not straightforward. Examples of personal data are users\' names, addresses, electricity consumption, preferences, monthly bills, etc.
The aim of this project is to apply (a combination of) various (computationally-demanding) advanced cryptographic technologies, such as blockchain, smart contracts and secure multiparty computation, to design p2p electricity trading solutions that achieve a good balance between security, user privacy, usability and energy efficiency.
Funding
Fully funded PhD opportunity for an UK/EU student: untaxed stipend of £14,777 per annum + tuition fees
Closing date for applications: 30 November 2018
Contact: Dr Mustafa A. Mustafa email: mustafa.mustafa(at)manchester.ac.uk
More information: http://www.cs.manchester.ac.uk/study/postgraduate-research/projects/description/?projectid=18311