IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
02 December 2018
Deepak Sirone, Pramod Subramanyan
In comparison to past work, the FALL attack is more practical as it can often succeed (90% of successful attempts in our experiments) by only analyzing the locked netlist, without requiring oracle access to an unlocked circuit. Further, FALL attacks successfully defeat Secure Function Logic Locking (SFLL), the only locking algorithm that is resilient to known attacks on logic locking. Our experimental evaluation shows that FALL is able to defeat 65 out of 80 (81%) circuits locked using SFLL.
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
Saikrishna Badrinarayanan, Akshayaram Srinivasan
In this work, we continue the study of threshold non-malleable secret sharing against the class of tampering functions that tamper each share independently. We focus on achieving greater efficiency and guaranteeing a stronger security property. We obtain the following results:
- Rate Improvement. We give the first construction of a threshold non-malleable secret sharing scheme that has rate $> 0$. Specifically, for every $n,t \geq 4$, we give a construction of a $t$-out-of-$n$ non-malleable secret sharing scheme with rate $\Theta(\frac{1}{t\log ^2 n})$. In the prior constructions, the rate was $\Theta(\frac{1}{n\log m})$ where $m$ is the length of the secret and thus, the rate tends to 0 as $m \rightarrow \infty$. Furthermore, we also optimize the parameters of our construction and give a concretely efficient scheme.
- Multiple Tampering. We give the first construction of a threshold non-malleable secret sharing scheme secure in the stronger setting of bounded tampering wherein the shares are tampered by multiple (but bounded in number) possibly different tampering functions. The rate of such a scheme is $\Theta(\frac{1}{k^3t\log^2 n})$ where $k$ is an apriori bound on the number of tamperings. We complement this positive result by proving that it is impossible to have a threshold non-malleable secret sharing scheme that is secure in the presence of an apriori unbounded number of tamperings.
- General Access Structures. We extend our results beyond threshold secret sharing and give constructions of rate-efficient, non-malleable secret sharing schemes for more general monotone access structures that are secure against multiple (bounded) tampering attacks.
30 November 2018
Yeshiva University
Yeshiva University’s Katz School seeks a dynamic director to serve as academic and administrative lead for its graduate initiatives in Data Science and related programs.
Position Responsibilities:
• Provide transformative direction and oversight in teaching, research and community
• Oversee curriculum development, academic policies, and assessment
• Ensure student academic and professional success
• Lead faculty recruitment, hiring, development, and evaluation
• Recruit highly qualified students, with an expectation of significant program growth
• Obtain relevant industry affiliations and designations
• Raise the visibility of the Katz School and University
• Establish partnerships with local, regional, national, and international organizations
• Develop grants, contracts, philanthropy, and research development
• Manage budgets and resources
Required Experience & Educational Background:
• Master’s degree in data science, computer science, or related field
• Professional experience in data science or related fields
To apply, visit: http://apptrkr.com/1336277
About Us:
Founded in 1886, Yeshiva University (YU) has a strong tradition of combining Jewish scholarship with academic excellence and achievement in the liberal arts, sciences, medicine, law, business, social work, Jewish studies, education, psychology, and more. We seek to attract and retain engaged and committed individuals who contribute to an exciting working environment, where there is a sense of community and belonging, balanced with a significant cross section of people from diverse backgrounds working and studying together.
Yeshiva University is an equal opportunity employer committed to hiring minorities, women, individuals with disabilities and protected veterans.
Closing date for applications:
More information: http://apptrkr.com/1336277
Chalmers University of Technology, Sweden
The position is fully funded for 2 years and it would be extended under conditions for 2 more.
The post-doc will be hired at the department of Computer Science and Engineering at Chalmers and will be working under the supervision of Prof. Katerina Mitrokotsa.
The preferred starting date is in April 2019.
To apply send an email with subject: post-doc in cryptography and the following documents:
- CV, research statement, list of publications and names of at least two referees
Closing date for applications: 5 January 2019
Contact: Katerina Mitrokotsa
Associate Professor,
Chalmers University of Technology
Department of Computer Science and Engineering,
Gothenburg, Sweden
More information: http://www.cse.chalmers.se/~aikmitr/
University of Waterloo, Waterloo, Ontario, Canada
PDF applicants with a recent PhD in Computer/Electrical Engineering or Computer Science and publications at premium venues are encouraged to send their CVs and cover letters via email to ahasan at uwaterloo.ca.
PhD student applicants with mathematical maturity and research experience in cryptographic engineering or applied cryptography, who meet the admission requirements for the PhD program in Electrical and Computer Engineering at the University of Waterloo, are encouraged to apply online following this link https://uwaterloo.ca/electrical-computer-engineering/future-graduate-students/programs
Closing date for applications: 11 January 2019
Canadian Institute for Cybersecurity (CIC)
Position Description:
We are currently looking for PhD and Post-doc researchers to fill various roles within our cyber security research and projects.
Required skills and experience:
- A computer science degree (Master for PhD candidates, PhD for Post-doc candidates) with expertise in network and information security, networking, and other relevant research area. (completed by the start of appointment)
- Strong communication and writing skills.
- Ability to do independent research, as well as to work collaboratively with other team members.
Helpful skills and experience:
- Application development using Java and Python
- Technical abilities in systems design, coding, testing, debugging, and maintenance.
- Demonstrated experience with the design and implementation of large networked and security systems.
Applications will be considered until the available positions are filled. To apply please include your curriculum vitae and the following:
- Research experience (projects, publications, etc.)
- Two representative publications (post-doc candidates)
- Proof of language proficiency (international applicants)
- Contact information (email, address, phone) of three references
Closing date for applications: 30 April 2019
Contact:
Arash Habibi Lashkari, PhD
Assistant Professor and Research Coordinator
Canadian Institute for Cybersecurity (CIC)
University of New Brunswick (UNB)
Fredericton, NB, Canada
A.habibi.l (at) unb.ca
More information: http://www.unb.ca/cic
University of Birmingham
Previous work in this field would be a plus but is not required. Generally, a strong background in algorithmic number theory, cryptographic protocols, cryptanalysis and/or applied cryptography is sought.
The position is for up to 30 months.
Informal inquiries are welcome.
Closing date for applications: 3 January 2019
Contact: Christophe Petit christophe.f.petit (at) gmail.com
More information: https://atsv7.wcn.co.uk/search_engine/jobs.cgi?SID=amNvZGU9MTc2OTA5NiZ2dF90ZW1wbGF0ZT03Njcmb3duZXI9NTAzMjUyMSZvd25lcnR5c
University of Birmingham
The ideal candidate will have a master in Mathematics, Computer Science or Electrical Engineering. Previous knowledge in cryptography and/or number theory is a plus.
Informal inquiries welcome.
Closing date for applications: 14 January 2019
Contact: Christophe Petit christophe.f.petit (at) gmail.com
More information: https://www.birmingham.ac.uk/postgraduate/courses/findaphd.aspx
RWC 2019 will be held January 9-11 in San Jose, California, USA.
29 November 2018
Viet Tung Hoang, Phillip Rogaway
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
Simon-Philipp Merz, Christophe Petit
Our decomposition algorithm yields a universal forgery attack on WalnutDSA^TM, which is one of the 20 proposed signature schemes that are being considered by NIST for standardization of quantum-resistant public-key cryptographic algorithms. Our attack on WalnutDSA^TM can universally forge signatures within seconds for both the 128-bit and 256-bit security level, given one random message-signature pair. The attack worked on 99.8% and 100% of signatures for the 128-bit and 256-bit security levels in our experiments.
Furthermore, we show that the decomposition algorithm can be used to solve instances of the conjugacy search problem and decomposition search problem in braid groups. These problems are at the heart of other cryptographic schemes based on braid groups.
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
Antonio Faonio
In this paper we show two new constructions in the standard model where the above limitation is avoided. Specifically, the first scheme achieves slack parameter $O(1/\lambda)$ where $\lambda$ is the security parameter and it is based on standard number theoretic assumptions, the second scheme achieves optimal slack parameter (i.e. $\gamma = 1$) and it is based on knowledge of the exponent assumptions. Our constructions are efficient and have leakage rate $1 - o(1)$, most notably our second construction has signature size of only 8 group elements which makes it the leakage-resilient signature scheme with the shortest signature size known to the best of our knowledge.
Kexin Hu, Zhenfeng Zhang, Kaiven Guo
28 November 2018
Ashutosh Kumar, Raghu Meka, Amit Sahai
We give an unconditional compiler that transforms any standard secret sharing scheme with arbitrary access structure into a $p$-party leakage-resilient one for $p$ logarithmic in the number of parties. This yields the first secret sharing schemes secure against adaptive and joint leakage for more than two parties.
As a natural extension, we initiate the study of leakage-resilient non-malleable secret sharing} and build such schemes for general access structures. We empower the computationally unbounded adversary to adaptively leak from the shares and then use the leakage to tamper with each of the shares arbitrarily and independently. Leveraging our $p$-party leakage-resilient schemes, we also construct such non-malleable secret sharing schemes: any such tampering either preserves the secret or completely `destroys' it. This improves upon the non-malleable secret sharing scheme of Goyal and Kumar (CRYPTO 2018) where no leakage was permitted. Leakage-resilient non-malleable codes can be seen as 2-out-of-2 schemes satisfying our guarantee and have already found several applications in cryptography [LL12,ADKO15,GKPRS18,GK18,CL18,OPVV18].
Our constructions rely on a clean connection we draw to communication complexity in the well-studied number-on-forehead (NOF) model and rely on functions that have strong communication-complexity lower bounds in the NOF model (in a black-box way). We get efficient $p$-party leakage-resilient schemes for $p$ upto $O(\log n)$ as our share sizes have exponential dependence on $p$. We observe that improving this dependence from $2^{O(p)}$ to $2^{o(p)}$ will lead to progress on longstanding open problems in complexity theory.