IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 March 2019
Early registration deadline Apr 15
Eurocrypt will be held this year in Darmstadt, Germany from May 19-23, with affiliated events held on May 18-19.
Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
As the first main result, we show how to achieve IND-CCA security via a weak form of key-dependent-message (KDM) security. More specifically, we construct an IND-CCA secure PKE scheme based on an IND-CPA secure PKE scheme and a secret-key encryption (SKE) scheme satisfying one-time KDM security with respect to projection functions (projection-KDM security). Projection functions are very simple functions with respect to which KDM security has been widely studied. Since the existence of projection-KDM secure PKE implies that of the above two building blocks, as a corollary of this result, we see that the existence of IND-CCA secure PKE is implied by that of projection-KDM secure PKE.
As the second main result, we extend the above construction of IND-CCA secure PKE into that of TDF by additionally requiring a mild requirement for each building block. Our TDF satisfies adaptive one-wayness. We can instantiate our TDF based on a wide variety of computational assumptions. Especially, we obtain the first TDF (with adaptive one-wayness) based on the sub-exponential hardness of constant-noise learning-parity-with-noise (LPN) problem.
Philippe Loubet Moundi
Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
Andreeva et al. proposed ForkAES, a tweakable AES-based forkcipher that splits the state after five out of ten rounds. While their authenticated encrypted schemes were accompanied by proofs, the security discussion for ForkAES was not provided, and founded on existing results on the AES and KIASU-BC. Forkciphers provide a unique interface called reconstruction queries that use one ciphertext block as input and compute the respective other ciphertext block. Thus, they deserve a careful security analysis.
This work fosters the understanding of the security of ForkAES with three contributions: (1) We observe that security in reconstruction queries differs strongly from the existing results on the AES. This allows to attack nine out of ten rounds with differential, impossible-differential and yoyo attacks. (2) We observe that some forkcipher modes may lack the interface of reconstruction queries, so that attackers must use encryption queries. We show that nine rounds can still be attacked with rectangle and impossible-differential attacks. (3) We present forgery attacks on the AE modes proposed by Andreeva et al. with nine-round ForkAES.
Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
Yindong Chen, Fei Guo, Liu Zhang
Gideon Samid
16 March 2019
Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
Dimitrios Poulakis
15 March 2019
New York, USA, 8 January - 10 January 2020
Submission deadline: 1 September 2019
Notification: 1 November 2019
14 March 2019
Santa Barbara, USA, 22 August - 24 August 2019
Submission deadline: 31 May 2019
Notification: 21 June 2019
13 March 2019
Tenured Full Professor, Tenure-Track Associate Professor, Tenure-Track Assistant Professor, Post-Doc
Shanghai Jiao Tong University, Shanghai, China
The school now has 20 open positions on the cyberspace security including 1) tenured full professors, 2) tenure-track associate professors, 3) tenure-track assistants professors, 4) full-time research fellows and postdoctoral. Applicants should have (a) a doctoral degree in Computer Science, Electronic Engineering, Communication, Mathematics, Statistics, Physics closely related to cyberspace security; (b) an established track record in research and scholarship; (c) expertise in the abovementioned 10 strategic research areas; and (d) a demonstrated commitment to excellence in teaching. We sincerely invite academic talents engaged in research related to cyberspace security from both abroad and domestic to join us. The school will provide highly competitive remuneration packages, superior research conditions and high-quality graduate students. We will assist to apply for various national, provincial and ministerial level talent programs. The university will also assist on employment of spouses, schooling for children and medical care.
Please refer to the link: http://english.seiee.sjtu.edu.cn/english/info/14810.htm
Closing date for applications: 15 August 2019
Contact: Dawu GU, Professor/Head of School of the CSE
Email: dwgu (at) sjtu.edu.cn
Identiq
The company is developing a unique solution, based on cryptographic protocols and multi-party computation techniques, which allows users to be validated without compromising their privacy.
The company was founded by Itay Levy, a serial entrepreneur with multiple exits in his past, Ido Shilon the general manager of Nielsen Exelate, and Uri Arad PayPal Israel’s Chief Technologist. The company closed its first financing round, with participation by strong Israeli and US investors.
Responsibilities
The job responsibilities include the design and analysis of cryptographic primitives and a full protocol involving multi-party-computation techniques, as well as bringing the protocol from design to implementation. You will be collaborating with our world-renown cryptography advisors and our top-tier technology teams. You will be inventing new encryption schemes, design computationally, and communication efficient protocols, and will be writing proofs of security and privacy under various adversary models.
This is a full-time position, reporting directly to the company’s head of research.
Qualifications
- Strong background in multi-party computation and homomorphic encryption
- Theoretical and applied experience in cryptographic protocols design
- Cryptographic protocol design and analysis
- M.Sc. in mathematics, computer science, or similar field, with specialization in cryptography and security. PhD an advantage
- Programming in C/C++/Java/C#/Go or similar languages
- Experience in protocol simulation and verification tools an advantage
Interested candidates should submit their resumes to jobs (at) identiq.com
Closing date for applications: 31 March 2019
Telecom ParisTech and Telecom SudParis (campus of Saclay, Paris area)
Blockchain, security and privacy issues
The first 6 months consist in delivering a state of the art, plus refining on research objectives. Here are three examples of further specific topics:
A. Anonymization and micropayment channels
Such transactions appear only in a consolidated form in the blockchain. They can be managed by smart contracts, or payment providers, which have a privileged view on these transactions. A point of interest is anonymization and description of possible attacks on anonymity. A long term goal could be designing tools for monitoring and de-anonymisation.
B. Security analysis of the network layer of blockchain
The underlying network of can leak information on the identity of the users/participants. Such analysis was done on the Bitcoin network, but cannot be generalized. The research would consist in selecting another relevant example then analyzing in depth availability / performance / anonymization. Possible tools are tomography of networks, topology analysis or e.g. addresses links.
C. Fully anonymous blockchains
Contrary to Bitcoin [ACM18], Zcash and Monero enable fully anonymous paiments [OM18]. Ethereum on its side makes possible multiparty pooling of transactions [Meiklejohn & Mercer PETS18]. It could be interesting to quantify the practical usage and weaknesses of these tools [Usx18]. Getting used to monitoring tools will be usefull, as well as technological watch (including social media: reddit, discord, medium, telegram or blogs).
[ACM18] S. Meiklejohn and al. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. Communications ACM.
[OM18] C Orlandi and S Meiklejohn. QuisQuis: A New Design for Anonymous Cryptocurrencies.
[Usx18] G. Kappos and al. An Empirical Analysis of Anonymity in Zcash. 27th USENIX Security Symposium.
Closing date for applications: 31 August 2019
Contact: Please send your resume and/or questions to Gerard Memmi : gerard.memmi \'at\' telecom-paristech.fr
Department of Computing, the Hong Kong Polytechnic University
Candidates are expected to have completed a PhD in computer science or a related discipline (in particular, candidates with a background from biotech or chemical engineering will also be considered); or with significant experience in applied research and knowledge transfer activities.
The appointee is expected to take charge of the development of the system. He/she will assume senior level of responsibility, including project management, supervising of project personnels, communicate with relevant academia staff members and meeting regularly with our industry partners.
The position is funded by the project titled \"Blockchain-Based Food and Drug Counterfeit Detection and Regulatory System\" funded by the Innovation and Technology Commission of Hong Kong.
Closing date for applications: 30 April 2019
Contact: Man Ho Allen Au
More information: http://www4.comp.polyu.edu.hk/~csallen
IT University of Copenhagen
Project: Cryptographic Protocols for Scalable Privacy Preserving Blockchains
Current blockchain consensus protocols underpinning the security of cryptocurrencies and smart contracts suffer from a number of bottlenecks that severely limit the transaction throughput of such systems. Moreover, the few cryptocurrencies that offer strong privacy guarantees are not compatible with the current techniques for achieving higher throughputs. Besides scalability concerns, current privacy preserving cryptocurrencies and smart contracts are also incompatible with legal financial regulations since they do not allow for lawful audits.
The successful candidate will work on a project aiming at solving these issues by means of more efficient consensus protocols and multiparty computation techniques. We will investigate efficient cryptographic protocols for two main tasks: (1) scalable blockchain based consensus compatible with privacy preserving cryptocurrencies and (2) accountable privacy preserving cryptocurrency and smart contract systems that adhere to financial regulations. The research will be focused on developing new provably secure frameworks for building such protocols with high concrete efficiency.
This project will be carried out in cooperation with the Concordium Foundation.
Qualifications:
We are looking for motivated candidates with a background in discrete mathematics and/or theoretical computer science. Experience with distributed systems or cryptography will be considered an advantage. Candidates should have an MsC degree (or equivalent) or a BsC degree plus one year of Master level studies (equivalent to 4 years of studies).
Closing date for applications: 25 March 2019
Contact: Bernardo David, Associate Professor, beda (at) itu.dk
More information: https://candidate.hr-manager.net/ApplicationInit.aspx?cid=119&ProjectId=181022&DepartmentId=3439&MediaId=5
Eindhoven University of Technology, the Netherlands
The department of Mathematics and Computer Science at TU/e has opened a broad hiring call in mathematics. Cryptography is not mentioned explicitly in the call but is located in the mathematics side of the department and thus eligible.
The cryptographers at TU/e would be happy to see good applications in crypto. Given the exisiting crypto group https://www.win.tue.nl/cc/, researchers at tenure track or assistant professor level are particularly encouraged to apply.
Note that applications must be submitted via the webpage. Application by email is not possible.
Closing date for applications: 1 April 2019
Contact:
- Tanja Lange (t.lange (at) tue.nl) for questions regarding cryptography
- Prof. Dr. Barry Koren for general questions about the department (as listed on the job opening page)
- Mrs. Marjolein von Reth, HR Advisor for personnel questions (as listed on the job opening page)
More information: https://jobs.tue.nl/nl/vacature/faculty-members-mathematics-assistant-associate-and-full-professors-439183.html
IBM Research - Zurich
Particular topics of interest include, but are not limited to
Blockchains and distributed-ledger technologies
Verifiable computing and zero-knowledge proofs
Foundations & solutions for real-world cryptography.
The position is available immediately. The successful candidate will enjoy an internationally competitive salary and work in a collaborative and creative group in an exclusive research environment.
The Industry Platforms and Blockchain group at IBM Research – Zurich offers an exciting research environment with the opportunity to collaborate with researchers working on various aspects of security and cryptography, including blockchain, lattice-based cryptography, provably secure protocol design and system security.
Cooperation with other academic and industry researchers within IBM as well as acquisition of external research funding, such as European grants (including ERC), is also possible and encouraged.
The positions offer the opportunity to live in the Zurich area, which is consistently ranked as one of the world’s top five cities with the highest quality of life.
Requirements
Candidates are required to have a PhD in Computer Science, Mathematics, or related field by the time of appointment and an outstanding research record, demonstrated in the form of publications at top cryptography or security conferences (Crypto, Eurocrypt, CCS, S&P etc.).
Diversity
IBM is committed to diversity at the workplace. With us you will find an open, multicultural environment. Excellent flexible working arrangements enable both women and men to strike the desired balance between their professional development and their personal lives.
Closing date for applications: 20 December 2019
Contact: Please send your application including Ref No. 2019_10 to:
Judith Blanc
jko (at) zurich.ibm.com
HR Business Partner
IBM Research – Zurich
Säumerstrasse 4
8803 Rüschlikon
Switzerland
More information: https://www.zurich.ibm.com/careers/