IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
02 April 2019
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
30 March 2019
Mohammad Mahmoody, Tal Moran, Salil Vadhan
Our construction is secure in the standard model under complexity assumptions (collision-resistant hash functions and inherently sequential hash functions), and makes black-box use of the underlying primitives. Consequently, the corresponding construction in the random oracle model is secure unconditionally. Moreover, as it is a public-coin protocol, it can be made non-interactive in the random oracle model using the Fiat-Shamir Heuristic.
Our construction makes a novel use of ``depth-robust'' directed acyclic graphs---ones whose depth remains large even after removing a constant fraction of vertices---which were previously studied for the purpose of complexity lower bounds. The construction bypasses a recent negative result of Mahmoody, Moran, and Vadhan (CRYPTO `11) for time-lock puzzles in the random oracle model, which showed that it is impossible to have time-lock puzzles like ours in the random oracle model if the puzzle generator also computes a solution together with the puzzle.
Boaz Barak, Mohammad Mahmoody
Our result extends (with a loss of a constant factor in the number of queries) also to the random permutation and ideal-cipher oracles. Since the symmetric primitives (e.g. block ciphers, hash functions, and message authentication codes) can be constructed by a constant number of queries to the mentioned oracles, as corollary we get lower bounds on the efficiency of signature schemes from symmetric primitives when the construction is black-box. This can be taken as evidence of an inherent efficiency gap between signature schemes and symmetric primitives.
29 March 2019
University of Luxembourg, Cryptolux (SnT)
The successful candidate will join the CryptoLUX group led by Prof. Alex Biryukov. Candidates with proven research track record in one or more of the following areas are particularly encouraged to apply:
- Design/analysis of lightweight crypto (with the goal to evaluate NIST competition submissions)
- Financial cryptography (cryptocurrencies, blockchain tech)
- Privacy enhancing technologies
Your Profile
A Ph.D. degree in Computer Science, Applied Mathematics or a related field; Competitive research record in applied cryptography or information security (at least one paper in top 10 IT security/crypto conferences; or several papers at ToSC(FSE), CHES, PETs or TCC); Strong mathematical and algorithmic CS background; Good skills in programming and scripting languages; Commitment, team working and a critical mind; Fluent written and verbal communication skills in English are mandatory.
The University offers a one years employment contract (with extension possibility). The University offers highly competitive salaries and is an equal opportunity employer. You will work in an exciting international environment of a large IT security-focused research center (SnT/CSC), developing technologies which will have direct impact on the future.
Applications, written in English, should be submitted by e-mail and should include:
- A brief cover letter explaining the candidate\'s motivation and research interests
- Curriculum Vitae (including photo, education/research/ work, publications, interests)
- Information on participation in competitions, Olympiads, CTFs is a plus
- Contact information of 2-3 references
Applications will be considered on receipt therefore applying before the deadline is encouraged.
Closing date for applications: 1 May 2019
Contact: Prof. Alex Biryukov
More information: https://www.cryptolux.org/index.php/Vacancies
Society for Electronic Transactions and Security [SETS], Chennai, India
Post: Project Associate (Number of Posts: 2)
Project Duration: 3 years (the positions as proposed are purely temporary and would be filled on Contract basis with consolidated salary under the project). The appointment will be made initially for a period of two years and extendable upto further one more year or the closing date of the project whichever is earlier.
Salary: Rs 40,000 to Rs 50,000 per month commensurate to relevant experience
Essential Qualifications: M.E/M.Tech in Electronics and Communication Engineering/ Computer Science and Engineering/ Applied Electronics/ Embedded Systems/ VLSI Design from a recognized university in First Class with 60% or above marks or equivalent.
Areas of Skill sets/ Knowledge required:
a) Knowledge in cryptology and strong background in digital system design, including project development experience in C, MATLAB, VHDL/Verilog programming. b) In-depth knowledge of front-end digital design process and related design flows (Xilinx FPGA /ASIC digital IC design). c) Candidates with prior industrial/research experience in the field of Hardware Security including Physical Unclonable Function (PUF) and Side Channel Attacks (SCA) are preferred.
Selection Procedure: Written Test and/or Interview
How to Apply?
1) Applications received via email will ONLY be considered. Candidate should write “Application for Project Associate Position” in the subject line of his/her E-mail. 2) The candidate is required to attach the Personal Particulars Form in pdf format duly filled and signed. 3) The email should be sent to hrpuf2019 (at) setsindia.net
Closing date for applications: 10 April 2019
Contact: N. Nalla Anandakumar, Scientist, SETS (Co-Principal Investigator)
More information: https://setsindia.in/careers
Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Joaquín Garcia-Alfaro, Cristina Pérez-Solà
Gembu Ito, Tetsu Iwata
In this paper, we show a polynomial time quantum distinguishing attack against the $(3d-3)$-round version, i.e., we improve the number of rounds by $(d-2)$. We also show a quantum distinguishing attack against the $(d^2-d+1)$-round version in the quantum chosen-ciphertext setting. We apply these quantum distinguishing attacks to obtain key recovery attacks against Type-1 generalized Feistel ciphers.
Alonso González, Carla Ràfols
An additional contribution of the paper is to obtain a very efficient argument for verifiable computation using the same design principles which is based on weaker assumptions. The communication is approximately 4d group elements and verifying a proof requires computing around 4d pairings and O(n+d) exponentiations, where n is the input size and d the circuit depth. While the argument for the quadratic constraints is based on standard falsifiable assumptions, the argument for the linear constraints is based on a very ad-hoc assumption about certain properties of arguments of membership in linear spaces.
Hiroki Sudo, Koji Nuida, Kana Shimizu
Pedro Branco, Paulo Mateus
Sabyasachi Dutta, Kouichi Sakurai
Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
In this paper, we give techniques to implement Gaussian sampling over general lattices without using FPA. To this end, we revisit the approach of Peikert, using perturbation sampling. Peikert's approach uses the Cholesky decomposition $\mathbb{\Sigma} = \mathbb{A} \mathbb{A}^t$ of the target covariance matrix $\mathbb{\Sigma}$, giving rise to a square matrix $\mathbb{A}$ with real (not integer) entries. Our idea, in a nutshell, is to replace this decomposition by an integral one. While there is in general no integer solution if we restrict $\mathbb{A}$ to being a square matrix, we show that such a decomposition can be efficiently found by allowing $\mathbb{A}$ to be wider (say $n \times 9n$). This can be viewed as an extension of Lagrange's four-square theorem to matrices. In addition, we adapt our integral decomposition algorithm to the ring setting: for power-of-2 cyclotomics, we can exploit the tower of rings structure for improved complexity and compactness.
Yu Chen, Xuecheng Ma
Despite strong privacy is promising, it might be overkilled or even could be abused in some cases. In particular, anonymity seems contradict to accountability, which is a crucial property for scenarios requiring disputes resolving mechanism, e.g. e-commerce.
To address the above issues, we introduce accountability to blockchain-based confidential transaction system for the first time. We first formalize a general framework of confidential transaction system with accountability from digital signature, homomorphic public-key encryption and non-interactive zero-knowledge arguments, then present a surprisingly simple and efficient realization called PGC. To avoid using general-purpose zero-knowledge proofs (such as zk-SNARK and zk-STARK), we twist the ElGamal encryption as the underlying homomorphic PKE and develop ciphertext-refreshing approach. This not only enables us to prove transaction validity/correctness by using efficient Sigma protocols and zero-knowledge range proofs, but also makes PGC largely compatible with Bitcoin and Ethereum, which could be used as a drop-in to provide confidential enforcements with accountability.
Boyu Ni, Xiaoyang Dong
In this paper, we give more improved polynomial-time quantum distinguishers on Type-1 GFS in quantum chosen-plaintext attack (qCPA) setting and quantum chosen-ciphertext attack (qCCA) setting. In qCPA setting, we give new quantum polynomial-time distinguishers on $(3d-3)$-round Type-1 GFS with branches $d\geq3$, which gain $d-2$ more rounds than the previous distinguishers. Hence, we could get better key-recovery attacks, whose time complexities gain a factor of $2^{\frac{(d-2)n}{2}}$. In qCCA setting, we get $(3d-3)$-round quantum distinguishers on Type-1 GFS, which gain $d-1$ more rounds than the previous distinguishers.
In addition, we give some quantum attacks on CAST-256 block cipher. We find 12-round and 13-round polynomial-time quantum distinguishers in qCPA and qCCA settings, respectively, while the best previous one is only 7 rounds. Hence, we could derive quantum key-recovery attack on 19-round CAST-256. While the best previous quantum key-recovery attack is on 16 rounds. When comparing our quantum attacks with classical attacks, our result also reaches 16 rounds on CAST-256 with 128-bit key under a competitive complexity.