IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
13 April 2019
Léo Perrin
We also suggest a simple fix: adding a 32-bit rotation in one tap prevents this issue.
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Aram Jivanyan
Inspired by the Zerocoin protocol, Lelantus extends the original Zerocoin functionality to support confidential transactions while also significantly improving on the protocol performance. Lelantus proof sizes are almost 17 times smaller compared to the original Zerocoin proof sizes. Moreover, we show how to support efficient aggregation of the transaction proofs, so that the proof verification, while asymptotically linear, is very efficient in practice.
Lelantus builds on the techniques of Confidential Transactions, Zerocoin and One-out-of-Many proofs and its efficiency is particularly well-suited for enabling private blockchain transactions with minimal trust required while employing well-studied cryptographic assumptions.
12 April 2019
PKC is the International Conference on Practice and Theory in Public Key Cryptography, which was founded in 1998 and became an official IACR event in 2003. The new Test-of-Time award recognizes outstanding papers, published in PKC about 15 years ago, making a significant contribution to the theory and practice of public key cryptography, preferably with influence either on foundations or on the practice of the field.
The inaugural award will be given next week at PKC 2019 in Beijing, for papers published in the conference's initial years of early 2000s and late 1990s. In the first few years a number of papers from a few different initial years of PKC can be recognized. Thereafter, the award will typically recognize one year at a time with one or two papers.
The recipients of the 2019 award are:
- How to Enhance the Security of Public-Key Encryption at Minimum Cost by Eiichiro Fujisaki, and Tatsuaki Okamoto, PKC 1999.
- Selecting Cryptographic key Sizes by Arjen K. Lenstra and Eric R. Verheul, PKC 2000 (later Journal of Cryptography 2000).
- The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes by Tatsuaki Okamoto, and David Pointcheval, PKC 2001.
10 April 2019
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Xueli Wang , Yu Chen , Xuecheng Ma
Mark Zhandry, Cong Zhang
Marco Calderini
Alex Davidson, Amit Deo, Ela Lee, Keith Martin
Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
09 April 2019
Rotem Tsabary
In this work we construct for the first time a lattice-based (ciphertext-policy) ABE scheme for the function class $t$-CNF, which consists of CNF formulas where each clause depends on at most $t$ bits of the input, for any constant $t$. This class includes NP-verification policies, bit-fixing policies and $t$-threshold policies. Towards this goal we also construct a fully secure single-key constrained PRF from OWF for the same function class, which might be of independent interest.
Benedikt Auerbach, Federico Giacon, Eike Kiltz
For Hashed ElGamal over elliptic curves, we use the generic group model to argue that the scaling factor depends on the scheme's granularity. In low granularity, meaning each public key contains its independent group parameter, the scheme has optimal scaling factor $\mathrm{SF}=m$; In medium and high granularity, meaning all public keys share the same group parameter, the scheme still has a reasonable scaling factor $\mathrm{SF}=\sqrt{m}$. Our findings underline that instantiating ElGamal over elliptic curves should be preferred to finite fields in a multi-instance scenario.
As our main technical contribution, we derive new generic-group lower bounds of $\Omega(\sqrt{m p})$ on the difficulty of solving both the $m$-out-of-$n$ Gap Discrete Logarithm and the $m$-out-of-$n$ Gap Computational Diffie-Hellman problem over groups of prime order $p$, extending a recent result by Yun (EUROCRYPT 2015). We establish the lower bound by studying the hardness of a related computational problem which we call the search-by-hypersurface problem.
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
Alisa Chernyaeva, Ilya Shirobokov, Alexander Davydov
Anat Paskin-Chernivasky, Artiom Radune
We initiate a systematic study of polynomial secret sharing schemes, where shares are (multi-variate polynomials) of secret and randomness vectors over some finite field. Our main hope is that the nice algebraic structure of polynomials would help obtain better lower bounds than those known for the general setting, extending over the class of multi-linear schemes.
Some of the concrete new results we prove in this work are as follows.\\ \textbf{On share complexity of polynomial schemes.}\\ First we studied degree 1 in randomness (where the degree of secret is unlimited). We have shown that a large subclass of these schemes are equivalent to multi-linear schemes, in the sense that for any such scheme, there exists an equivalent multi-linear scheme with very similar share complexity. Also, we have shown that the class of schemes of polynomials of degree exactly 2 in r, without degree 1 in r monomials, is very weak, and can implement only trivial access structures where the minterms consist of single parties.\\ Another observation we make refers to the share complexity (per bit) of multi linear schemes (polynomial schemes of total degree 1). We observe that the scheme by Liu et. al obtaining share complexity $O(2^{0.994n})$ can be transformed into a multi-linear scheme with similar share complexity per bit, for sufficiently long secrets. It is interesting to check, whether similar ideas could be applied to the recent improvement of Beimel et al. with share complexity $O(2^{0.862n})$ for general schemes, transforming it into a . \textbf{On the randomness complexity of polynomial schemes.}\\ We prove that for every degree 2 polynomial secret sharing scheme, there exists an equivalent degree-2 scheme with identical share complexity with randomness complexity bounded by $O(2^{2^n})$. For general polynomial secret sharing schemes, randomness complexity can be bounded by $SC^{O(SC)^2}$, where $SC$ is the share complexity of the original scheme. So far, bounds on randomness complexity were known only for multi linear schemes, demonstrating that $RC \leq SC$ is always achievable. Our bounds are not nearly as practical, and may be viewed as a proof of concept. One nice application of low (say polynomial) randomness complexity is transforming polynomial schemes with polynomial (in $n$) algebraic formulas $C(s,r)$, into a degree-3 scheme with only polynomial blowup in share complexity (using standard randomizing polynomials constructions).
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
Our secure protocols utilize a combination of additively-homomorphic encryption, garbled circuit and Oblivious RAM. Along the way, we introduce various optimizations to these primitives, which drastically improve concrete efficiency.
We evaluate the new protocols empirically and show that they are able to handle datasets that are significantly larger than in the prior work. For instance, running on two standard Azure instances within the same availability zone, for a dataset of 96 dimensional descriptors of 10000000 images, we can find 10 nearest neighbors with average accuracy 0.9 in under 10 seconds improving upon prior work by at least two orders of magnitude.
Leo Weissbart, Stjepan Picek, Lejla Batina
Núria Costa, Ramiro Martínez, Paz Morillo
University of York (UK)
Research supervision
If successful, you will conduct your research under the supervision of the Chair of Cyber Security Professor Delaram Kahrobaei: https://sites.google.com/a/nyu.edu/delaram-kahrobaei/ at University of York; and Director of York Interdisciplinary Centre for Cyber Security www.cs.york.ac.uk/security
Award funding
If successful, you will be supported for three years. Funding includes:
- £14,777 (2018/19 rate) per year stipend
- Home/EU tuition fees
- RTSG (training/consumables/travel) provision
Funding requirements
To be considered for this funding you must:
- meet the entrance requirements for a PhD in Computer Science
- be eligible to pay home/EU fees
We will look favourably on applicants that can demonstrate knowledge of cryptography, algebra, quantum computation, and who have strong programming and mathematical skills.
Apply for this studentship
1. Apply to study
- You must apply online for a full-time PhD in Computer Science.
- You must quote the project title Post-Quantum Cryptography in your application.
- There is no need to write a full formal research proposal (2,000-3,000 words) in your application to study as this studentship is for a specific project.
2. Provide a personal statement. As part of your application please provide a personal statement of 500-1,000 words with your initial thoughts on the research topic.
Deadlines
Applications are accepted all year round.
The start date for the studentship is flexible.
Project enquiries
Professor Delaram Kahrobaei, Chair of Cyber Security (delaram.kahrobaei (at) york.ac.uk):
https://sites.google.com/a/nyu.edu/delaram-kahrobaei/
Application enquiries
cs-pg-admissions (at) york.ac.uk
+44 (0)1904 325404
Closing date for applications: 24 July 2019
Contact: Professor Delaram Kahrobaei, Chair of Cyber Security
https://sites.google.com/a/nyu.edu/delaram-kahrobaei/
Director of York Interdisciplinary Centre for Cyber Security www.cs.york.ac.uk/security
More information: https://www.findaphd.com/phds/project/post-quantum-cryptography/?p104181