IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
23 December 2019
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
In this work, we improve upon the work of PASTA and propose a distributed SSO protocol with proactive and adaptive security (PESTO), guaranteeing security as long as not all servers are compromised at the same time. We prove our scheme secure in the UC framework which is known to provide the best security guarantees for password-based primitives. %as it avoids any unrealistic assumption on password distributions. The core of our protocol are two new primitives we introduce: partially-oblivious distributed PRFs and a class of distributed signature schemes. Both allow for non-interactive refreshs of the secret key material and tolerate adaptive corruptions. We give secure instantiations based on the gap one-more BDH and RSA assumption respectively, leading to a highly efficient 2-round PESTO protocol. We also present an implementation and benchmark of our scheme in Java, realizing OAuth-compatible bearer tokens for SSO, demonstrating the viability of our approach.
Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
In this paper, we give a new way to overcome this problem by introducing a generalized notion of NTRU lattices which we call \emph{Module-NTRU}~(MNTRU) lattices, and show how to efficiently generate a trapdoor over MNTRU lattices. Moreover, beyond giving parameter flexibility, we further show that the Gram-Schmidt norm of the trapdoor can be reached to about $q^{1/d},$ where MNTRU covers $d \ge 2$ cases while including NTRU as $d = 2$ case. Since the efficiency of trapdoor-based IBE is closely related to the Gram-Schmidt norm of trapdoor, our trapdoor over MNTRU lattice brings more efficient IBE scheme than the previously best one of Ducas, Lyubashevsky and Prest, while providing the same security level.
Andrew M. K. Nassief
Edward Eaton, Fang Song
22 December 2019
Kyiv, Ukraine, 1 May - 22 May 2020
Submission deadline: 22 February 2020
20 December 2019
University of Wollongong
Closing date for applications:
Contact: Professor Willy Susilo
More information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=191851&tz=GMT%2B11%3A00&tzname=Australia%2FSydney
University of Wollongong
Closing date for applications:
Contact: Professor Willy Susilo
More information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=191859&tz=GMT%2B11%3A00&tzname=Australia%2FSydney
University of Wollongong
Closing date for applications:
Contact: Willy Susilo
More information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=191858&tz=GMT%2B11%3A00&tzname=Australia%2FSydney
19 December 2019
Paris, France, 8 July - 10 July 2020
Submission deadline: 14 February 2020
Notification: 15 April 2020
18 December 2019
Daniel R. L. Brown
The estimates also suggest somewhat better security assurance from compounding two independent cryptosystems, but perhaps not enough to outweigh the extra cost.
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
We present constructions of ZAPs and NIWI for AM from Minicrypt and worst-case assumptions. We also present (a form of) NIZK with uniform soundness for NP, from Minicrypt and worst-case assumptions. We present analogous fine-grained constructions of all of the above, where the zero- knowledge adversary is limited to NC1. Specifically, we achieve fine-grained ZAPs and NIWI for NP from worst-case assumptions only and achieve a form of fine-grained NIZK with uniform soundness for NP from worst-case and Minicrypt assumptions.
Amin Rezaei, Yuanqi Shen, Hai Zhou
Sigurd Eskeland
Morteza Adeli, Nasour Bagheri
Yongge Wang
Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
Moni Naor, Lior Rotem, Gil Segev
Equipped with our immediate key delivery property, we formalize strong notions of security for out-of-band authenticated group key exchange, and demonstrate that the existing protocols either do not satisfy our notions of security or are impractical (these include, in particular, the protocols deployed by Telegram, Signal and WhatsApp). Then, based on the existence of any passively-secure key-exchange protocol (e.g., the Diffie-Hellman protocol), we construct an out-of-band authenticated group key-exchange protocol satisfying our notions of security. Our protocol is inspired by techniques that have been developed in the context of fair string sampling in order to minimize the effect of adversarial aborts, and offers the optimal tradeoff between the length of its out-of-band value and its security.