IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
04 March 2020
Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
ePrint ReportTo rectify this problem, we propose a third consensus property: transaction order-fairness. We initiate the first formal investigation of order-fairness and explain its fundamental importance. We provide several natural definitions for order-fairness and analyze the assumptions necessary to realize them.
We also propose a new class of consensus protocols called Aequitas. Aequitas protocols are the first to achieve order-fairness in addition to consistency and liveness. They can be realized in a black-box way using existing broadcast and agreement primitives (or indeed using any consensus protocol), and work in both synchronous and asynchronous network models.
Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
ePrint ReportTim Gellersen, Okan Seker, Thomas Eisenbarth
ePrint ReportThis paper introduces the first differential side channel analysis of a candidate in the competition; the Picnic Signature Scheme. We present a successful side channel analysis of the underlying Multiparty LowMc implementation and show how leakages can be exploited to recover the entire secret key using two different parts of the algorithm. LowMc key recovery then allows to forge signatures for the calling Picnic post-quantum signature scheme. We target the NIST reference implementation executed on a FRDM-K66F development board. Key recovery succeeds with less than 1000 traces, which can be obtained from less than 30 observed Picnic signatures.
Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
ePrint ReportBenoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
ePrint ReportIn this work, we develop new techniques for constructing statistical NIZK arguments. First, we construct statistical DV-NIZK arguments from the k-Lin assumption in pairing-free groups, the QR assumption, and the DCR assumption. These are the first constructions in pairing-free groups and from QR that satisfy statistical zero-knowledge. All of our constructions are secure even if the verification key is chosen maliciously (i.e., they are "malicious-designated-verifier" NIZKs), and moreover, they satisfy a "dual-mode" property where the CRS can be sampled from two computationally indistinguishable distributions: one distribution yields statistical DV-NIZK arguments while the other yields computational DV-NIZK proofs. We then show how to adapt our k-Lin construction in a pairing group to obtain new publicly-verifiable statistical NIZK arguments from pairings with a qualitatively weaker assumption than existing constructions of pairing-based statistical NIZKs.
Our constructions follow the classic paradigm of Feige, Lapidot, and Shamir (FLS). While the FLS framework has traditionally been used to construct computational (DV)-NIZK proofs, we newly show that the same framework can be leveraged to construct dual-mode (DV)-NIZKs.
Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
ePrint Report01 March 2020
Rome, Italy, 22 June - 25 June 2020
Event CalendarSubmission deadline: 25 March 2020
Notification: 25 April 2020
Simula UiB, Bergen, Norway
Job PostingClosing date for applications:
Contact: Helger Lipmaa
More information: https://www.simula.no/about/job/call-phd-student-cryptography
Announcement
The IACR board is currently monitoring the outbreak of the novel coronavirus (COVID-19) and assessing its potential impact on forthcoming IACR conferences. Although the current conference schedule has not changed, we are in close contact with the conference organizers and constantly reevaluating the situation. In case a conference needs to be postponed, relocated, cancelled, or switched to a web-only format, we will be informing the membership and attendees as soon as possible via the IACR news system and other appropriate communication channels. Publication schedules will not be altered significantly even if conferences are affected.
In the meantime, we are in the process of implementing several measures to ease the burden on attendees who cannot physically attend the conference due to travel restrictions or concerns related to the novel coronavirus outbreak. These include:
- having a more flexible cancellation and refund policy; and
- allowing alternative methods of presentation, such as pre-recorded videos.
Links:
WHO: https://www.who.int/emergencies/diseases/novel-coronavirus-2019
CDC: https://www.cdc.gov/coronavirus/2019-ncov/index.html
IACR News: https://www.iacr.org/news/
27 February 2020
Santa Barbara, USA, 15 August 2020
Event CalendarSubmission deadline: 10 May 2020
Notification: 1 July 2020
University of Canterbury, School of Mathematics and Statistics, Christchurch, New Zealand
Job PostingClosing date for applications:
Contact: Prof. Felipe Voloch
More information: http://www.math.canterbury.ac.nz/~f.voloch/prospective.html
26 February 2020
Beijing Intitute of Mathematical Sciences and Aplications, Beijing, China
Job PostingBeijing Institute of Mathematical Sciences and Applications (BIMSA) is a new research institution to be established and lead by Professor Shing-Tung Yau, a Fields medalist of 1982. Its location is in the Yanqi Lake area of Beijing where APEC 2014 was hosted. It was expected to launch by the end of March 2020.
ProgramAdvanced Cryptography and Blockchain Program will be one of the many research groups of BIMSA. It will be focused on:
- zero knowledge proofs (zk-SNARKs etc.)
- fully homomorphic encryption
- secure multiparty computation
- other related cryptographic schemes
- blockchain
with a combination of theoretical studies and practical implementations.
PositionsWe have 20 open positions on all levels, with competitive compensation packages:
- Distinguished Research Professor
- Research Professor
- Associate Research Professor
- Assistant Research Professor (tenure-track)
- Visiting Research Professor
- Research Fellowship (postdoc)
We intend to build a strong and highly international team, participating in the mainstream of academic studies and industrial innovations worldwide.
Closing date for applications:
Contact: Prof. Kevin Mo
More information: http://ymsc.tsinghua.edu.cn/en/content/show/91-275.html https://www.mathjobs.org/jobs/jobs/14633 https://www.linkedin.co
Taipei, Taiwan, 20 August - 21 August 2020
Event CalendarSubmission deadline: 24 April 2020
Notification: 29 May 2020
Granada, Spain, 25 May - 29 May 2020
Event CalendarKoç University, İstanbul, Turkey
Job PostingFor summer research opportunities (at both undergraduate and graduate level), visit
http://kusrp.ku.edu.tr
All applications must be completed online. Deadline is 29 March 2020.
For more information about joining our group and projects, visit
https://crypto.ku.edu.tr/work-with-us/
Application Requirements:
- CV
- 2 Recommendation Letters
- Official transcripts from all the universities attended
- Statement of Purpose
- Application Form filled online
Closing date for applications:
Contact: http://kusrp.ku.edu.tr
More information: http://kusrp.ku.edu.tr
Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, and Dukjae Moon
ePrint ReportWe also propose a concrete instantiation of $\mathsf{FPL}$, dubbed $\mathsf{FPL}_{\mathsf{AES}}$, using (round-reduced) $\mathsf{AES}$ for the underlying table and probe functions. Our implementation shows that $\mathsf{FPL}_{\mathsf{AES}}$ provides stronger security without significant loss of efficiency, compared to existing schemes including $\mathsf{SPACE}$, $\mathsf{WhiteBlock}$ and $\mathsf{WEM}$.
25 February 2020
Christopher Leonardi
ePrint ReportMatthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
ePrint ReportSamuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
ePrint ReportDivesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
ePrint ReportGiven the result above in the information-theoretic setting, we turn to studying two-source non-malleable extractors in the computational setting, namely in the CRS model first considered in (Garg, Kalai, Khurana, Eurocrypt 2020). We enforce that both the sampling process for the input sources and the tampering functions must be efficient, but we do not necessarily put such a constraint on the adversary distinguishing the output of the extractor from uniform. We obtain results about two-source non-malleable extractors in the CRS model under different types of hardness assumptions:
- Under standard assumptions, we show that small improvements upon state-of-the-art statistical two-source non-malleable extractors also yield explicit low-error two-source non-malleable extractors in the CRS model for low min-entropy against computationally unbounded distinguishers. Remarkably, all previous results on computational extractors require much stronger assumptions; - Under a quasi-polynomial hardness assumption, we give explicit constructions of low-error two-source non-malleable extractors in the CRS model with much lower min-entropy requirements than their best statistical counterparts, against a computationally bounded distinguisher; - Assuming the existence of nearly optimal collision-resistant hash functions, we give a simple explicit construction of a low-error two-source non-malleable extractors in the CRS model for very low min-entropy, against a computationally unbounded distinguisher.