IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
15 May 2020
Okan Seker, Sebastian Berndt, Thomas Eisenbarth
ePrint ReportIn order to remedy this situation, we extend and generalize the ZKBoo-protocol by making use of the notion of strong non-interference of Barthe et al. (CCS 2016). To apply this notion to ZKBoo, we construct novel versions of strongly non-interfering gadgets that balance the randomness across the different branches evenly. Finally, we show that each circuit can be decomposed into branches using only these balanced strongly non-interfering gadgets. This allows us to construct a version of ZKBoo, called $(n+1)$-ZKBoo secure against side-channel attacks with very limited overhead in both signature-size and running time. Furthermore, $(n+1)$-ZKBoo is scalable to the desired security against adversarial probes. We experimentally confirm that the attacks successful against ZKBoo no longer work on $(n+1)$-ZKBoo.
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
ePrint ReportYusuke Naito, Yu Sasaki, Takeshi Sugawara
ePrint ReportOur first design $\mathsf{PFB\_Plus}$ aims to break the barrier of the $3s$-bit state in TI. The block size of an underlying TBC is $s/2$ bits and the output of TBC is linearly expanded to $s$ bits. This expanded state requires only 2 shares in the first-order TI, which makes the total state size $2.5s$ bits. We also provide rigorous security proof of $\mathsf{PFB\_Plus}$. Our second design $\mathsf{PFB}\omega$ further increases a parameter $\omega$: a ratio of the security level $s$ to the block size of an underlying TBC. We prove security of $\mathsf{PFB}\omega$ for any $\omega$ under some assumptions for an underlying TBC and for parameters used to update a state. Next, we show a concrete instantiation of $\mathsf{PFB\_Plus}$ for 128-bit security. It requires a TBC with 64-bit block, 128-bit key and 128-bit tweak, while no existing TBC can support it. We design a new TBC by extending \textsf{SKINNY} and provide basic security evaluation. Finally, we give hardware benchmarks of $\mathsf{PFB\_Plus}$ in the first-order TI to show that TI of $\mathsf{PFB\_Plus}$ is smaller than that of \textsf{PFB} by more than one thousand gates and is the smallest within the schemes having 128-bit security.
13 May 2020
Cercul Militar Na?ional, Romania, 19 November - 20 November 2020
Event CalendarSubmission deadline: 20 September 2020
Notification: 25 October 2020
Rennes, France, 18 November - 19 November 2020
Event CalendarSubmission deadline: 14 June 2020
Notification: 26 July 2020
Santa Barbara, USA, -
Event CalendarSubmission deadline: 1 June 2021
Bengaluru, India, 13 December - 16 December 2020
Event CalendarSubmission deadline: 31 August 2020
Notification: 19 October 2020
12 May 2020
CHES
Different targets are proposed in parallel, both in software and in hardware, corresponding to masked implementations with various number of shares. Challengers are provided with the source code of the implementations (C in software and Verilog in hardware/FPGA), a tool to predict intermediate values of the hardware implementation, profiling sets of traces including the nonces, (random) keys, (random) plaintexts and the randomness used for masking, test sets of traces corresponding to a few fixed keys (without the masking randomness), and finally prototype attacks against a single byte of the secret key for exemplary targets.
The goal of the challenge is to modify and improve the prototype attacks. The submitted attacks will be rated based on the number of measurements needed to reduce the rank of the master key below 2^32 using a rank estimation algorithm. All the attacks submitted will be made public to all challengers (under a GPLv3 license or alternatives).
Link to the challenge website: https://ctf.spook.dev/
Inria, Paris region, France
Job PostingThe RIOT-FP project is looking for a postdoctoral research to work with Inria's GRACE team (on the campus of École poytechnique in the southern suburbs of Paris) and the PROSECCO team (in central Paris). The project aims to develop high-speed, high-security, low-memory cryptographic primitives (especially post-quantum public-key algorithms), backed by proven implementations with safety guarantees for software execution on low-end IoT devices. The real-world objective is to provide some future-proofing for RIOT OS (https:/riot-os.org), a free and open-source operating system for low-end IoT devices.
Candidates are expected to have a strong background in cryptographic algorithms, IoT software security, or formally verified software. They must have, or expect to hold, a PhD in a field related to the project; they must also have strong programming experience and mathematical skills. They should have an international research profile, and be fluent in written and spoken English.
Closing date for applications:
Contact: Benjamin Smith, at inria dot fr
Simula UiB, Bergen, Norway
Job PostingThe postdoc will have considerable freedom in selecting specific problems to work on within the larger scope of the project. One focus is the effect that side-channel attacks that do not result in full key recovery have on security, including provable security, higher up the chain. Another focus is the effect that large-scale deployment deviating from some abstract ideal has.
Simula UiB Offers
- Excellent opportunities for performing high-quality research, as part of a highly competent and motivated team of international researchers and engineers.
- An informal and inclusive international working environment
- Generous support for travel and opportunities to build international networks, through established collaboration with industry, exchange programs and research visits with other universities, and funding to attend conferences
- Modern office facilities located in downtown Bergen
- A competitive salary. Starting salary from NOK 532.300
- Numerous benefits: access to company cabin, BabyBonus arrangements, sponsored social events, generous equipment budgets (e.g., computer, phone and subscription), comprehensive travel/health insurance policy, etc
- Relocation assistance: accommodation, visas, complimentary Norwegian language courses, etc
- Administrative research support: e.g., quality assurance process for grant proposals (including RCN and EU programs)
- Wellness and work-life balance. Our employees’ health and well-being is a priority and we encourage them to make use of our flexible work arrangements to help balance their work and home lives efficiently
Closing date for applications:
Contact: Martijn Stam
More information: https://www.simula.no/about/job/call-post-doctoral-fellow-concrete-cryptography
11 May 2020
Award
- Yevgeniy Dodis, for fundamental contributions to cryptology, especially to cryptographic randomness and symmetric-key primitives, and for service to the IACR.
- Rosario Gennaro, for essential contributions, including to threshold cryptography, delegated computation, and lower bounds, and for service to the IACR.
- Xuejia Lai, for fundamental contributions to research in symmetric-key cryptography, and for service to the IACR.
- Tal Malkin, for foundational contributions, including black-box separations, multiparty computation, and tamper resilience, and for service to the IACR.
- David Naccache, for significant contributions to applied cryptography in industry and academia, and for the service to the IACR.
10 May 2020
Philippe Camacho
ePrint ReportHugo Krawczyk
ePrint ReportBeyond the theoretical interest in modeling KDFs, this work is intended to address two important and timely needs of cryptographic applications: (i) providing a single hash-based KDF design that can be standardized for use in multiple and diverse applications, and (ii) providing a conservative, yet efficient, design that exercises much care in the way it utilizes a cryptographic hash function.
(The HMAC-based scheme presented here, named HKDF, is being standardized by the IETF.)
Benjamin Dowling, Britta Hale
ePrint ReportRosario Gennaro, Steven Goldfeder
ePrint ReportHao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
ePrint Report09 May 2020
CRYPTO
As a result, CRYPTO 2020 has been converted into an all-digital event with slightly changed dates. It is now scheduled to take place online Monday-Friday, August 17-21. The conference proceedings will be published according to the original schedule.
Details about the new all-digital event, including its scientific program and registration process, will be communicated at a later time via the usual IACR channels and the conference website.
The board wishes safety and health to all our members during these challenging times.
08 May 2020
Polytechnic University hauts-De-France
Job PostingClosing date for applications:
Contact: Ihsen Alouani --email-- ihsen.alouani@uphf.fr
More information: https://www.hipeac.net/jobs/11457/postdoc-embedded-machine-learning-for-secure-lab-on-chip/
Beijing Genomics Institute, Shenzhen, China
Job Posting1. Collaborate with other biological data scientists and responsible for health data (eg. genetic data) security and privacy protection research and development. Propose new solutions based on cutting-edge security technology to meet the needs of healthcare field.
2. Follow up research on the application of cutting-edge cryptography technology, cryptographic algorithm implementation and performance optimization, such as lattice cryptography, homomorphic encryption, and zero-knowledge proof in the field of blockchain or data storage.
Qualifications
1. Master degree or above (PhD prefered) in cryptography, computer science, mathematics or related fields
2. Excellent in security fundamentals, such as digest algorithm, symmetric encryption, asymmetric encryption and signature algorithm principles and their implementation
3. Familiar with cutting-edge cryptography technologies, including secure multi-party computing, homomorphic encryption, etc .
4. Interested in healthcare big data management and privacy protection
Closing date for applications:
Contact: Dr. Yuantong Ding, dingyuantong(at)genomics.cn
Osaka University, Graduate School of Engineering, Suita-city, Japan
Job PostingClosing date for applications:
Contact: Atsuko Miyaji phone number: 06-6879-7715 E-Mail myj-comm-course@crypto-cybersec.comm.eng.osaka-u.ac.jp
More information: https://jrecin.jst.go.jp/seek/SeekJorDetail?fn=3&dt=1&id=D120030124&ln_jor=1