18 January 2021
Dominique Unruh
As an application of our technique, we show the collision-resistance of the sponge construction based on invertible permutations. In particular, this shows the collision-resistance of SHA3 (in the random oracle model).
Ştefan Maftei, Marius Supuran, Emil Simion
Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled
* Only the last round of our protocols requires knowledge of the message, and the other rounds can take place in a preprocessing stage, lending to a non-interactive threshold ECDSA protocol.
* Our protocols withstand adaptive corruption of signatories. Furthermore, they include a periodic refresh mechanism and offer full proactive security.
* Our protocols realize an ideal threshold signature functionality within the UC framework, in the global random oracle model, assuming Strong RSA, DDH, semantic security of the Paillier encryption, and a somewhat enhanced variant of existential unforgeability of ECDSA.
* Both protocols achieve accountability by identifying corrupted signatories in case of failure to generate a valid signature.
The protocols provide a tradeoff between the number of rounds to generate a signature and the computational and communication overhead for the identification of corrupted signatories. Namely:
* For one protocol, signature generation takes only 4 rounds (down from the current state of the art of 8 rounds), but the identification process requires computation and communication that is quadratic in the number of parties.
* For the other protocol, the identification process requires computation and communication that is only linear in the number of parties, but signature generation takes 7 rounds.
These properties (low latency, compatibility with cold-wallet architectures, proactive security, identifiable abort and composable security) make the two protocols ideal for threshold wallets for ECDSA-based cryptocurrencies.
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
Tamer Mour
Zhongfeng Niu
Jan Sebastian Götte, Björn Scheuermann
David W. Archer, Shahla Atapoor, Nigel P. Smart
Madalina Bolboceanu, Zvika Brakerski, Devika Sharma
It is a known fact that an unstructured lattice can be cast as an ideal-lattice in some order of a number field (and thus, in a rather trivial sense, that ideals in orders are as general as unstructured lattices). However, it is not known whether this connection can be used to imply useful hardness results for structured lattices, or alternatively new algorithmic techniques for unstructured lattices.
In this work we show that the Order-LWE problem (a generalization of the well known Ring-LWE problem) on certain orders is at least as hard as the (unstructured) LWE problem. So in general one should not hope to solve Order-LWE more efficiently than LWE. However, we only show that this connection holds in orders that are very ``skewed'' and in particular irrelevant for cryptographic applications. We then discuss the ability to embed unstructured lattices in ``friendlier'' orders, which requires devising an algorithm for computing the conductor of relevant orders. One of our technical tools is an improved hardness result for Order-LWE, closing a gap left in prior work.
Rémi Géraud-Stewart, David Naccache
The new protocol relies upon elementary number-theoretic properties and can be implemented efficiently using very few operations. This contrasts with state-of-the-art zero-knowledge protocols for RSA modulus proper generation assessment.
The heuristic argument at the end of our construction calls for further cryptanalysis by the community and is, as such, an interesting research question in its own right.
Jintai Ding, Zheng Zhang, Joshua Deaton
Joshua Deaton, Jintai Ding
Mark D. Aagaard, Nusa Zidaric
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
In this paper, we present a practically efficient gadget decomposition algorithm where output follows a subgaussian distribution. We parallelize the existing practical subgaussian gadget decomposition algorithm, using bounded uniform distribution. Our algorithm is divided into two independent subalgorithms and only one algorithm depends on input. Therefore, the other algorithm can be considered as pre-computation. As an experimental result, our algorithm performs over 50\% better than the existing algorithm.
Misni Harjo Suwito, Yoshifumi Ueshige , Kouichi Sakurai
Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
The RLWE assumption provides quantum-resistance security while in comparison with LWE assumption gives significant performance and compactness gains. In this paper we present the first IPFE scheme whose security is guaranteed relying on the RLWE assumption. The security proof requires developing two new results on ideal lattices. The first result is a variant of Ring-LWE, that we call multi-hint extended Ring-LWE, where some hints on the secret and the noise are given. We present a reduction from RLWE problem to this variant. The second tool is a special form of Leftover Hash Lemma (LHL) over rings, which we call Ring-LHL.
To demonstrate the efficiency of our scheme we provide an optimized implementation of RLWE-based IPFE scheme and show its performance on a practical use case.
Alberto Ibarrondo, Hervé Chabanne, Melek Önen
16 January 2021
Facebook Inc., Menlo Park, CA | Seattle, WA | New York, NY | San Francisco, CA
We seek Research Scientists to identify new opportunities and help build scientifically rigorous systems focused on enhancing technological guarantees for consumer privacy while simultaneously expanding the efficiency of Facebook’s market-leading advertising systems. Challenges include leveraging privacy-enhancing technologies such as multi-party computation, homomorphic encryption, federated analytics, and differential privacy to develop privacy-focused advertising solutions (private record-linkage, fraud prevention, reporting and experimentation, and collaborative inference) — all while maintaining performance at massive scale. Minimum Qualifications
Closing date for applications:
Contact: Apply Online or reach out to Benjamin Case (bmcase {at} fb DOT com) or Sanjay Saravanan
More information: https://www.facebook.com/careers/v2/jobs/121739569732425/
University College London, Department of Computer Science, London, UK
We have an open Research Fellow position at University College London, within the Information Security Research Group, to work with Professor Steven Murdoch. The Research Fellow will conduct research in the application of privacy-enhancing technologies to improve transparency of measures to prevent financial fraud and to enhance the level of consumer protection available to fraud victims.
The candidate should have (or be close to obtaining) a PhD or equivalent experience in Computer Science or a related field. Research experience in privacy-enhancing technologies, security usability, and/or payment systems is essential. A strong publication record in on or more of these fields, and experience of applied privacy-enhancing technologies is desirable.
This position is part of the REPHRAIN project (https://www.rephrain.ac.uk/), the UK National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online.
The application deadline is 27 January 2021.Closing date for applications:
Contact: Professor Steven Murdoch (s.murdoch@ucl.ac.uk)
More information: https://murdoch.is/:/rephrainjob