IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
01 July 2021
Danilo Gligoroski
ePrint ReportHowever, we find that claims for the general applicability of his attack on the general Entropoid framework are misleading. Namely, based on the Theorem 1 in his report, which claims that for every entropic quasigroup $(G, *)$, there exists an Abelian group $(G, \cdot)$, commuting automorphisms $\sigma$, $\tau$ of $(G, \cdot)$, and an element $c \in G$, such that $x * y = \sigma(x) \cdot \tau(y) \cdot c$ the author infers that \emph{"all instantiations of the entropoid framework should be breakable in polynomial time on a quantum computer."}
There are two misleading parts in these claim: \textbf{1.} It is implicitly assumed that all instantiations of the entropoid framework would define entropic quasigroups - thus fall within the range of algebraic objects addressed by Theorem 1. \emph{We will show a construction of entropic groupoids that are not quasigroups}; \textbf{2.} It is implicitly assumed that finding the group $(G, \cdot)$, the commuting automorphisms $\sigma$ and $\tau$ and the constant $c$ \emph{would be easy for every given entropic operation} $*$ and its underlying groupoid $(G, *)$. However, the provable existence of a mathematical object \emph{does not guarantee an easy finding} of that object.
Treating the original entropic operation $* := *_1$ as a one-dimensional entropic operation, we construct multidimensional entropic operations $* := *_m$, for $m\geq 2$ and we show that newly constructed operations do not have the properties of $* = *_1$ that led to the recovery of the automorphism $\sigma$, the commutative operation $\cdot$ and the linear isomorphism $\iota$ and its inverse $\iota^{-1}$.
We give proof-of-concept implementations in SageMath 9.2 for the new multidimensional entropic operations $* := *_m$ defined over several basic operations $* := *_1$ and we show how the non-associative and non-commutative exponentiation works for the key exchange and digital signature schemes originally proposed in report 2021/469.
Willy Quach, Brent Waters, Daniel Wichs
ePrint Report-Pseudo-entropy functions from one-way functions.
-Deterministic leakage-resilient message-authentication codes and improved leakage-resilient symmetric-key encryption from one-way functions.
-Extractors for extractor-dependent sources from one-way functions.
-Selective-opening secure symmetric-key encryption from one-way functions.
-A new construction of CCA PKE from (exponentially secure) trapdoor functions and injective pseudorandom generators.
We also discuss a fascinating connection to distributed point functions.
Nigel P. Smart, Emmanuel Thome
ePrint ReportAlexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert
ePrint ReportIn this demo, we show how these vulnerabilities are efficiently exploitable via Wi-Fi and physical proximity to a target. Privacy and security implications include the possibility of conducting advanced spear phishing attacks or deploying multiple "collector" devices in order to build databases that map contact identifiers to specific locations. For our proof-of-concept, we leverage a custom rainbow table construction to reverse SHA-256 hashes of phone numbers in a matter of milliseconds. We discuss the trade-off between success rate and storage requirements of the rainbow table and, after following responsible disclosure with Apple, we publish our proof-of-concept implementation as "AirCollect" on GitHub.
29 June 2021
Riverside Research
Job PostingClosing date for applications:
Contact: Michael Costanzo
More information: https://boards.greenhouse.io/riversideresearch/jobs/4572209003
Technical University of Darmstadt, Department of Computer Science, Germany
Job PostingThe Telecooperation Lab [TK] (Prof. Dr. Mühlhäuser) at Technical University of Darmstadt is seeking candidates for a Postdoctoral position, preferably in the area of network security, esp. botnet defense. Experts in user-centric security & privacy or quantification of security will also be considered. The contract is initially limited to two years and can be extended.
What we offer:- Highly innovative research, especially within the framework of our participation in the National Research Center for Applied Cybersecurity ATHENE
- Perfection of your research skills using stringent scientific methods
- Independent research as well as research in a team of excellent doctoral and master candidates
- Excellent support for further academic qualification (habilitation, independent young researcher)
- Manifold support to present your research at top international conferences and leading journals
- Exceptional team spirit and cordial working atmosphere in an international team
- Exposure to cutting-edge research and to an international community of peers
- Appetite for cutting-edge international research and interest to shape the future cybersecurity
- Completed PhD with excellent research record and deep knowledge in cybersecurity & privacy, preferably in one of the above focus areas
- Experience in writing and publishing scientific work in flagship conferences and journals
- Strong interpersonal skills and proven teamwork competencies
- High level of intrinsic motivation and demonstrated ability to perform targeted independent work
- Master's level knowledge in computer networks and preferably in artificial intelligence
- Excellent command of English and preferably good command of German
The Technische Universität Darmstadt intends to increase the number of female employees and encourages female candidates to apply. In case of equal qualifications applicants with a degree of disability of at least 50 or equal will be given pre
Closing date for applications:
Contact: Rolf Egert, egert at tk dot tu-darmstadt dot de
More information: https://www.tu-darmstadt.de/universitaet/karriere_an_der_tu/stellenangebote/aktuelle_stellenangebote/stellenausschreibungen_detailansichten_1_417536.en.jsp
Technical University of Darmstadt, Department of Computer Science, Germany
Job PostingTU Darmstadt is a world leading research institute for cybersecurity and privacy protection. The position, funded by the German Research Foundation (DFG), is embedded in a highly interdisciplinary Research Training Group and enables close scientific cooperation between computer science, business informatics, law, psychology/usability and sociology.
What we offer:- Highly innovative research in Darmstadt's top cybersecurity research cluster
- Acquisition of high-class research skills based on stringent scientific methods
- Research in the interdisciplinary PAT team with more than 30 PhD students, postdocs, and professors
- Excellent supervision and qualification concept for an expeditious and outstanding doctoral degree
- Manifold support to present your research at top international conferences and in leading journals
- Exceptional team spirit and cordial working atmosphere in an international team
- Exposure to cutting-edge research and to an international community of peers
- Ambition for cutting-edge international research and interest in interdisciplinary research challenges
- A very good Master’s degree and deep knowledge in cybersecurity as well as privacy protection
- Complementary knowledge in the areas of computer networks and artificial intelligence
- Initial experience in scientific work and publishing
- Strong social competence and verifiable teamwork skills
- High level of intrinsic motivation and demonstrated ability to perform targeted independent work
- Excellent command of English and preferably good command of German
The Technische Universität Darmstadt intends to increase the number of female employees and encourages female candidates to apply. In case of equal qualifications applicants with a degree of disability of at least 50 or equal will be given preference.
Closing date for applications:
Contact: Dr. Ephraim Zimmer, zimmer at privacy-trust dot tu-darmstadt dot de
More information: https://www.tu-darmstadt.de/universitaet/karriere_an_der_tu/stellenangebote/aktuelle_stellenangebote/stellenausschreibungen_detailansichten_1_417600.en.jsp
Virtual event, Anywhere on Earth, 29 November - 30 November 2021
Event CalendarSubmission deadline: 23 August 2021
Notification: 4 October 2021
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
ePrint ReportMark Zhandry
ePrint ReportWe observe that, in some settings, such black box tracing leads to consistency and user privacy issues. On the other hand, these issues do not appear inherent to white box tracing, where the tracing algorithm actually inspects the decoder implementation. We therefore develop new white box traitor tracing schemes providing consistency and/or privacy. Our schemes can be instantiated under various assumptions ranging from public key encryption and NIZKs to indistinguishability obfuscation, with different trade-offs. To the best of our knowledge, ours is the first work to consider white box tracing in the general decoder setting.
Yanyi Liu, Rafael Pass
ePrint ReportOur results are insipired by, and generalize, the recent elegant paper by Ilango, Ren and Santhanam (ECCC'21), which presents similar characterizations for concrete sparse languages.
Sam Hopkins, Aayush Jain, Huijia Lin
ePrint ReportNgoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
ePrint ReportJanaka Alawatugoda, Taechan Kim
ePrint ReportIn this paper, we present a pairing-based eCK-secure AKE protocol in the standard model. The underlying assumptions of our construction are the hardness of the decisional bilinear Diffie-Hellman (DBDH) problem and the existence of pseudorandom functions. It is notable that the previous constructions either relied their security on random oracles or used somewhat strong assumptions such as the existence of strong-pseudorandom functions. We believe our construction is well-suited for real-world implementations such as the TLS protocol suite since our construction is simple and based on standard assumptions without random oracles.
Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
ePrint ReportMPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
ePrint ReportWe make the following contributions. (Candidates). We propose new designs of symmetric primitives based on alternating moduli. These include candidate one-way functions, pseudorandom generators, and weak pseudorandom functions. We propose concrete parameters based on cryptanalysis.
(Protocols). We provide a unified approach for securely evaluating modulus-alternating primitives in different MPC models. For the original candidate of Boneh et al., our protocols obtain at least 2x improvement in all performance measures. We report efficiency benchmarks of an optimized implementation.
(Applications). We showcase the usefulness of our candidates for a variety of applications. This includes short "Picnic-style" signature schemes, as well as protocols for oblivious pseudorandom functions, hierarchical key derivation, and distributed key generation for function secret sharing.
Elias Rohrer, Florian Tschorsch
ePrint ReportGayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
ePrint ReportWe initiate the formal study of oblivious key-value stores, and show new constructions resulting in the fastest OKVS to date.
Similarly to cuckoo hashing, current analysis techniques are insufficient for finding {\em concrete} parameters to guarantee a small failure probability for our OKVS constructions. Moreover, it would cost too much to run experiments to validate a small upper bound on the failure probability. We therefore show novel techniques to amplify an OKVS construction which has a failure probability $p$, to an OKVS with a similar overhead and failure probability $p^c$. Setting $p$ to be moderately small enables to validate it by running a relatively small number of $O(1/p)$ experiments. This validates a $p^c$ failure probability for the amplified OKVS.
Finally, we describe how OKVS can significantly improve the state of the art of essentially all variants of PSI. This leads to the fastest two-party PSI protocols to date, for both the semi-honest and the malicious settings. Specifically, in networks with moderate bandwidth (e.g., 30 - 300 Mbps) our malicious two-party PSI protocol has 40\% less communication and is 20-40\% faster than the previous state of the art protocol, even though the latter only has heuristic confidence.
Hemanta K. Maji, Mingyuan Wang
ePrint ReportIn the information-theoretic plain model, as in two-party zero-sum games, one of the parties can force an output with certainty. In the commitment-hybrid, any $r$-message coin-tossing protocol is ${1/\sqrt r}$-unfair, i.e., the adversary can change the honest party's output distribution by $1/\sqrt r$ in the statistical distance. Moran, Naor, and Segev (TCC--2009) constructed the first $1/r$-unfair protocol in the oblivious transfer-hybrid. No further security improvement is possible because Cleve (STOC--1986) proved that $1/r$-unfairness is unavoidable. Therefore, Moran, Naor, and Segev's coin-tossing protocol is optimal. However, is oblivious transfer necessary for optimal fair coin-tossing?
Maji and Wang (CRYPTO--2020) proved that any coin-tossing protocol using one-way functions in a black-box manner is at least $1/\sqrt r$-unfair. That is, optimal fair coin-tossing is impossible in Minicrypt. Our work focuses on tightly characterizing the hardness of computation assumption necessary and sufficient for optimal fair coin-tossing within Cryptomania, outside Minicrypt. Haitner, Makriyannia, Nissim, Omri, Shaltiel, and Silbak (FOCS--2018 and TCC--2018) proved that better than $1/\sqrt r$-unfairness, for any constant $r$, implies the existence of a key-agreement protocol.
We prove that any coin-tossing protocol using public-key encryption (or, multi-round key agreement protocols) in a black-box manner must be $1/\sqrt r$-unfair. Next, our work entirely characterizes the additional power of secure function evaluation functionalities for optimal fair coin-tossing. We augment the model with an idealized secure function evaluation of $f$, \aka, the $f$-hybrid. If $f$ is complete, that is, oblivious transfer is possible in the $f$-hybrid, then optimal fair coin-tossing is also possible in the $f$-hybrid. On the other hand, if $f$ is not complete, then a coin-tossing protocol using public-key encryption in a black-box manner in the $f$-hybrid is at least $1/\sqrt r$-unfair.