IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
10 September 2021
Joppe W. Bos, Thorsten Kleinjung, Dan Page
ePrint ReportGeoffroy Couteau, Peter Rindal, Srinivasan Raghuraman
ePrint ReportJosé Carlos Bacelar Almeida, Manuel Barbosa, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
ePrint ReportLinsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
ePrint ReportKushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
ePrint ReportCFF features three key properties. It is contract complete, meaning that it can model any smart contract platform and all its contracts---Turing complete or otherwise. It does so with asymptotically optimal model size. It is also attack-exhaustive by construction, meaning that it can automatically and mechanically extract all possible economic attacks on users' cryptocurrency across modeled contracts. Thanks to these properties, CFF can support multiple goals: economic security analysis of contracts by developers, analysis of DeFi trading risks by users, and optimization of arbitrage opportunities by bots or miners. Because CFF offers composability, it can support these goals with reasoning over any desired set of potentially interacting smart contract models.
We instantiate CFF as an executable model for Ethereum contracts that incorporates a state-of-the-art deductive verifier. Building on previous work, we introduce extractable value (EV), a new formal notion of economic security in composed DeFi contracts that is both a basis for CFF analyses and of general interest.
We construct modular, human-readable, composable CFF models of four popular, deployed DeFi protocols in Ethereum: Uniswap, Uniswap V2, Sushiswap, and MakerDAO, representing a combined 17 billion USD in value as of August 2021. We uses these models to show experimentally that CFF is practical and can drive useful, data-based EV-based insights from real world transaction activity. Without any explicitly programmed attack strategies, CFF uncovers on average an expected $56 million of EV per month in the recent past.
Shuai Han, Shengli Liu, Dawu Gu
ePrint ReportIn this paper, we study the achievability of tight ECPA and ECCA security for KEM in the multi-user setting, and present an impossibility result and an optimal security loss factor that can be obtained. The existing meta-reduction technique due to Bader et al. (EUROCRYPT 2016) rules out some KEMs, but many well-known KEMs, e.g., Cramer-Shoup KEM (SIAM J. Comput. 2003), Kurosawa-Desmedt KEM (CRYPTO 2004), run out. To solve this problem, we develop a new technique tool named rank of KEM and a new secret key partitioning strategy for meta-reduction. With this new tool and new strategy, we prove that KEM schemes with polynomially-bounded ranks have no tight ECPA and ECCA security from non-interactive complexity assumptions, and the security loss is at least linear in the number n of users. This impossibility result covers lots of well-known KEMs, including the Cramer-Shoup KEM, Kurosawa-Desmedt KEM and many others. Moreover, we show that the linear security loss is optimal by presenting concrete KEMs with security loss Θ(n). This is justified by a non-trivial security reduction with linear loss factor from ECPA/ECCA security to the traditional multi-challenge CPA/CCA security.
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
ePrint ReportWard Beullens
ePrint ReportSven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
ePrint ReportShiping Cai, Zhi Hu, Zheng-An Yao, Chang-An Zhao
ePrint ReportGiovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
ePrint ReportRecent works by Blum, Katz and Loss [TCC'19], and Blum, Liu-Zhang and Loss [CRYPTO'20] introduced BA and MPC protocols achieving security guarantees in both settings: security up to $t_s$ corruptions in a synchronous network, and up to $t_a$ corruptions in an asynchronous network, under the provably optimal threshold trade-offs $t_a \le t_s$ and $t_a + 2t_s < n$. However, current solutions incur a high synchronous round complexity when compared to state-of-the-art purely synchronous protocols. When the network is synchronous, the round complexity of BA protocols is linear in the number of parties, and the round complexity of MPC protocols also depends linearly on the depth of the circuit to evaluate.
In this work, we provide round-efficient constructions for both primitives with optimal resilience: fixed-round and expected constant-round BA protocols, and an MPC protocol whose round complexity is independent of the circuit depth.
Robert Granger, Antoine Joux
ePrint Report08 September 2021
Virtual event, Anywhere on Earth, 13 September 2021
Event CalendarClearmatics Technologies
Job PostingClearmatics is a protocol engineering company. We are building a new financial market architecture that is more open, fair, and resilient than the legacy systems that are in use today. We develop protocols and software that create new markets for risk and more efficient infrastructure for trading, backed by a robust and scalable blockchain network, and secured with modern cryptographic techniques and economic mechanism design.
The Research group at Clearmatics is dedicated to developing solutions to the hard problems needed to advance our mission. We are academics and protocol engineers collaborating with teams inside and outside the company to translate theoretical results into running software implementations.
RESPONSIBILITIES
- Assist in the design of cryptographic protocols
- Collaborate with your colleagues on the implementation of cryptographic primitives and protocols
- Produce technical design specifications
- Produce externally facing artefacts (e.g. blog posts, papers, documentation excerpts etc.)
- Support research colleagues in conducting their research
- Interface with the Engineering team to ease the transition of the research pieces of code into robust production software fully integrated with our stack
- Keep up with new research in the space
REQUIREMENTS
- Fluency in English (written and spoken)
- Background in applied Computer Science
- Experience with system programming (C/C++/Rust)
- Strong applied cryptography skills (experience implementing robust elliptic curve cryptography)
- Outstanding algorithmic thinking
- Strong focus on code quality/documentation and simplicity
Nice to haves
- Knowledge of Unix and bash
- Experience with constant time cryptography
- Experience with cryptography on embedded systems
- Experience with Ethereum or other blockchain projects
- Experience contributing to open-source cryptography libraries
- Experience with Python/SageMath
Closing date for applications:
Contact: https://boards.greenhouse.io/clearmatics/jobs/5326634002
More information: https://grnh.se/e40fe3cb2us
Seoul National University of Science and Technology, Seoul, Korea
Job PostingCurrent Research Directions:
Current Research Directions:
Appointment term: 1 year commitment to postdoctoral training is expected (can be extended depending on performance).
Appointment start date: September 2021
Required Application Materials:
Closing date for applications:
Contact: Interested candidates should email their application materials to professor Changhoon Lee (chlee@seoultech.ac.kr).
More information: https://cis.seoultech.ac.kr/index.do
Advanced Blockchain
Job PostingClosing date for applications:
Contact: Martina Burghi (martina@advancedblockchain.com)
More information: https://incredulous.bamboohr.com/jobs/view.php?id=36