IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 September 2021
Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
Our main contribution is the generic CTR encryption mode GCTR that makes parallel calls to an MFC to encrypt a message $M$. We analyze the set of all 36 ``simple and natural'' GCTR variants under the nivE security notion by Peyrin and Seurin from CRYPTO'16. Our proof method makes use of an intermediate abstraction called tweakable CTR (TCTR) that captures the core security properties of GCTR common to all variants, making their analyses easier. Our results show that many of the schemes achieve from well beyond birthday bound (BBB) to full $n$-bit security under nonce respecting adversaries and some even BBB and close to full $n$-bit security in the face of realistic nonce misuse conditions.
We finally present an efficiency comparison of GCTR using $\mathsf{ForkSkinny}$ (an MFC with $s=2$) with the traditional CTR and the more recent CTRT modes, both are instantiated with the $\mathsf{SKINNY}$ TBC. Our estimations show that any GCTR variant with $\mathsf{ForkSkinny}$ can achieve an efficiency advantage of over $20\%$ for moderately long messages, illustrating that the use of an efficient MFC with $s\geq 2$ brings a clear speed-up.
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
In this work, we propose SynCirc, an efficient hardware synthesis framework designed for MPC applications. Our framework is based on Verilog and the open-source tool Yosys-ABC. It provides custom libraries and new constraints that accommodate multi-input AND gates. With this, we improve over TinyGMW by up to 3x in multiplicative depth with a corresponding improvement in online round complexity. Moreover, we provide efficient realizations of several new building blocks including comparison, multiplexers, and equality check. For these building blocks, we achieve improvements in multiplicative depth/online rounds between 22.3% and 66.7%. With these improvements, our framework makes multi-round MPC better-suited for high-latency networks such as the Internet. With respect to the look-up table based approach of Dessouky et al (NDSS17), our framework improves the online communication by 1.3x - 18x.
Simon Masson, Antonio Sanso, Zhenfei Zhang
13 September 2021
SUTD, Singapore
Closing date for applications:
Contact: Prof. Jianying Zhou
11 September 2021
Fujitsu Research of America
Profile Description:
Working hours and start dates are flexible. Internship duration will be 3 to 6 months, it can be either full time or part time. The position is open to candidates based on USA, Canada, UK, EU or Japan.
Closing date for applications:
Contact: Avradip Mandal (amandalATfujitsuDOTcom)
Monash University
## Requirements:
* Ph.D. in Computer Science or Mathematics
* Strong academic background in one of the following areas:
- Blockchain
- Cryptography
- Dependability
- Fault tolerance
- Reliable broadcast
- distributed and parallel computing
- Concurrency
## Starting date: ASAP
## Salary: Approx. $92,792 --$120,093 per year (Australian dollars) plus 17% Superannuation
## Location: Monash University, Clayton, Australia.
## Eligibility: We can only consider Australian or New Zealand citizens, Australian permanent residents, or those in Australia with working rights. Chinese / Malaysian citizens can also be considered to work in Monash Suzhou campus in China / Monash Malaysia campus in Selangor.
## Applications (first-come, first-served):
Please send a copy of
1. your detailed CV
2. research statement, and
3. a copy of 2 selected publications/preprints/thesis.
Closing date for applications:
Contact: Joseph Liu
More information: https://www.monash.edu/blockchain
10 September 2021
Joppe W. Bos, Thorsten Kleinjung, Dan Page
Geoffroy Couteau, Peter Rindal, Srinivasan Raghuraman
José Carlos Bacelar Almeida, Manuel Barbosa, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
CFF features three key properties. It is contract complete, meaning that it can model any smart contract platform and all its contracts---Turing complete or otherwise. It does so with asymptotically optimal model size. It is also attack-exhaustive by construction, meaning that it can automatically and mechanically extract all possible economic attacks on users' cryptocurrency across modeled contracts. Thanks to these properties, CFF can support multiple goals: economic security analysis of contracts by developers, analysis of DeFi trading risks by users, and optimization of arbitrage opportunities by bots or miners. Because CFF offers composability, it can support these goals with reasoning over any desired set of potentially interacting smart contract models.
We instantiate CFF as an executable model for Ethereum contracts that incorporates a state-of-the-art deductive verifier. Building on previous work, we introduce extractable value (EV), a new formal notion of economic security in composed DeFi contracts that is both a basis for CFF analyses and of general interest.
We construct modular, human-readable, composable CFF models of four popular, deployed DeFi protocols in Ethereum: Uniswap, Uniswap V2, Sushiswap, and MakerDAO, representing a combined 17 billion USD in value as of August 2021. We uses these models to show experimentally that CFF is practical and can drive useful, data-based EV-based insights from real world transaction activity. Without any explicitly programmed attack strategies, CFF uncovers on average an expected $56 million of EV per month in the recent past.
Shuai Han, Shengli Liu, Dawu Gu
In this paper, we study the achievability of tight ECPA and ECCA security for KEM in the multi-user setting, and present an impossibility result and an optimal security loss factor that can be obtained. The existing meta-reduction technique due to Bader et al. (EUROCRYPT 2016) rules out some KEMs, but many well-known KEMs, e.g., Cramer-Shoup KEM (SIAM J. Comput. 2003), Kurosawa-Desmedt KEM (CRYPTO 2004), run out. To solve this problem, we develop a new technique tool named rank of KEM and a new secret key partitioning strategy for meta-reduction. With this new tool and new strategy, we prove that KEM schemes with polynomially-bounded ranks have no tight ECPA and ECCA security from non-interactive complexity assumptions, and the security loss is at least linear in the number n of users. This impossibility result covers lots of well-known KEMs, including the Cramer-Shoup KEM, Kurosawa-Desmedt KEM and many others. Moreover, we show that the linear security loss is optimal by presenting concrete KEMs with security loss Θ(n). This is justified by a non-trivial security reduction with linear loss factor from ECPA/ECCA security to the traditional multi-challenge CPA/CCA security.
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
Ward Beullens
Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
Shiping Cai, Zhi Hu, Zheng-An Yao, Chang-An Zhao
Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
Recent works by Blum, Katz and Loss [TCC'19], and Blum, Liu-Zhang and Loss [CRYPTO'20] introduced BA and MPC protocols achieving security guarantees in both settings: security up to $t_s$ corruptions in a synchronous network, and up to $t_a$ corruptions in an asynchronous network, under the provably optimal threshold trade-offs $t_a \le t_s$ and $t_a + 2t_s < n$. However, current solutions incur a high synchronous round complexity when compared to state-of-the-art purely synchronous protocols. When the network is synchronous, the round complexity of BA protocols is linear in the number of parties, and the round complexity of MPC protocols also depends linearly on the depth of the circuit to evaluate.
In this work, we provide round-efficient constructions for both primitives with optimal resilience: fixed-round and expected constant-round BA protocols, and an MPC protocol whose round complexity is independent of the circuit depth.
Robert Granger, Antoine Joux
08 September 2021
Virtual event, Anywhere on Earth, 13 September 2021
Clearmatics Technologies
Clearmatics is a protocol engineering company. We are building a new financial market architecture that is more open, fair, and resilient than the legacy systems that are in use today. We develop protocols and software that create new markets for risk and more efficient infrastructure for trading, backed by a robust and scalable blockchain network, and secured with modern cryptographic techniques and economic mechanism design.
The Research group at Clearmatics is dedicated to developing solutions to the hard problems needed to advance our mission. We are academics and protocol engineers collaborating with teams inside and outside the company to translate theoretical results into running software implementations.
RESPONSIBILITIES
- Assist in the design of cryptographic protocols
- Collaborate with your colleagues on the implementation of cryptographic primitives and protocols
- Produce technical design specifications
- Produce externally facing artefacts (e.g. blog posts, papers, documentation excerpts etc.)
- Support research colleagues in conducting their research
- Interface with the Engineering team to ease the transition of the research pieces of code into robust production software fully integrated with our stack
- Keep up with new research in the space
REQUIREMENTS
- Fluency in English (written and spoken)
- Background in applied Computer Science
- Experience with system programming (C/C++/Rust)
- Strong applied cryptography skills (experience implementing robust elliptic curve cryptography)
- Outstanding algorithmic thinking
- Strong focus on code quality/documentation and simplicity
Nice to haves
- Knowledge of Unix and bash
- Experience with constant time cryptography
- Experience with cryptography on embedded systems
- Experience with Ethereum or other blockchain projects
- Experience contributing to open-source cryptography libraries
- Experience with Python/SageMath
Closing date for applications:
Contact: https://boards.greenhouse.io/clearmatics/jobs/5326634002
More information: https://grnh.se/e40fe3cb2us