IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
07 March 2022
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
ePrint ReportWe achieve this via a careful application of a binning approach that enables parallelizing any arbitrary PSI protocol. Building on this idea, we designed and implemented a framework that takes a pair of PSI executables (i.e., for each of the two parties) that typically works for million-sized sets, and then scales it to billion-sized sets (and beyond). For example, our framework can perform a join of billion-sized sets in 83 minutes compared to 2000 minutes of Pinkas et al. (ACM TPS 2018), an improvement of $25\times$. Furthermore, we present an end-to-end Spark application where two enterprises, each possessing private databases, can perform a restricted class of database join operations (specifically, join operations with only an on clause which is a conjunction of equality checks involving attributes from both parties, followed by a where clause which can be split into conjunctive clauses where each conjunction is a function of a single table) without revealing any data that is not part of the output.
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
ePrint ReportIn this paper, we determine what is possible in the honest majority setting without a PKI, closing a question left open by Damgård et al. We show that without a PKI, having an honest majority does not make it possible to achieve stronger security guarantees compared to the dishonest majority setting. However, if two thirds of the parties are guaranteed to be honest, identifiable abort is additionally achievable using broadcast only in the second round.
We use fundamentally different techniques from the previous works in order to avoid relying on private communication in the first round when a PKI is not available, since assuming such private channels without the availability of public encryption keys is unrealistic. We also show that, somewhat surprisingly, the availability of private channels in the first round does not enable stronger security guarantees unless the corruption threshold is one. In that case, prior work has shown that with private channels in the first round, guaranteed output delivery is always achievable; we show that without these channels, fairness is unachievable even with broadcast in both rounds, and unanimous abort is unachievable without broadcast in the second round.
Michael Amar, Amit Kama, Kang Wang, Yossi Oren
ePrint ReportA recent paper of Farha et al. suggested an entity authentication scheme suitable for low-resource IoT edge devices, which relies on SRAM-based physically unclonable functions (PUFs). In this paper we analyze this scheme. We show that, while it claims to offer strong PUF functionality, the scheme creates only a weak PUF: an active attacker can completely read out the secret PUF response of the edge device after a very small amount of queries, converting the scheme into a weak PUF scheme which can then be counterfeited easily. After analyzing the scheme, we propose an alternative construction for an authentication method based on SRAM-PUF which better protects the secret SRAM startup state.
Vadim Tsypyschev, Iliya Morgasov
ePrint ReportAnna Lysyanskaya, Leah Namisa Rosenbloom
ePrint ReportJoachim Neu, Ertem Nusret Tas, David Tse
ePrint ReportAaron Feickert, Aram Jivanyan
ePrint ReportSimin Ghesmati, Walid Fdhila, Edgar Weippl
ePrint ReportCsanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
ePrint ReportSimin Ghesmati, Walid Fdhila, Edgar Weippl
ePrint ReportVadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
ePrint ReportIn this work, we show that there is a more direct and more efficient way to prove that the coefficients of $s$ have a small $\ell_2$ norm which does not require an equivocation with the $\ell_\infty$ norm, nor any conversion to the CRT representation. We observe that the inner product between two vectors $ r$ and $s$ can be made to appear as a coefficient of a product (or sum of products) between polynomials which are functions of $r$ and $s$. Thus, by using a polynomial product proof system and hiding all but one coefficient, we are able to prove knowledge of the inner product of two vectors modulo $q$. Using a cheap, approximate range proof, one can then lift the proof to be over $\mathbb{Z}$ instead of $\mathbb{Z}_q$. Our protocols for proving short norms work over all (interesting) polynomial rings, but are particularly efficient for rings like $\mathbb{Z}[X]/(X^n+1)$ in which the function relating the inner product of vectors and polynomial products happens to be a ``nice'' automorphism.
The new proof system can be plugged into constructions of various lattice-based privacy primitives in a black-box manner. As examples, we instantiate a verifiable encryption scheme and a group signature scheme which are more than twice as compact as the previously best solutions.
06 March 2022
Nagasaki, Japan, 30 May - 3 June 2022
Event CalendarSubmission deadline: 7 March 2022
Notification: 11 March 2022
Lochau, Österreich, 4 October - 7 October 2022
Event CalendarSubmission deadline: 15 May 2022
Notification: 24 June 2022
04 March 2022
Input Output Global (IOG)
Job PostingDuties will include:
- Reviewing specifications produced by architects and formal methods specialists
- Contributing to the design of algorithms
- Bridging ideas from academic papers to production ready systems
- Implementing Cryptographic primitives in Rust and C
- Solid background in Mathematics. A degree in computer science or mathematics is desirable but not essential
- Deep understanding of Elliptic Curve Cryptography
- Familiarity with advanced cryptographic protocols (eg. Zero Knowledge Proofs, Distributed Key Generation, Threshold Signatures)
- Experience with systems programming (C/C++/Rust)
- Skilled in software development methods such as agile programming and test-driven development
- Experience in developing cryptography protocols would be a bonus, as would blockchain experience.
Closing date for applications:
Contact: Iñigo Querejeta Azurmendi
More information: https://apply.workable.com/io-global/j/EF38633ABE/
University of Southern Queensland, Australia
Job PostingClosing date for applications:
Contact: Professor Linda Galligan, Head of School (Mathematics, Physics and Computing) on +61 7 4631 2263 or HES-HoS-Sciences@usq.edu.au.
Research Institute CODE, Universität der Bundeswehr München, Germany
Job PostingA new research Privacy and Applied Cryptography (PACY) Lab formed by Prof. Mark Manulis at RI CODE is looking for several PhD/post-doc researchers to work on relevant topics such as:
- computing on encrypted data (ZKP, HE, MPC techniques)
- attribute-based cryptography (encryption & signatures)
- privacy-preserving authentication (incl. MFA, distributed)
- private messaging (e.g. key establishment, anonymity)
- privacy and applied cryptography for social web/metaverse, IoT, blockchain, or New Space
Requirements:
- Master's (or equivalent) or PhD in Computer Science, Information Security, Maths or similar
- Knowledge and understanding of privacy-oriented cryptography (theory and/or practice)
- Fluency in written and spoken English, (German desirable)
How to apply?
As a first step email Mark Manulis with subject line "Application PACY" including your cover/motivation letter, CV, and transcripts of grades. Search will continue until vacancies are filled.
Closing date for applications:
Contact: Mark Manulis (mark [AT] manulis.eu)
More information: https://www.manulis.eu/pub.html
Panther Protocol
Job PostingClosing date for applications:
Contact: Martin Raeburn
More information: https://angel.co/company/panther-protocol/jobs/1979044-cryptography-engineer
QPQ Global
Job PostingWhat do we give you?
• A stimulating, Socratic intellectual environment.
• Hybrid office approach – we have been a distributed workforce from the start. This role is centred around our European axis, so we expect you to live within +/- 3 hours of CET. We get together a complete team every quarter, so you must be willing to travel and embrace being part of a diverse team drawn from many walks of life and cultures.
• Good salary, travel expense budget and many future opportunities to participate in the company’s growth.
• The mother of all intellectual challenges!
Responsibilities.
• implement and embed in products cryptographic protocols in the privacy space.
• Working with a multi-faceted team of practitioners on a set of blockchain-based privacy protocols interacting with the DeFi space and providing compliance with financial regulations.
• Focus on zero knowledge schemes which provide privacy and compliance.
Requirements.
• MSc or multi-year experience in cryptography or a closely related field.
• Knowledge of modern cryptographic primitives.
• Be able to productize protocols/schemes/algorithms in at least one relevant programming language (C++ or Rust desirable).
• General understanding of full-stack system architecture.
• Have a thorough approach and be committed to high quality output. Have prior research/code already published in the space.
- Excellent communication and collaboration skills.
Closing date for applications:
Contact: opportunities@qpq.io
University of Amsterdam
Job PostingAre you fascinated by security? Are you willing to take on the challenge of securing the next generation of computer systems and networks? Do you like to work in a team of young researchers? We are seeking a PhD candidate who is interested in interdisciplinary research on side-channel attacks against quantum devices used in quantum networks and beyond.
Closing date for applications:
Contact: Christian Schaffner
More information: https://vacatures.uva.nl/UvA/job/PhD-Position-on-Side-Channel-Attacks-on-Quantum-Devices-Used-in-Quantum-Networks/742058802/
QuSoft / University of Amsterdam
Job PostingFull details: https://vacatures.uva.nl/UvA/job/ivi/742510202/
https://vacatures.uva.nl/UvA/job/QuSoft/742509902/
Closing date for applications:
Contact: Christian Schaffner
More information: https://www.qusoft.org/jobs/