IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 May 2022
Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
ePrint ReportBoris Ryabko
ePrint Reportkeywords: Information Theory, entropy security, indistinguishability, symmetric encryption scheme, unconditionally secure, Markov chain, unknown statistics.
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
ePrint ReportMarloes Venema, Greg Alpár
ePrint ReportIn this work, we propose TinyABE: a novel CP-ABE scheme that is expressive and can be configured to be efficient enough for settings with embedded devices and low-quality networks. In particular, we demonstrate that our scheme can be configured such that the ciphertexts are small, encryption is fast and the master public key is small enough to fit in memory. From a theoretical standpoint, the new scheme and its security proof are non-trivial generalizations of the expressive scheme with constant-size ciphertexts by Agrawal and Chase (TCC'16, Eurocrypt'17) and its proof to the unbounded setting. By using techniques of Rouselakis and Waters (CCS'13), we remove the restrictions that the Agrawal-Chase scheme imposes on the keys and ciphertexts, making it thus more flexible. In this way, TinyABE is especially suitable for IoT.
Virtual event, Anywhere on Earth, 10 October - 12 October 2022
Event CalendarSubmission deadline: 1 June 2022
Notification: 20 July 2022
Virtual event, Anywhere on Earth, 29 October - 30 October 2022
Event CalendarSubmission deadline: 20 June 2022
Notification: 30 August 2022
Seoul, South Korea, 30 November - 2 December 2022
Event CalendarCopenhagen, Denmark, 29 September - 30 September 2022
Event CalendarSubmission deadline: 15 July 2022
Notification: 25 August 2022
11 May 2022
University of Applied Sciences Würzburg-Schweinfurt
Job PostingEnglish - Announcement: https://www.fhws.de/forschung/institute/idee/center/cairo/karriere/
(on the main page at the bottom - W2 Professorship in Mathematical Foundations of Trustful Learning)
Key topics:
German - Announcement: https://stellen.fhws.de/jobposting/4a106eca93f4beee3be7c5c127aa6064c679fbc20?ref=homepage
(Please apply via the provided link to our online application system)
The positions are research professorships
(German W2 level, well paid and tenured life long positions) and will establish a center for AI (CAIRO) in Wuerzburg
Additional funding to establish a group is also available.
This is an exciting moment and chance.
The positions are located here in Wuerzburg and the teaching will be (so far) in English only (it may be necessary to learn some German in the first two years).
To be eligible it is mandatory to have 5 years working experience after MSc including at least 3 years of industrial experience (can be spread and industry related research (institutes) also count).
Closing date for applications:
Contact:
Prof. Dr. Frank-Michael Schleif
frank-michael.schleif@fhws.deMore information: https://www.fhws.de/forschung/institute/idee/center/cairo/karriere/
Huawei German Research Center, Munich
Job PostingTo support our research activities, we are looking for an enthusiastic and highly motivated PhD student Security &Trust - Connected, Cooperative, Automated Mobility (m/f/d)
Research Topic
- Perform research and develop new solutions for Trust Management in the Next-Generation CCAM technologies.
- Contribute to new mechanisms for assessing dynamic trust relationship based on Zero Trust and Subjective Logic.
- Define a trust model and trust reasoning framework based on which involved entities can establish trust for cooperatively executing safety-critical functions.
- Contribute to the research and development of technologies in the upcoming domain of Connected, Cooperative and Automated Mobility (CCAM).
- Being involved in international initiatives including industry groups such as 5GAA, Gaia-X, DIF and Horizon Europe research projects.
- Completed master studies (or equivalent) in computer science, information technology, electrical engineering, or mathematics;
- Exposure and understanding of data protection and security development technologies;
- Good programming skill;
- Must be eligible to work in the European Union to be considered for this position;
- Fluent in English;
Closing date for applications:
Contact: Ioannis Krontiris
More information: https://huaweiresearchcentergermanyaustria.teamtailor.com/jobs/1732783-phd-student-security-trust-connected-cooperative-automated-mobility-m-f-d
Radboud University, Nijmegen, The Netherlands
Job PostingThe Digital Security Group of Radboud University is one of the leading groups in computer security in The Netherlands and Europe, and one of the pioneers in permutation-based crypto and corresponding leakage-resilient modes.
The successful candidate should ideally have a master in Computer Science, Mathematics, or Electrical engineering. Familiarity with symmetric cryptography is required. Applications will be considered until the positions are filled.
Closing date for applications:
Contact: To apply, please send the following documents to b.mennink (at) cs.ru.nl, with the subject "PhD position in cryptography":
- a motivation letter
- your cv
- your master diploma certificate (scanned)
- transcript of the courses you took (including grades)
- up to 3 references
10 May 2022
Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
ePrint ReportMichele Fabbrini
ePrint ReportChenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
ePrint ReportRoderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, Robert Primas
ePrint ReportWe solve this problem in two steps. First, we introduce a contract layer between the (CPU) hardware and the software that allows the specification of microarchitectural side-effects on masked software in an intuitive language. Second, we present a method for proving the correspondence between contracts and CPU netlists to ensure the completeness of the specified leakage models. Then, any further security proofs only need to happen between software and contract, which brings benefits such as reduced verification runtime, improved user experience, and the possibility of working with vendor-supplied contracts of CPUs whose design is not available on netlist-level due to IP restrictions. We apply our approach to the popular RISC-V IBEX core, provide a corresponding formally verified contract, and describe how this contract could be used to verify masked software implementations.
Christopher van der Beets, Raine Nieminen, Thomas Schneider
ePrint ReportIn this work we present FAPRIL, a privacy-preserving indoor localization scheme, which takes advantage of the latest secure two-party computation protocol improvements. We can split our scheme into two parts: an input independent setup phase and an online phase. We concentrate on optimizing the online phase for mobile clients who run on a mobile data plan and observe that recurring operands allow to optimize the total communication overhead even further. Our observation can be generalized, e.g., to improve multiplication of Arithmetic secret shared matrices. We implement FAPRIL on mobile devices and our benchmarks over a simulated LTE network show that the online phase of a private localization takes under 0.15 seconds with less than 0.20 megabytes of communication even for large buildings. The setup phase, which can be pre-computed, depends heavily on the setting but stays in the range 0.28 - 4.14 seconds and 0.69 - 16.00 megabytes per localization query. The round complexity of FAPRIL is constant for both phases.
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
ePrint ReportSarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
ePrint ReportShivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
ePrint ReportKasper Green Larsen, Maciej Obremski, Mark Simkin
ePrint ReportWe present and analyze a protocol that solves this problem with essentially optimal shuffling complexity. As an exemplary data point, our protocol can shuffle a list of length $n$ with shuffles of size $k$, where $k \in \Omega(\lg^2 n)$, in the presence of an adversary that can corrupt $4n/5$ many shufflers in each round and can corrupt $4n/5$ commitments in the input vector. Our $m$-party shuffling protocol with $m \in \Omega(n/k)$ terminates in $\mathcal{O}(\lg n)$ rounds. We provide numerical benchmarks that validate our theoretically proven guarantees and in fact show that the number of rounds is not just theoretically, but also concretely small.
Our shuffling protocol can either improve efficiency or lead to more secure solutions in multiple research domains, such as the design of mix-nets, single secret leader election protocols, and electronic voting.