IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 May 2022
Xuting Zhou, Tianshuo Cong
ePrint ReportAkira Ito, Rei Ueno, Naofumi Homma
ePrint ReportCharles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
ePrint ReportGowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
ePrint ReportIn this paper, we present a generic protocol for the secure computation of comparison-based functions. In order to scale to a large number of participants, we propose this protocol in a star topology with an aim to reduce the communication complexity. We also present a protocol for one specific comparison-based function, the $k^{th}$ ranked element. The construction of one of our protocols leaks some intermediate values but does not reveal information about an individual party's inputs. We demonstrate that our protocol offers better performance than the protocol for $k^{th}$ ranked element by Tueno et. al. (FC'20) by providing an implementation.
Tyler Beauregard, Janabel Xia, Mike Rosulek
ePrint ReportIlia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
ePrint ReportBoris Ryabko
ePrint Reportkeywords: Information Theory, entropy security, indistinguishability, symmetric encryption scheme, unconditionally secure, Markov chain, unknown statistics.
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
ePrint ReportMarloes Venema, Greg Alpár
ePrint ReportIn this work, we propose TinyABE: a novel CP-ABE scheme that is expressive and can be configured to be efficient enough for settings with embedded devices and low-quality networks. In particular, we demonstrate that our scheme can be configured such that the ciphertexts are small, encryption is fast and the master public key is small enough to fit in memory. From a theoretical standpoint, the new scheme and its security proof are non-trivial generalizations of the expressive scheme with constant-size ciphertexts by Agrawal and Chase (TCC'16, Eurocrypt'17) and its proof to the unbounded setting. By using techniques of Rouselakis and Waters (CCS'13), we remove the restrictions that the Agrawal-Chase scheme imposes on the keys and ciphertexts, making it thus more flexible. In this way, TinyABE is especially suitable for IoT.
Virtual event, Anywhere on Earth, 10 October - 12 October 2022
Event CalendarSubmission deadline: 1 June 2022
Notification: 20 July 2022
Virtual event, Anywhere on Earth, 29 October - 30 October 2022
Event CalendarSubmission deadline: 20 June 2022
Notification: 30 August 2022
Seoul, South Korea, 30 November - 2 December 2022
Event CalendarCopenhagen, Denmark, 29 September - 30 September 2022
Event CalendarSubmission deadline: 15 July 2022
Notification: 25 August 2022
11 May 2022
University of Applied Sciences Würzburg-Schweinfurt
Job PostingEnglish - Announcement: https://www.fhws.de/forschung/institute/idee/center/cairo/karriere/
(on the main page at the bottom - W2 Professorship in Mathematical Foundations of Trustful Learning)
Key topics:
German - Announcement: https://stellen.fhws.de/jobposting/4a106eca93f4beee3be7c5c127aa6064c679fbc20?ref=homepage
(Please apply via the provided link to our online application system)
The positions are research professorships
(German W2 level, well paid and tenured life long positions) and will establish a center for AI (CAIRO) in Wuerzburg
Additional funding to establish a group is also available.
This is an exciting moment and chance.
The positions are located here in Wuerzburg and the teaching will be (so far) in English only (it may be necessary to learn some German in the first two years).
To be eligible it is mandatory to have 5 years working experience after MSc including at least 3 years of industrial experience (can be spread and industry related research (institutes) also count).
Closing date for applications:
Contact:
Prof. Dr. Frank-Michael Schleif
frank-michael.schleif@fhws.deMore information: https://www.fhws.de/forschung/institute/idee/center/cairo/karriere/
Huawei German Research Center, Munich
Job PostingTo support our research activities, we are looking for an enthusiastic and highly motivated PhD student Security &Trust - Connected, Cooperative, Automated Mobility (m/f/d)
Research Topic
- Perform research and develop new solutions for Trust Management in the Next-Generation CCAM technologies.
- Contribute to new mechanisms for assessing dynamic trust relationship based on Zero Trust and Subjective Logic.
- Define a trust model and trust reasoning framework based on which involved entities can establish trust for cooperatively executing safety-critical functions.
- Contribute to the research and development of technologies in the upcoming domain of Connected, Cooperative and Automated Mobility (CCAM).
- Being involved in international initiatives including industry groups such as 5GAA, Gaia-X, DIF and Horizon Europe research projects.
- Completed master studies (or equivalent) in computer science, information technology, electrical engineering, or mathematics;
- Exposure and understanding of data protection and security development technologies;
- Good programming skill;
- Must be eligible to work in the European Union to be considered for this position;
- Fluent in English;
Closing date for applications:
Contact: Ioannis Krontiris
More information: https://huaweiresearchcentergermanyaustria.teamtailor.com/jobs/1732783-phd-student-security-trust-connected-cooperative-automated-mobility-m-f-d
Radboud University, Nijmegen, The Netherlands
Job PostingThe Digital Security Group of Radboud University is one of the leading groups in computer security in The Netherlands and Europe, and one of the pioneers in permutation-based crypto and corresponding leakage-resilient modes.
The successful candidate should ideally have a master in Computer Science, Mathematics, or Electrical engineering. Familiarity with symmetric cryptography is required. Applications will be considered until the positions are filled.
Closing date for applications:
Contact: To apply, please send the following documents to b.mennink (at) cs.ru.nl, with the subject "PhD position in cryptography":
- a motivation letter
- your cv
- your master diploma certificate (scanned)
- transcript of the courses you took (including grades)
- up to 3 references
10 May 2022
Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
ePrint ReportMichele Fabbrini
ePrint ReportChenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
ePrint ReportRoderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, Robert Primas
ePrint ReportWe solve this problem in two steps. First, we introduce a contract layer between the (CPU) hardware and the software that allows the specification of microarchitectural side-effects on masked software in an intuitive language. Second, we present a method for proving the correspondence between contracts and CPU netlists to ensure the completeness of the specified leakage models. Then, any further security proofs only need to happen between software and contract, which brings benefits such as reduced verification runtime, improved user experience, and the possibility of working with vendor-supplied contracts of CPUs whose design is not available on netlist-level due to IP restrictions. We apply our approach to the popular RISC-V IBEX core, provide a corresponding formally verified contract, and describe how this contract could be used to verify masked software implementations.