IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 June 2022
Casablanca, Morocco, 26 October - 28 October 2022
Event CalendarSubmission deadline: 15 July 2022
Notification: 30 August 2022
CRYPTO
The registration is now open:
https://crypto.iacr.org/2022/registration.php
The deadline for early registration is July 15th.
Information on student stipends can be found on the same link.
Information on affiliated events can be found here:
https://crypto.iacr.org/2022/affiliated.php
17 June 2022
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
ePrint ReportAdditionally, our two-stage sampling technique can derive new feasibilities of indistinguishability-based adaptively-secure $\IB$-$\FE$ for inner products and semi-adaptively-secure $\AB$-$\FE$ for inner products, breaking several technical limitations of the recent work by Abdalla, Catalano, Gay, and Ursu (Asiacrypt '20).
16 June 2022
Eyal Ronen, Eylon Yogev
ePrint ReportThis paper presents several novel methods for further compressing the signature size while requiring negligible added computational costs for the signer and faster verification time. Moreover, our approach enables a much more efficient tradeoff curve between signature size and the computational costs of the signer. In many parameter settings, we achieve small signatures and faster running times simultaneously. For example, for $128$-bit security, the small signature variant of SPHINCS+ is $7856$ bytes long, while our variant is only $6304$ bytes long: a compression of approximately $20$\% while still reducing the signer's running time.
The main insight behind our scheme is that there are predefined specific subsets of messages for which the WOTS+ and FORS signatures (that SPHINCS+ uses) can be compressed and made faster (while maintaining the same security guarantees). Although most messages will not come from these subsets, we can search for suitable hashed values to sign. We sign a hash of the message concatenated with a counter that was chosen such that the hashed value is in the subset. The resulting signature is both smaller and faster to sign and verify.
Our schemes are simple to describe and implement. We provide an implementation and benchmark results.
Jeju, Korea, 22 August - 24 August 2022
Event CalendarSubmission deadline: 18 July 2022
Mohammed VI Polytechnic University (UM6P), Benguerir. Morroco
Job PostingLocated at the heart of the future Green City of Benguerir, Mohammed VI Polytechnic University (UM6P), a higher education institution with an international standard, is established to serve Morocco and the African continent. Its vision is honed around research and innovation at the service of education and development. This unique nascent university, with its state-of-the-art campus and infrastructure, has woven a sound academic and research network, and its recruitment process is seeking high quality academics and professionals in order to boost its quality-oriented research environment in the metropolitan area of Marrakech.
The School of Computer and Communication Sciences at Mohammed VI Polytechnic University (UM6P), Benguerir, Morocco is currently looking for motivated and talented Postdoctoral researchers in the area of Pos-Quantum Cryptography. The successful candidates will primarily be working on the following topics (but not limited to):
- Quantum primitives such as PKE, KEM, KEX, and Digital Signatures
- Post quantum Zero Knowledge Proofs
- Design and implementation of hybrid solutions
- Attack on existing proposals
The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues.
We offer competitive salary (the net salary per month is 2000 USD), a budget for conference travel and research visit, and membership in a young and vibrant team with several international contacts (for more see: https://www.um6p.ma/en).
Submit your application via email including
- full CV,
- sample publications,
- a detailed research proposal,
- and 2-3 reference letters sent directly by the referees.
Applications will be considered until the position is filled.
Closing date for applications:
Contact: Assoc. Prof. Mustapha Hedabou (mustapha.hedabou@um6p.ma) https://career2.successfactors.eu/sfcareer/jobreqcareer?jobId=1339&company=ump
Hebrew University, Israel
Job PostingClosing date for applications:
Contact: crypto@cs.huji.ac.il
Monash University
Job PostingClosing date for applications:
Contact: Jiangshan Yu
More information: https://www.jiangshanyu.com/doc/postdoc.html
Tampere University
Job PostingAt NISEC (https://research.tuni.fi/nisec/) we are looking for several Doctoral Researchers in the field of applied cryptography, hardware security, provable security and privacy.
The selected candidates will primarily be working on the following topics (but not limited to):
- Differential Privacy;
- Functional Encryption;
- Privacy-Preserving Analytics;
- Privacy-Preserving Machine Learning;
- Efficient operations on encrypted data;
- Processing of encrypted data in outsourced and untrusted environments;
- Side Channel Analysis (SCA);
- Machine Learning based SCA;
- Embedded systems security (e.g. ARM and RISC-V based SoCs); TEE security and development (e.g. TrustZone, Trusted Applications, etc.).
Application deadline: 1 August 2022.
Closing date for applications:
Contact: Antonis Michalas (antonios.michalas AT tuni.fi) and Alejandro Cabrera Aldaya alejandro.cabreraaldaya AT tuni.fi
More information: https://bit.ly/3MAe26J
Tampere University
Job PostingAt NISEC (https://research.tuni.fi/nisec/) we are looking for several PostDoctoral Researchers in the field of applied cryptography, provable security and privacy.
The selected candidates will primarily be working on the following topics (but not limited to):
- Differential Privacy;
- Functional Encryption;
- Privacy-Preserving Analytics;
- Privacy-Preserving Machine Learning;
- Efficient operations on encrypted data;
- Processing of encrypted data in outsourced and untrusted environments.
Application deadline: 1 August 2022.
Closing date for applications:
Contact:
Antonis Michalas (https://www.amichalas.com)
More information: https://bit.ly/3NDPHhN
Morgan Thomas
ePrint ReportNicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
ePrint ReportNicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
ePrint ReportYadi Zhong, Ujjwal Guin
ePrint ReportJelle Don, Serge Fehr, Yu-Hsuan Huang
ePrint ReportIn the second part of the paper, we use our compiler to show the security of the very efficient hash-based split-key PRF proposed by Giacon, Heuer and Poettering (PKC 2018), in the quantum random-oracle model. Using a split-key PRF as the key-derivation function gives rise to a secure KEM combiner. Thus, our result shows that the hash-based construction of Giacon et al. can be safely used in the context of quantum attacks, for instance to combine a well-established but only classically-secure KEM with a candidate KEM that is believed to be quantum-secure.
Our security proof for the split-key PRF crucially relies on our adaptive-to-static compiler, but we expect our compiler to be useful beyond this particular application. Indeed, we discuss a couple of other, known results from the literature that would have profitted from our compiler, in that these works had to go though serious complications in oder to deal with adaptivity.
Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
ePrint ReportKhin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
ePrint ReportIn this work, we describe a method to encode more data on top of SIMD, \emph{Field Instruction Multiple Data}, applying reverse multiplication friendly embedding~(RMFE) to FHE. With RMFE, length-\(k\) \(\mathbb{F}_{t}\) vectors can be encoded into \(\mathbb{F}_{t^d}\) and multiplied once. The results have to be recoded~(decoded and then re-encoded) before further multiplications can be done. We introduce an FHE-specific technique to additionally evaluate arbitrary linear transformations on encoded vectors for free during the FHE recode operation. On top of that, we present two optimizations to unlock high degree extension fields with small \(t\) for homomorphic computation: \(r\)-fold RMFE, which allows products of up to \(2^r\) encoded vectors before recoding, and a three-stage recode process for RMFEs obtained by composing two smaller RMFEs. Experiments were performed to evaluate the effectiveness of FIMD from various RMFEs compared to standard SIMD operations. Overall, we found that FIMD generally had \(>2\times\) better (amortized) multiplication times compared to FHE for the same amount of data, while using almost \(k/2 \times\) fewer ciphertexts required.
Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
ePrint ReportAzebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
ePrint ReportRupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
ePrint ReportIn this work, we solve the open problem via constructing public-key watermarkable PRFs with different trade-offs from various assumptions, ranging from standard lattice assumptions to the existence of indistinguishability obfuscation. To achieve the results, we first construct watermarking schemes in a weaker model, where the extraction algorithm is provided with a “hint” about the watermarked PRF key. Then we upgrade the constructions to standard watermarking schemes using a robust unobfuscatable PRF. We also provide the first construction of robust unobfuscatable PRF in this work, which is of independent interest.