IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
25 October 2022
Valentina Pribanić
ePrint ReportShanjie Xu, Qi Da, Chun Guo
ePrint ReportDebasmita Chakraborty
ePrint ReportDOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
Bo Yang, Yanchao Zhang, Dong Tong
ePrint ReportJames Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantiang Gong
ePrint ReportYu Liu, Haodong Jiang, Yunlei Zhao
ePrint ReportMarwan Zeggari, Renaud Lambiotte, Aydin Abadi
ePrint ReportGiacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Naehrig, Michael Meyer, Bruno Sterner
ePrint Report24 October 2022
Asiacrypt
More information and registration instructions can be found at https://asiacrypt.iacr.org/2022/
Some rooms at the venue + nearby hotels reserved for attendees at cut prices.
Stipends may still be available.
University of Cambridge, Cambridge, England
Job PostingClosing date for applications:
Contact: Interested applicants are encouraged to make informal enquiries about the post to Dr Alice Hutchings and Professor Robert Watson, Alice.Hutchings@cst.cam.ac.uk Robert.Watson@cst.cam.ac.uk
More information: https://www.jobs.cam.ac.uk/job/37371/
Academia Sinica, Taipei, Taiwan
Job PostingClosing date for applications:
Contact: Bo-Yin Yang (by at crypto.tw)
Kai-Min Chung (kmchung at iis.sinica.edu.tw)
Norwegian University of Science and Technology
Job PostingAfter six years of standardisation efforts to solicit, evaluate, and standardise one or more quantum-resistant public-key cryptographic algorithms, in the summer of 2022, the National Institute of Standards and Technology (NIST) from the USA has selected a portfolio of several algorithms. Those algorithms will be the new standards for Public-key Encryption and Key-establishment and for Digital Signatures.
We are now entering a phase where those post-quantum cryptographic standards must be efficiently implemented and deployed. The deployment phase faces challenges such as high-performance implementations, protocol updates with the post-quantum primitives, and levels of robustness and trustworthiness.
Duties of the position:
See https://www.jobbnorge.no/en/available-jobs/job/233227/associate-professor-in-post-quantum-cryptography for more details and how to apply.
Closing date for applications:
Contact: Professor Danilo Gligoroski (danilo.gligoroski@ntnu.no)
More information: https://www.jobbnorge.no/en/available-jobs/job/233227/associate-professor-in-post-quantum-cryptography
Florian Bourse, Malika Izabachène
ePrint ReportAnother desirable property of FHE called circuit privacy enables to preserve the privacy of the evaluation circuit, i.e. all the information on the bootstrapped ciphertext, including the computation that was performed to obtain it, is destroyed.
In this paper, we show how to directly build a circuit private FHE scheme from TFHE bootstrapping (Asiacrypt 2016). Our proof frame is inspired from the techniques used in Bourse etal (Crypto 2016), we provide a statistical analysis of the error growth during the bootstrapping procedure where we adapt discrete Gaussian lemmata over rings. We make use of a randomized decomposition for the homomorphic external product and introduce a public key encryption scheme with invariance properties on the ciphertexts distribution. As a proof of concept, we provide a C implementation of our sanitization strategy.
Lennart Braun, Ivan Damgård, Claudio Orlandi
ePrint ReportTo achieve this, we also design a new zero-knowledge protocol for proving multiplicative relations between encrypted values. As a result, the zero-knowledge proofs needed to get active security add only a constant factor overhead. Finally, we explain how to adapt our protocol for the so called "You-Only-Speak-Once" (YOSO) setting, which is a very promising recent approach for performing MPC over a blockchain.
Marloes Venema, Leon Botros
ePrint ReportIn this work, we present a new approach to achieving CCA-security as generically and efficiently as possible, by splitting the CCA-conversion in two steps. The predicate of the scheme is first extended in a certain way, which is then used to achieve CCA-security generically e.g., by combining it with a hash function. To facilitate the first step efficiently, we also propose a novel predicate-extension transformation for a large class of pairing-based PE---covered by the pair and the predicate encodings frameworks---which incurs only a small constant overhead for all algorithms. In particular, this yields the most efficient generic CCA-conversion for ciphertext-policy ABE.
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
ePrint ReportAgnese Gini, Pierrick Méaux
ePrint ReportIn this article, we introduce and study two new secondary constructions of WAPB functions. This new strategy allows us to bound the weightwise nonlinearities from those of the parent functions, enabling us to produce WAPB functions with high weightwise nonlinearities. As a practical application, we build several novel WAPB functions in up to $16$ variables by taking parent functions from two different known families. Moreover, combining these outputs, we also produce the $16$-variable WAPB function with the highest weightwise nonlinearities known so far.
Xiao Sui, Sisi Duan, Haibin Zhang
ePrint ReportXiaoling Yu, Yuntao Wang
ePrint ReportXiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu
ePrint Report• Halving the cost of COT and sVOLE. Our COT protocol introduces extra correlation to each level of a GGM tree used by the state-of-the-art COT protocol. As a result, it reduces both the number of AES calls and the communication by half. Extending this idea to sVOLE, we are able to achieve similar improvement with either halved computation or halved communication.
• Halving the cost of DPF and DCF. We propose improved two-party protocols for the distributed generation of DPF/DCF keys. Our tree structures behind these protocols lead to more efficient full-domain evaluation and halve the communication and the round complexity of the state-of-the-art DPF/DCF protocols.
All protocols are provably secure in the random-permutation model and can be accelerated based on fixed-key AES-NI. We also improve the state-of-the-art schemes of puncturable pseudorandom function (PPRF), DPF, and DCF, which are of independent interest in dealer-available scenarios.