IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
25 October 2022
Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
Masahito Ishizaka, Kazuhide Fukushima
Andreas Erwig, Siavash Riahi
In this work, we introduce the notion of adaptor wallets. Adaptor wallets allow parties to securely use and maintain adaptor signatures in the Blockchain setting. Our adaptor wallets are both deterministic and operate in the hot/cold paradigm, which was first formalized by Das et al. (CCS 2019) for standard signature schemes. We introduce a new cryptographic primitive called adaptor signatures with rerandomizable keys, and use it to generically construct adaptor wallets. We further show how to instantiate adaptor signatures with rerandomizable keys from the ECDSA signature scheme and discuss that they can likely be built for Schnorr and Katz-Wang schemes as well. Finally, we discuss the limitations of the existing ECDSA- and Schnorr-based adaptor signatures w.r.t. deterministic wallets in the hot/cold setting and prove that it is impossible to overcome these drawbacks given the current state-of-the-art design of adaptor signatures.
Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukerjee, Peter Rindal
Dahlia Malkhi, Atsuki Momose, Ling Ren
Ariel Gabizon, Dmitry Khovratovich
Valentina Pribanić
Shanjie Xu, Qi Da, Chun Guo
Debasmita Chakraborty
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
Bo Yang, Yanchao Zhang, Dong Tong
James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantiang Gong
Yu Liu, Haodong Jiang, Yunlei Zhao
Marwan Zeggari, Renaud Lambiotte, Aydin Abadi
Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Naehrig, Michael Meyer, Bruno Sterner
24 October 2022
More information and registration instructions can be found at https://asiacrypt.iacr.org/2022/
Some rooms at the venue + nearby hotels reserved for attendees at cut prices.
Stipends may still be available.
University of Cambridge, Cambridge, England
Closing date for applications:
Contact: Interested applicants are encouraged to make informal enquiries about the post to Dr Alice Hutchings and Professor Robert Watson, Alice.Hutchings@cst.cam.ac.uk Robert.Watson@cst.cam.ac.uk
More information: https://www.jobs.cam.ac.uk/job/37371/
Academia Sinica, Taipei, Taiwan
Closing date for applications:
Contact: Bo-Yin Yang (by at crypto.tw)
Kai-Min Chung (kmchung at iis.sinica.edu.tw)
Norwegian University of Science and Technology
After six years of standardisation efforts to solicit, evaluate, and standardise one or more quantum-resistant public-key cryptographic algorithms, in the summer of 2022, the National Institute of Standards and Technology (NIST) from the USA has selected a portfolio of several algorithms. Those algorithms will be the new standards for Public-key Encryption and Key-establishment and for Digital Signatures.
We are now entering a phase where those post-quantum cryptographic standards must be efficiently implemented and deployed. The deployment phase faces challenges such as high-performance implementations, protocol updates with the post-quantum primitives, and levels of robustness and trustworthiness.
Duties of the position:
See https://www.jobbnorge.no/en/available-jobs/job/233227/associate-professor-in-post-quantum-cryptography for more details and how to apply.
Closing date for applications:
Contact: Professor Danilo Gligoroski (danilo.gligoroski@ntnu.no)
More information: https://www.jobbnorge.no/en/available-jobs/job/233227/associate-professor-in-post-quantum-cryptography
Florian Bourse, Malika Izabachène
Another desirable property of FHE called circuit privacy enables to preserve the privacy of the evaluation circuit, i.e. all the information on the bootstrapped ciphertext, including the computation that was performed to obtain it, is destroyed.
In this paper, we show how to directly build a circuit private FHE scheme from TFHE bootstrapping (Asiacrypt 2016). Our proof frame is inspired from the techniques used in Bourse etal (Crypto 2016), we provide a statistical analysis of the error growth during the bootstrapping procedure where we adapt discrete Gaussian lemmata over rings. We make use of a randomized decomposition for the homomorphic external product and introduce a public key encryption scheme with invariance properties on the ciphertexts distribution. As a proof of concept, we provide a C implementation of our sanitization strategy.
Lennart Braun, Ivan Damgård, Claudio Orlandi
To achieve this, we also design a new zero-knowledge protocol for proving multiplicative relations between encrypted values. As a result, the zero-knowledge proofs needed to get active security add only a constant factor overhead. Finally, we explain how to adapt our protocol for the so called "You-Only-Speak-Once" (YOSO) setting, which is a very promising recent approach for performing MPC over a blockchain.