IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 January 2023
Alexandros Bakas, Antonis Michalas
ePrint ReportStéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
ePrint ReportFlorian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
ePrint ReportIn this work, we first systematically analyze the state of the art in defenses for both software exploitation and fault attacks on embedded systems. We then carefully design a holistic instruction set extension to augment the RISC-V instruction set architecture with instructions to deter against the threats analyzed in this work. Moreover we implement our design using the gem5 simulator system and a binary translation approach to arm software with our instruction set extension. Finally, we evaluate performance overhead on the MiBench2 benchmark suite. Our evaluation demonstrates a ROM overhead increase of 20% to defeat the aforementioned attacks.
Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng
ePrint ReportAmadou TALL
ePrint ReportMarina Krček, Guilherme Perin
ePrint Report07 January 2023
University of Central Florida
Job PostingClosing date for applications:
Contact: Questions regarding this search may be directed to Dr. Yan Solihin (yan.solihin@ucf.edu) or Dr. Paul Gazzillo (paul.gazzillo@ucf.edu).
Eindhoven University of Technology
Job Posting
The research will focus on
* quantum cryptography beyond QKD, e.g. key recycling, unclonable encryption, unclonable credentials, quantum PUFs and similar schemes.
* theory related to the Quantum Communication testbed under development in Eindhoven.
The research takes place in the EIPSI institute, which is a collaboration between the Security group and the Coding and Cryptology group.
This position is part of a large, long term, well-funded national program on quantum technologies (Quantum Delta NL). One of the three development lines (Catalyst-2, or CAT2) is fully dedicated to Quantum Key Distribution, Communication and Quantum internet.
Closing date for applications:
Contact: Boris Skoric (b dot lastname at tue dot nl)
More information: https://jobs.tue.nl/en/vacancy/postdoc-quantum-protocols-970990.html
Research & Development Group, Horizen Labs, Remote
Job PostingAs our Director of Research & Development, you have full ownership of the vision, architecture, and deployment of our research across the innovative products at Horizen Labs. You will work closely with our researchers and engineers being the critical bridge between both areas. As a leader of a cutting-edge team, you will be a champion of translating R&D into meaningful products that will change the world. In collaboration with engineering leadership and our product managers, you will shape the technical direction of the entire company, leveraging our research in applied cryptography across various landscapes, including the privacy space, blockchain scalability, and ground-breaking security solutions. You are also passionate about coaching and mentoring your team members to help them grow technically, enhance their ability to get things done, and guide them toward their career goals.
Requirements- Spearhead the design, prototyping, and rollout of PoCs (Proof of Concepts) that focuses on the market’s needs and brings true innovation to the greater research community;
- Co-create both near-term and long term roadmaps with Engineering and Product leadership to bring ideas from academic papers to live production-ready systems;
- Be responsible for our cryptographic team, serving them with empathy, humility, and passion to deliver ground-breaking products to the world;
- Promote a culture of innovation and collaboration both within our internal team and our broader network of researchers, advisors, and partners;
- Facilitate conversations and decisions among senior leaders to identify where the business needs to be next and craft a path to get us there;
- Take a proactive role in aligning organizations and influencing the overall technical direction of a company;
- Collaborate with other industry-leading luminaries, from our investors (Digital Currencies Group, Kenetic Capital, Liberty City Ventures, Sound Ventures), world-class blockchain partner, and devoted security experts (NCC, Halborn).
Closing date for applications:
Contact:
Apply to: https://horizenlabs.io/careers/job/?gh_jid=4759378004
More information: https://horizenlabs.io/careers/job/?gh_jid=4759378004
Bar-Ilan University, Israel
Job PostingThe positions involve performing theoretical and practical research in cryptography and secure computation.
This project is in collaboration with the Technology Innovation Institute (TII) and participants will be offered several all-expenses-paid visits to TII.
The postdoctoral position is offered for 1 year and can be extended by an additional year contingent upon funding and satisfactory performance.
The PhD position spans an entire course of a PhD degree, with an expected duration of 4 years.
Applicants should have a general background in secure computation and cryptography. Candidates are expected to be highly motivated and mathematically capable.
Applications should include (1) a CV including a list of publications, (2) a short research statement, (3) names and contact information of 2-3 potential references.
Closing date for applications:
Contact: Applications should be emailed to carmit.hazay@biu.ac.il
05 January 2023
Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
ePrint ReportOliver W. Gnilke, Jens Zumbrägel
ePrint ReportKatharina Boudgoust, Peter Scholl
ePrint ReportIn this work, we propose a (fully homomorphic) encryption scheme that supports a simple $t$-out-of-$n$ threshold decryption protocol while allowing for a polynomial modulus. The main idea is to use the Rényi divergence (as opposed to the statistical distance as in previous works) as a measure of distribution closeness. This comes with some technical obstacles, due to the difficulty of using the Rényi divergence in decisional security notions such as standard semantic security. We overcome this by constructing a threshold scheme with a weaker notion of one-way security and then showing how to transform any one-way threshold scheme into one guaranteeing semantic security.
04 January 2023
Yuyu Wang, Jiaxin Pan
ePrint Report03 January 2023
Antonio Guimarães, Hilder V. L. Pereira, Barry van Leeuwen
ePrint ReportTako Boris Fouotsa, Tomoki Moriya, Christophe Petit
ePrint ReportThis security picture dramatically changed in August 2022 with new attacks by Castryck-Decru, Maino-Martindale and Robert. Like prior attacks on unbalanced versions, these new attacks exploit torsion point information provided in the SIDH protocol. Crucially however, the new attacks embed the isogeny problem into a similar isogeny problem in a higher dimension to also affect the balanced parameters. As a result of these works, the SIKE algorithm is now fully broken both in theory and in practice.
Given the considerable interest attracted by SIKE and related protocols in recent years, it is natural to seek countermeasures to the new attacks. In this paper, we introduce two such countermeasures based on partially hiding the isogeny degrees and torsion point information in the SIDH protocol. We present a preliminary analysis of the resulting schemes including non-trivial generalizations of prior attacks. Based on this analysis we suggest parameters for our M-SIDH variant with public key sizes of 4434, 7037 and 9750 bytes respectively for NIST security levels 1, 3, 5.
Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin Case
ePrint ReportWe introduce two protocols to delegate PMC from party $P$ to untrusted cloud servers, called delegates, allowing multiple smaller $P$ parties to provide inputs containing identifiers and associated values. Our Delegated Private Matching for Compute protocols, called DPMC and D$^S$PMC, establish a join between the databases of party $C$ and multiple delegators $P$ based on multiple identifiers and compute secret shares of associated values for the identifiers that the parties have in common. We introduce a novel rerandomizable encrypted oblivious pseudorandom function (OPRF) construction, called EO, which allows two parties to encrypt, mask, and shuffle their data and is secure against semi-honest adversaries. Note that EO may be of independent interest. Our D$^S$PMC protocol limits the leakages of DPMC by combining our novel EO scheme and secure three-party shuffling. Finally, our implementation demonstrates the efficiency of our constructions by outperforming related works by approximately $10\times$ for the total protocol execution and by at least $20\times$ for the computation on the delegators.