IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
13 January 2023
Queen's University Belfast, Electrical and Electronic engineering
Job PostingClosing date for applications:
Contact: Dr Arnab Kumar Biswas
More information: https://www.qub.ac.uk/courses/postgraduate-research/phd-opportunities/secure-multitenant-and-federated-satellite-system.html
Queen's University Belfast, Electrical and Electronic engineering
Job PostingClosing date for applications:
Contact: Dr Arnab Kumar Biswas
More information: https://www.qub.ac.uk/courses/postgraduate-research/phd-opportunities/a-trusted-execution-environment-based-framework-for-securing-legacy-embedded-systems.html
11 January 2023
Jeffrey Burdges, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
ePrint ReportAydin Abadi, Steven Murdoch
ePrint ReportSarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
ePrint ReportRecent applied cryptography advances enable private hash matching (PHM), where a service can match user content against a set of known CSAM images without revealing the hash set to users or nonmatching content to the service. These designs, especially a 2021 proposal for identifying CSAM in Apple's iCloud Photos service, have attracted widespread criticism for creating risks to security, privacy, and free expression.
In this work, we aim to advance scholarship and dialogue about PHM by contributing new cryptographic methods for system verification by the general public. We begin with motivation, describing the rationale for PHM to detect CSAM and the serious societal and technical issues with its deployment. Verification could partially address shortcomings of PHM, and we systematize critiques into two areas for auditing: trust in the hash set and trust in the implementation. We explain how, while these two issues cannot be fully resolved by technology alone, there are possible cryptographic trust improvements.
The central contributions of this paper are novel cryptographic protocols that enable three types of public verification for PHM systems: (1) certification that external groups approve the hash set, (2) proof that particular lawful content is not in the hash set, and (3) eventual notification to users of false positive matches. The protocols that we describe are practical, efficient, and compatible with existing PHM constructions.
10 January 2023
Virtual event, Anywhere on Earth, 29 June - 30 June 2023
Event CalendarSubmission deadline: 7 February 2023
Notification: 14 March 2023
Benevento, Italy, 29 August - 1 September 2023
Event CalendarSubmission deadline: 9 March 2022
Notification: 23 May 2022
09 January 2023
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
ePrint ReportWe present the first statistically private 3-server DPF for domain size $N$ with subpolynomial key size $N^{o(1)}$. We also present a similar perfectly private 4-server DPF. Our constructions offer benefits over their computationally secure counterparts, beyond the superior security guarantee, including better computational complexity and better protocols for distributed key generation, all while having comparable communication complexity for moderate-sized parameters.
Katharina Kreuzer
ePrint ReportHanno Böck
ePrint ReportHong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
ePrint ReportAlexandros Bakas, Antonis Michalas
ePrint ReportStéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
ePrint ReportFlorian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
ePrint ReportIn this work, we first systematically analyze the state of the art in defenses for both software exploitation and fault attacks on embedded systems. We then carefully design a holistic instruction set extension to augment the RISC-V instruction set architecture with instructions to deter against the threats analyzed in this work. Moreover we implement our design using the gem5 simulator system and a binary translation approach to arm software with our instruction set extension. Finally, we evaluate performance overhead on the MiBench2 benchmark suite. Our evaluation demonstrates a ROM overhead increase of 20% to defeat the aforementioned attacks.
Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng
ePrint ReportAmadou TALL
ePrint ReportMarina Krček, Guilherme Perin
ePrint Report07 January 2023
University of Central Florida
Job PostingClosing date for applications:
Contact: Questions regarding this search may be directed to Dr. Yan Solihin (yan.solihin@ucf.edu) or Dr. Paul Gazzillo (paul.gazzillo@ucf.edu).
Eindhoven University of Technology
Job Posting
The research will focus on
* quantum cryptography beyond QKD, e.g. key recycling, unclonable encryption, unclonable credentials, quantum PUFs and similar schemes.
* theory related to the Quantum Communication testbed under development in Eindhoven.
The research takes place in the EIPSI institute, which is a collaboration between the Security group and the Coding and Cryptology group.
This position is part of a large, long term, well-funded national program on quantum technologies (Quantum Delta NL). One of the three development lines (Catalyst-2, or CAT2) is fully dedicated to Quantum Key Distribution, Communication and Quantum internet.
Closing date for applications:
Contact: Boris Skoric (b dot lastname at tue dot nl)
More information: https://jobs.tue.nl/en/vacancy/postdoc-quantum-protocols-970990.html
Research & Development Group, Horizen Labs, Remote
Job PostingAs our Director of Research & Development, you have full ownership of the vision, architecture, and deployment of our research across the innovative products at Horizen Labs. You will work closely with our researchers and engineers being the critical bridge between both areas. As a leader of a cutting-edge team, you will be a champion of translating R&D into meaningful products that will change the world. In collaboration with engineering leadership and our product managers, you will shape the technical direction of the entire company, leveraging our research in applied cryptography across various landscapes, including the privacy space, blockchain scalability, and ground-breaking security solutions. You are also passionate about coaching and mentoring your team members to help them grow technically, enhance their ability to get things done, and guide them toward their career goals.
Requirements- Spearhead the design, prototyping, and rollout of PoCs (Proof of Concepts) that focuses on the market’s needs and brings true innovation to the greater research community;
- Co-create both near-term and long term roadmaps with Engineering and Product leadership to bring ideas from academic papers to live production-ready systems;
- Be responsible for our cryptographic team, serving them with empathy, humility, and passion to deliver ground-breaking products to the world;
- Promote a culture of innovation and collaboration both within our internal team and our broader network of researchers, advisors, and partners;
- Facilitate conversations and decisions among senior leaders to identify where the business needs to be next and craft a path to get us there;
- Take a proactive role in aligning organizations and influencing the overall technical direction of a company;
- Collaborate with other industry-leading luminaries, from our investors (Digital Currencies Group, Kenetic Capital, Liberty City Ventures, Sound Ventures), world-class blockchain partner, and devoted security experts (NCC, Halborn).
Closing date for applications:
Contact:
Apply to: https://horizenlabs.io/careers/job/?gh_jid=4759378004
More information: https://horizenlabs.io/careers/job/?gh_jid=4759378004