IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
06 December 2023
Weizhe Wang, Haoyang Wang, Deng Tang
ePrint ReportMike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach
ePrint ReportIn this work, we fill this gap by leveraging the concepts of accountability and universal composability (UC). More specifically, we propose the first ideal functionality for accountable BBs that formalizes the security requirements of such BBs in UC. We then propose Fabric$^\ast_\text{BB}$ as a slight extension designed on top of Fabric$^\ast$, which is a variant of the prominent Hyperledger Fabric distributed ledger protocol, and show that Fabric$^\ast_\text{BB}$ UC-realizes our ideal BB functionality. This result makes Fabric$^\ast_\text{BB}$ the first provably accountable BB, an often desired, but so far not formally proven property for BBs, and also the first BB that has been proven to be secure based only on standard cryptographic assumptions and without requiring trusted BB components or network assumptions. Through an implementation and performance evaluation we show that Fabric$^\ast_\text{BB}$ is practical for many applications of BBs.
Albert Garreta, Adam Gągol, Aikaterini-Panagiota Stouka, Damian Straszak, Michal Zajac
ePrint ReportPihla Karanko
ePrint Report- A random variable $X$ has $k$ bits of pseudoentropy if there exists a random variable $Y$ that has $k$ bits 'real' entropy and $Y$ is computationally indistinguishable from $X$. - A random variable $X$ has $k$ bits of incompressibility entropy if $X$ cannot be efficiently compressed to less than $k$ bits.
It is also intuitive, that if a random variable has high pseudoentropy, then it should also have high incompressibility entropy, because a high-entropy distribution cannot be compressed.
However, the above intuitions are not precise. Does 'real entropy' refer to Shannon entropy or min-entropy? What kind of correctness do we require from the compressor algorithm? Different papers use slightly different variations of both pseudoentropy and incompressibility entropy.
In this note we study these subtle differences and see how they affect the parameters in the implication that pseudoentropy implies incompressibility.
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, Shuo Sun
ePrint ReportKevin Carrier, Valérian Hatey, Jean-Pierre Tillich
ePrint ReportJulien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier
ePrint ReportDongyu Wu, Bei Liang, Zijie Lu, Jintai Ding
ePrint ReportSimin Ghesmati, Walid Fdhila, Edgar Weippl
ePrint ReportIn this paper, we provide a threat model of possible privacy attacks on users utilizing the Bitcoin blockchain. To this end, we followed the LINDDUN GO methodology to identify threats and suggest possible mitigation.
Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
ePrint ReportSuvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay
ePrint ReportDimitar Jetchev, Marius Vuille
ePrint ReportCharanjit S Jutla, Eamonn W. Postlethwaite, Arnab Roy
ePrint ReportIn this work, we propose a (level-2) GGH13-encoding based zkSNARK which we show to be secure in the weak-multilinear map model of Miles-Sahai-Zhandry assuming a novel pseudo-random generator (PRG). We argue that the new PRG assumption is plausible based on the well-studied Newton's identity on power-sum polynomials, as well as an analysis of hardness of computing Grobner bases for these polynomials. The particular PRG is designed for efficient implementation of the zkSNARK.
Technically, we leverage the 2-linear instantiation of the GGH13 graded encoding scheme to provide us with an analogue of bilinear maps and adapt the Groth16 (Groth, Eurocrypt 2016) protocol, although with considerable technical advances in design and proof. The protocol is non-interactive in the CRS model.
Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen
ePrint Report05 December 2023
AIT Austrian Institute of Technology; Vienna, Austria
Job PostingThe cryptography team is conducting research in the domain of public key cryptography, including secure communication, privacy-enhancing technologies, and long-term and post-quantum security. Our research covers the full spectrum from idea creation to the development of prototypes and demonstrators.
The team is seeking to grow, and is therefore offering a scientist position in cryptography.
Requirements:
- PhD (or equivalent) in computer science or a related field, with a specialization on (public-key) cryptology
- Profound knowledge and experience in (public key) cryptography, including, e.g.: federated computation, secure communication, long-term and post-quantum security, privacy-enhancing technologies, real world crypto, zero-knowledge proofs and zkSNARKs.
- Strong track record with publications at competitive academic conferences or journals
- Experience in the acquisition and execution of national and transnational research projects (e.g., Horizon 2020) is a plus
- Good knowledge of a programming language (e.g., C/C++, Rust, Python, Java) and software development is a plus
- Very good written and oral English skills; knowledge of German is not a requirement but willingness to learn German is expected
The minimum gross annual salary on a full-time basis (38,5 h / week) according to the collective agreement is EUR 61.614,--. The actual salary will be determined individually, based on your qualifications and experience. In addition, we offer company benefits, flexible working conditions, individual training and career opportunities.
All applications (including cover letter, full CV, at least 2 references) need to be submitted using the following link: https://jobs.ait.ac.at/Job/218885
Closing date for applications:
Contact: Stephan Krenn (stephan.krenn@ait.ac.at)
More information: https://jobs.ait.ac.at/Job/218885
04 December 2023
Rockville, USA, 23 July - 25 July 2024
Event CalendarSubmission deadline: 27 May 2024
Notification: 10 June 2024
Duality Technologies, Hoboken, NJ
Job PostingWe are currently hiring a Scientist to join our Advanced Research and Cryptography team. In this role you will be an integral part of a team developing and implementing cryptographic protocols for encrypted computations. The Advanced Research and Cryptography team includes well-known researchers and is a major contributor to the OpenFHE software library.
The ideal candidate is expected to have a strong background in lattice-based cryptography and/or fully homomorphic encryption. Experience in secure multiparty computation and/or zero-knowledge proofs is nice to have. Software prototyping experience is important, and C++ prototyping skills are preferred.
This position offers flexibility, with the expectation of working in a hybrid mode (at our Hoboken, NJ office). Candidates can start working remotely. More information is available at https://dualitytech.com/careers/cryptography-scientist-2/.
Closing date for applications:
Contact: Yuriy Polyakov (ypolyakov@dualitytech.com)
More information: https://dualitytech.com/careers/cryptography-scientist-2/
University of Connecticut, School of Computing
Job PostingThe positions provide a great opportunity for students with interest in interdisciplinary projects that combine knowledge from various fields towards the design of secure systems and protocols. We target real-world and timely problems and aim to develop secure and practical solutions backed by rigorous foundations and efficient implementations/thorough performance testing. We are also interested in theoretical projects that contribute in devising new models in Cryptography and Privacy.
For more information about our current and previous projects please check https://ghadaalmashaqbeh.github.io/research/. For interested students, please send your CV to ghada@uconn.edu and provide any relevant information about your research interests, and relevant skills and background.
Closing date for applications:
Contact: Ghada Almashaqbeh
More information: https://ghadaalmashaqbeh.github.io/research/
University College London, Information Security Research Group
Job PostingThe Department of Computer Science at University College London (UCL) invites applications for a faculty position in Information Security. We seek world-class talent; candidates must have an outstanding research track record. Appointments will be made at the rank of Lecturer (equivalent to Assistant Professor), Associate Professor or Professor, depending on experience.
We seek applicants with expertise and experience that complements or builds on our current strengths, including but not limited to, the areas of: human factors in security, systems and network security, machine learning and security, cybercrime, online safety, cryptography, embedded systems security, and software security.
Key dates
- Information session: 12 December 2023, 2–3pm (UK time)
- Closing date: 31 January 2024
- Interviews: 26 February to 8 March 2024
Closing date for applications:
Contact: Steven Murdoch (s.murdoch AT ucl.ac.uk)
More information: https://sec.cs.ucl.ac.uk/hiring-2024/
Federal University of Minas Gerais, Department of Computer Science; Belo Horizonte, Brazil
Job PostingClosing date for applications:
Contact: Michele Nogueira - mentored.project@gmail.com
More information: https://mentored.dcc.ufmg.br/calls