IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 January 2024
Ran Canetti, Claudio Chamon, Eduardo Mucciolo, Andrei Ruckenstein
ePrint ReportWe start by formulating a new (and relatively weak) obfuscation task regarding the ability to obfuscate random circuits of bounded length. We call such obfuscators random input & output (RIO) obfuscators. We then show how to construct indistinguishability obfuscators for all (unbounded length) circuits given only an RIO obfuscator --- under a new assumption regarding the pseudorandomness of sufficiently long random reversible circuits with known functionality, which in turn builds on a conjecture made by Gowers (Comb. Prob. Comp. '96) regarding the pseudorandomness of bounded-size random reversible circuits. Furthermore, the constructed obfuscators satisfy a new measure of security - called random output indistinguishability (ROI) obfuscation - which is significantly stronger than IO and may be of independent interest.
We then investigate the possibility of constructing RIO obfuscators using local, functionality preserving perturbations. Our approach is rooted in statistical mechanics and can be thought of as locally ``thermalizing'' a circuit while preserving its functionality. We provide candidate constructions along with a pathway for analyzing the security of such strategies.
Given the power of program obfuscation, viability of the proposed approach would provide an alternative route to realizing almost all cryptographic tasks under hardness assumptions that are very different from standard ones. Furthermore, our specific candidate obfuscators are relatively efficient: the obfuscated version of an n-wire, m-gate (reversible) circuit with security parameter k has n wires and poly(n,k)m gates. We hope that our initial exploration will motivate further study of this alternative path to cryptography.
Tamir Tassa, Avishay Yanai
ePrint ReportFredrik Meisingseth, Christian Rechberger, Fabian Schmid
ePrint ReportAlex Kampa
ePrint ReportTo illustrate the concept, a concrete application of this method to a simple binary voting scheme is then described in detail.
Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López
ePrint ReportVasyl Ustimenko
ePrint ReportYuval Ishai, Eyal Kushnir, Ron D. Rothblum
ePrint ReportOur notion relates the ability to accomplish some task when given a ciphertext, to accomplishing the same task without the ciphertext, in the context of communication complexity. Thus, we say that a scheme is combinatorially homomorphic if there exists a communication complexity problem $f(x,y)$ (where $x$ is Alice's input and $y$ is Bob's input) which requires communication $c$, but can be solved with communication less than $c$ when Alice is given in addition also an encryption $E_k(y)$ of Bob's input (using Bob's key $k$).
We show that this definition indeed captures pre-existing notions of homomorphic encryption and (suitable variants are) sufficiently strong to derive prior known implications of homomorphic encryption in a conceptually appealing way. These include constructions of (lossy) public-key encryption from homomorphic private-key encryption, as well as collision-resistant hash functions and private information retrieval schemes.
02 January 2024
Dubrovnik, Croatia, 9 September - 13 September 2024
Event CalendarWorcester, USA, 5 April 2024
Event CalendarSubmission deadline: 2 February 2024
Notification: 5 March 2024
Vienna, Austria, 30 July - 2 August 2024
Event CalendarSubmission deadline: 28 February 2024
Notification: 3 May 2024
1 July 2024
Event CalendarSubmission deadline: 1 July 2024
UCSC---CSE Assistant Professor, Security and Privacy (initial review Jan. 5, 2024)
Job PostingClosing date for applications:
Contact: Ioannis Demertzis or Alvaro Cardenas
More information: https://recruit.ucsc.edu/JPF01635
AIT Austrian Institute of Technology; Vienna, Austria
Job PostingThe cryptography team is conducting research in the domain of public key cryptography, including secure communication, privacy-enhancing technologies, and long-term and post-quantum security. Our research covers the full spectrum from idea creation to the development of prototypes and demonstrators.
The team is seeking to grow, and is therefore looking for a PhD-student in the fields of privacy and security in distributed systems.
Through our AIT-PhD programme with 150 internationals students, conducted in collaboration with renowned universities, applicants will have the opportunity to conduct their PhD thesis in collaboration with our experts and our national and international project partners from industry or other research institutions.
Requirements:
- Applicants are required to hold a MSc degree (or equivalent) in computer science, mathematics, or a related field
- Basic knowledge of cryptography (at least one course specializing on cryptography) is expected
- Special interest in applied research and the solution of practical problems, in particular in the areas of cryptography and information security
- High level of commitment and ability to work in a team
- Good knowledge of a programming language (e.g., C/C++, Rust, Java, Python) and software development is a plus
- Very good written and oral English skills; knowledge of German is not a requirement
The minimum gross annual salary on a full-time basis (38,5 h / week) according to the collective agreement is EUR 53.578,--. The actual salary will be determined individually, based on your qualifications and experience. In addition, we offer company benefits, flexible working conditions, individual training and career opportunities.
All applications (including cover letter and full CV) need to be submitted using the following link: https://jobs.ait.ac.at/Job/224352
Closing date for applications:
Contact: Stephan Krenn (stephan.krenn[at]ait.ac.at)
More information: https://jobs.ait.ac.at/Job/224352
Shanghai Jiao Tong University
Job PostingApplicants should have (a) a doctoral degree in Computer Science, Electronic Engineering, Communication, Mathematics or Statistics; (b) an established track record in research and scholarship; (c) expertise in the cryptographic and security research areas; and (d) a demonstrated commitment to excellence in teaching.
The school will provide highly competitive remuneration packages and assist applicants to apply for various national, provincial and ministerial level talent programs such as “Outstanding Youth Talents Program”, Shanghai “Talents Program”,etc. We will also assist on employment of spouses, schooling for children and medical care.
Closing date for applications:
Contact:
Chaoping Xing, emial: xingcp@sjtu.edu.cn; Ni Liang, email: liangni@sjtu.edu.cn
Luxembourg Institute of Science and Technology
Job PostingHow will you contribute? Your specific mission includes, but is not limited to, participating into the following activities along with the project partners:
- To design and develop privacy-preserving federated data management technologies
- To prototype privacy-preserving technologies for cyberthreat intelligence, data analysis or cybersecurity
- To develop open-source software
- To validate the effectiveness of developed technologies You are in charge of disseminating and promoting the research activities that will be carried out, whether through publications, prototype development or technical reports
- Hold a PhD. degree in Computer Science or related disciplines
- Have good programming skills (particularly experience on Python and C++)
- Have good track record on applied cryptography, such as secure multiparty computation and homomorphic encryption. Knowledge on secure aggregation techniques or zero-knowledge proofs is a plus.
- Demonstrate strong interest and experience in anonymization techniques such as differential privacy, Google’s RAPPOR
Closing date for applications:
Contact: Orhan Ermis
More information: https://app.skeeled.com/offer/6554879c69ccf56b0c1432df?utm_id=60fed4c509c80d16d1bbe536&utm_medium=OFFERS_PORTAL&language=en&show_description=true
University of Surrey, UK
Job PostingFixed Term Contract until 30th September 2025
Closing Date: Monday 15th January
This post will work on challenges around decentralized identity and personal data, and approaches across distributed platforms such as Distributed Ledgers.
The Computer Science Research Centre at the University of Surrey is seeking to recruit a full-time researcher to the Surrey Centre for Cyber Security (SCCS). The successful candidate will join the DECaDE Next Stage Digital Economy Centre for the Decentralised Digital Economy (http://decade.ac.uk), a multidisciplinary UKRI-funded Centre with the University of Surrey, the University of Edinburgh, and the Digital Catapult.
The Centre is initially focused on three themes: value co-creation in the digital economy, data trusts for identity and data, and the world of work and the gig economy.
Surrey is recognized by the National Cyber Security Centre as an Academic Centre of Excellence in Cyber Security Research, and offers a thriving research environment with world leading researchers. We were also recognised as Cyber University of the Year 2023 in the National Cyber Awards. Our research includes security and privacy, verification, cryptography, distributed systems, and networked systems.
The position offers the platform for the research fellow to develop skills to become an independent researcher and to contribute to the DECaDE vision. The successful candidate will work within a team under the direction of Professor Steve Schneider. Significant interaction with project partners is encouraged, and the dissemination strategy may involve national and international travel, with many personal development opportunities.
Closing date for applications:
Contact: Contact: Professor Steve Schneider: s.schneider@surrey.ac.uk
More information: https://jobs.surrey.ac.uk/Vacancy.aspx?id=13775
31 December 2023
Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai
ePrint ReportWe give the first evidence for the existence of unstructured hard languages in $\mathsf{NP} \,\cap\,\mathsf{coNP}$ by showing that if $\mathsf{UP} \not \subseteq \mathsf{RP}$, which follows from the existence of injective one-way functions, the answer to Bennett and Gill's question is affirmative: with probability 1 over a random oracle $\cal O$, we have that $\mathsf{P}^{\cal O} \neq \mathsf{NP}^{\cal O} \cap \mathsf{coNP}^{\cal O}$. Our proof gives a constructive non-black-box approach for obtaining candidate hard languages in $\mathsf{NP} \,\cap\,\mathsf{coNP}$ from cryptographic hash functions.
The above conditional separation builds on a new construction of non-interactive zero-knowledge (NIZK) proofs, with a computationally unbounded prover, to convert a hard promise problem into a hard language. We obtain such NIZK proofs for $\mathsf{NP}$, with a uniformly random reference string, from a special kind of hash function which is implied by (an unstructured) random oracle. This should be contrasted with previous constructions of such NIZK proofs that are based on one-way permutations or other structured primitives, as well as with (computationally sound) NIZK arguments in the random oracle model.
Zhengjun Cao, Zhenfu Cao
ePrint ReportAnupam Chattopadhyay, Subhamoy Maitra, Bimal Mandal, Manmatha Roy, Deng Tang
ePrint ReportXinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren
ePrint ReportWe present two oblivious FD protocols and prove them secure in the presence of the persistent adversary (monitoring processes on the server). The first protocol leverages Oblivious RAM (ORAM) and is suitable for dynamic databases. The second protocol relies on oblivious sorting and is more practical in static databases due to high parallelism. We also present a thorough experimental evaluation of the proposed methods.