IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
15 November 2024
Noel Elias
ePrint ReportTom Gur, Jack O'Connor, Nicholas Spooner
ePrint ReportAli Raya, Vikas Kumar, Aditi Kar Gangopadhyay, Sugata Gangopadhyay
ePrint ReportShiping Cai, Mingjie Chen, Christophe Petit
ePrint ReportJingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, Lizhong Dai
ePrint ReportSönke Jendral, Elena Dubrova
ePrint ReportLing Sun
ePrint Report13 November 2024
Common Prefix
Job PostingClosing date for applications:
Contact: Dimitris Lamprinos (careers@commonprefix.com)
More information: https://commonprefix.com
Rovira i Virgili University, Tarragona, Spain
Job PostingWe seek to hire a full-time postdoctoral researcher in the area of security and privacy.
The University offers:- A 2.5-year contract at an exciting international environment.
- Generous travel funds.
- Possibility to co-supervise PhD students.
The successful candidate is expected to contribute to the PROVTOPIA project, which focuses on counteracting disinformation via Secure and Private Provenance Verification of Media Content. The candidate will work under the umbrella of the Crises research group (https://crises-deim.urv.cat/) and the direction of Dr. Rolando Trujillo. Candidates with experience in applied cryptography, threat modelling or formal verification are encouraged to apply.
Include in your application the following documents:- Curriculum Vitae
- Research statement
- Contact information for 3 referees
Deadline for applications is 15 January 2025 . Early applications are highly encouraged, though, as they will be processed upon reception.
Closing date for applications:
Contact: Dr. Rolando Trujillo (rolando.trujillo@urv.cat)
More information: https://rolandotr.bitbucket.io/open-positions.html
Aalto University, Finland
Job PostingClosing date for applications:
Contact: For additional information about the position, please contact Professor Riku Jäntti at riku.jantti at aalto.fi. For questions related to the recruitment process, HR Partner Hanna Koli at hanna.koli at aalto.fi.
More information: https://www.aalto.fi/en/open-positions/professor-computer-engineering
11 November 2024
Kasra Abbaszadeh, Jonathan Katz
ePrint ReportWe formally define this notion and build several candidate constructions from standard cryptographic assumptions. In particular, we propose a primary construction from classical NIZK for NP and one-way functions, albeit with two limitations: (i) deletion certificates are only privately verifiable, and (ii) both prover and verifier are required to be quantum algorithms. We resolve these hurdles in two extensions that assume the quantum hardness of the learning with errors problem. The first one achieves publicly verifiable certificates, and the second one requires merely classical communication between classical provers and quantum verifiers.
Chuhan Lu, Nikhil Pappu
ePrint ReportVadim Lyubashevsky, Gregor Seiler, Patrick Steuer
ePrint ReportZhikun Wang, Ling Ren
ePrint ReportFrom a technical standpoint, we present a novel organization of hints where each PIR query consumes a hint, and entries in the consumed hint are relocated to other hints. We then present a new data structure to track the hint relocations and use small-domain pseudorandom permutations to make the hint storage sublinear while maintaining efficient lookups in the hints.
Lorenz Panny, Christophe Petit, Miha Stopar
ePrint ReportHadas Zeilberger
ePrint ReportJens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst
ePrint ReportCarl Kwan, Quang Dao, Justin Thaler
ePrint ReportWe present an approach to formally verify Lasso-style lookup arguments against the semantics of instruction set architectures. We demonstrate our approach by formalizing and verifying all Jolt 32-bit instructions corresponding to the RISC-V base instruction set (RV32I) using the ACL2 theorem proving system. Our formal ACL2 model has undergone extensive validation against the Rust implementation of Jolt. Due to ACL2's bit-blasting, rewriting, and developer-friendly features, our formalization is highly automated.
Through formalization, we also discovered optimizations to the Jolt codebase, leading to improved efficiency without impacting correctness or soundness. In particular, we removed one unnecessary lookup each for four instructions, and reduced the sizes of three subtables by 87.5\%.
Omar Alrabiah, Prabhanjan Ananth, Miranda Christ, Yevgeniy Dodis, Sam Gunn
ePrint ReportIn this work, we show the following. - Adaptive robustness: We show that the pseudorandom codes of Christ and Gunn are adaptively robust, resolving a conjecture posed by Cohen, Hoover, and Schoenbach [S&P 2025]. Our proof involves several new ingredients, combining ideas from both cryptography and coding theory and taking hints from the analysis of Boolean functions. - Ideal security: We define an ideal pseudorandom code as one which is indistinguishable from the ideal functionality, capturing both the pseudorandomness and robustness properties in one simple definition. We show that any adaptively robust pseudorandom code for single-bit messages can be bootstrapped to build an ideal pseudorandom code with linear information rate, under no additional assumptions. - CCA security: In the setting where the encoding key is made public, we define a CCA-secure pseudorandom code in analogy with CCA-secure encryption. We show that any adaptively robust public-key pseudorandom code for single-bit messages can be used to build a CCA-secure pseudorandom code with linear information rate, in the random oracle model.
Together with the result of Christ and Gunn, it follows that there exist ideal pseudorandom codes assuming the $2^{O(\sqrt{n})}$-hardness of LPN. This extends to CCA security in the random oracle model. These results immediately imply stronger robustness guarantees for generative AI watermarking schemes, such as the practical quality-preserving image watermarks of Gunn, Zhao, and Song (2024).
F. Betül Durak, Abdullah Talayhan, Serge Vaudenay
ePrint ReportThe proposed framework involves a client (referring to the user or their devices), an identity manager (which authenticates the client), and an agent (which executes the action upon receiving consent). It supports various applications and ensures compatibility with existing identity managers. We require the client to keep no more than a password. The design addresses several security and privacy challenges, including preventing offline dictionary attacks, ensuring non-repudiable consent, and preventing unauthorized actions by the agent. Security is maintained even if either the identity manager or the agent is compromised, but not both.
Our notion of an identity manager is broad enough to include combinations of different authentication factors such as a password, a smartphone, a security device, biometrics, or an e-passport. We demonstrate applications for signing PDF documents, e-banking, and key recovery.