02 December 2024
University of Sheffield
Closing date for applications:
Contact: Dr Aryan Pasikhani aryan.pasikhani@sheffield.ac.uk
Carnegie Mellon University, CyLab; Pittsburgh, PA, USA
The CyLab Security and Privacy Institute at Carnegie Mellon University is leading a university-wide priority hiring search for tenure-track faculty who focus on security or privacy and will be appointed in relevant academic departments throughout the university.
CyLab is a university-wide umbrella organization that works to catalyze, support, promote, and strengthen collaborative security and privacy research and education across departments, disciplines, and geographic boundaries to achieve significant impact on research, education, public policy, and practice. Successful applicants will be appointed in the most relevant department or jointly in two departments, depending on research focus and needs.
CyLab welcomes applicants with research and teaching interests that fit within the broad computer security and privacy space. Areas of interest include, but are not limited to, systems security, software security, hardware security, applied cryptography, usable privacy and security, security and privacy policy, national and international cybersecurity policy, economics of security and privacy, security and privacy of AI/ML and using AI/ML for security and privacy, blockchain security and privacy, security for cyber physical systems, security and privacy of robotics and autonomous systems, and privacy engineering.
We are especially interested in candidates with diverse backgrounds and a demonstrated commitment to excellence and leadership in research, undergraduate and graduate teaching, and service towards building an equitable and diverse scholarly community.
Carnegie Mellon considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, sexual orientation, gender identity, and any additional legally protected status.
Applications should be submitted through the CyLab Interfolio site by December 11, 2024: https://apply.interfolio.com/151331 Opens in new window. Applications may be shared with members of any of the participating departments. See https://www.cylab.cmu.edu/about/hiring.html for more information.
Closing date for applications:
Contact: Lujo Bauer or Sarah Scheffler, cylab-faculty-search@andrew.cmu.edu
More information: https://www.cylab.cmu.edu/about/hiring.html
Riverside Research
Closing date for applications:
Contact: Colette Bryan
The IACR Test-of-Time Award honors papers published at the 3 IACR flagship conferences 15 years ago which have had a lasting impact on the field.
The Test-of-Time award for Asiacrypt 2009 is awarded to the following two papers:
Fiat-Shamir with aborts:Applications to lattice and factoring-based signatures, by Vadim Lyubashevsky
For inventing the abort technique in the Fiat-Shamir transformation, which became the foundation of the NIST-standardized Dilithium lattice-based signature scheme.
Efficient public key encryption based on ideal lattices, by Damien Stehlé, Ron Steinfeld, Keisuke Tanaka and Keita Xagawa
For introducing the first efficient public-key encryption scheme with security based on the worst-case hardness of the approximate Shortest Vector Problem in structured ideal lattices.
Sela Navot, Stefano Tessaro
Jakob Burkhardt, Hannah Keller, Claudio Orlandi, Chris Schwiegelshohn
We introduce the linear-transformation model, where clients have access to a trusted platform capable of applying a public matrix to their inputs. Such computations can be securely distributed across multiple servers using simple and efficient secure multiparty computation techniques.
The linear-transformation model serves as an intermediate model between the highly expressive central model and the minimal local model. In the central model, clients have access to a trusted platform capable of applying any function to their inputs. However, this expressiveness comes at a cost, as it is often expensive to distribute such computations, leading to the central model typically being implemented by a single trusted server. In contrast, the local model assumes no trusted platform, which forces clients to add significant noise to their data. The linear-transformation model avoids the single point of failure for privacy present in the central model, while also mitigating the high noise required in the local model.
We demonstrate that linear transformations are very useful for differential privacy, allowing for the computation of linear sketches of input data. These sketches largely preserve utility for tasks such as private low-rank approximation and private ridge regression, while introducing only minimal error, critically independent of the number of clients. Previously, such accuracy had only been achieved in the more expressive central model.
David Pointcheval, Robert Schädlich
Subsequently, we introduce the notion of Multi-Client Predicate Encryption (MC-PE) which, in contrast to MC-ABE, does not only guarantee message-hiding but also attribute-hiding. We present a new compiler that turns any constant-arity MC-ABE into an MC-PE for the same arity and policy class. Security is proven under the LWE assumption.
Asmita Adhikary, Giacomo Tommaso Petrucci, Philippe Tanguy, Vianney Lapôtre, Ileana Buhan
Kyeongtae Lee, Seongho Park, Byeongjun Jang, Jihye Kim, Hyunok Oh
We propose two constructions of $\textsf{LiLAC}$: a field-agnostic $\textsf{LiLAC}$ and a field-specific $\textsf{LiLAC}$. Each construction demonstrates superior performance compared to the state-of-the-art techniques in their respective categories of MLPCS. First, the field-agnostic $\textsf{LiLAC}$ is compared against Brakedown (CRYPTO 2023), which is based on a tensor IOP and satisfies field-agnosticity. In experiments conducted over a 128-bit field with a coefficient size of $2^{30}$, the field-agnostic $\textsf{LiLAC}$ achieves a proof size that is $3.7\times$ smaller and a verification speed that is $2.2\times$ faster, while maintaining a similar proof generation time compared to Brakedown. Furthermore, the field-specific $\textsf{LiLAC}$ is evaluated against WHIR (ePrint 2024/1586), which is based on an FRI. With a 128-bit field and a coefficient size of $2^{30}$, the field-specific $\textsf{LiLAC}$ achieves a proof generation speed that is $2.8\times$ faster, a proof size that is $27\%$ smaller, and a verification speed that is $14\%$ faster compared to WHIR.
Mojtaba Fadavi, Sabyasachi Karati, Aylar Erfanian, Reihaneh Safavi-Naini
In this paper, we design a symmetric-key based fully dynamic group signature scheme, called DGMT, that redesigns DGM (Buser et al. ESORICS 2019) and removes its two important shortcomings that limit its application in practice: (i) interaction with the group manager for signature verification, and (ii) the need for storing and managing an unacceptably large amount of data by the group manager. We prove security of DGMT (unforgeability, anonymity, and traceability) and give a full implementation of the system. Compared to all known post-quantum group signature schemes with the same security level, DGMT has the shortest signature size. We also analyze DGM signature revocation approach and show that despite its conceptual novelty, it has significant hidden costs that makes it much more costly than using traditional revocation list approach.
Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud
Seyed MohammadReza Hosseini, Hossein Pilaram
Asier Gambra, Durba Chatterjee, Unai Rioja, Igor Armendariz, Lejla Batina
Nicholas Brandt, Mia Filić, Sam A. Markelon
Yackolley Amoussou-Guenou, Maurice Herlihy, Maria Potop Butucaru
Jiacheng Gao, Yuan Zhang, Sheng Zhong
Sofiane Azogagh, Zelma Aubin Birba, Marc-Olivier Killijian, Félix Larose-Gervais
29 November 2024
Aparna Gupte, Jiahui Liu, Justin Raizes, Bhaskar Roberts, Vinod Vaikuntanathan
In this work, we present new, meaningful, yet achievable definitions of one-time program security for *probabilistic* classical functions. We show how to construct one time programs satisfying these definitions for all functions in the classical oracle model and for constrained pseudorandom functions in the plain model. Finally, we examine the limits of these notions: we show a class of functions which cannot be one-time programmed in the plain model, as well as a class of functions which appears to be highly random given a single query, but whose one-time program form leaks the entire function even in the oracle model.