IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
12 August 2025
Ivan Tjuawinata, Yann Fraboni, Ziyao Liu, Jun Zhao, Pu Duan, Kwok-Yan Lam
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
Zvika Brakerski, Offir Friedman, Daniel Golan, Alon Gurni, Dolev Mutzari, Ohad Sheinfeld
Arithmetic operations (modulo $2^n$) are supported natively similarly to BGV-style FHE schemes, and we present an efficient bootstrapping procedure for our scheme. Our bootstrapping algorithm has the feature that along the way it decomposes our machine word into bits, so that during bootstrapping it is possible to perform logical operations (essentially addressing each bit in the message independently). This means that during a single bootstrapping cycle we can perform logical operations on $n$ bits. For example, a "greater than" operation (if $x> y$ output $1$, otherwise $0$), only requires a single subtraction and a single bootstrapping cycle.
Along the way we present a number of new tools and techniques, such as a generalization of the BGV modulus switching to a setting where the plaintext and ciphertext moduli are ideals (and not numbers).
Cong Ling, Andrew Mendelsohn, Christian Porter
Tianpei Lu, Bingsheng Zhang, Hao Li, Kui Ren
Giacomo Fenzi, Yuwen Zhang
We present a non-recursive proof compression technique to reduce the size of hash-based succinct arguments. The technique is black-box in the underlying succinct arguments, requires no trusted setup, can be instantiated from standard assumptions (and even when $\mathsf{P} = \mathsf{NP}$!) and is concretely efficient.
We implement and extensively benchmark our method on a number of concretely deployed succinct arguments, achieving compression across the board to as much as $60\%$ of the original proof size. We further detail non-black-box analogues of our methods to further reduce the argument size.
Mojtaba Rfiee, Mehdi Abri
Gorjan Alagic, Fahran Bajaj, Aybars Kocoglu
Emanuele Bellini, Rocco Brunelli, David Gerault, Anna Hambitzer, Marco Pedicini
11 August 2025
Taipei, Taiwan, 8 March 2026
Submission deadline: 1 November 2025
Notification: 19 December 2025
Sapporo, Japan, 16 December - 18 December 2025
Submission deadline: 22 August 2025
Notification: 12 October 2025
Brandenburg University of Technology Cottbus-Senftenberg, chair of IT Security; Cottbus, Germany,
Tasks:
- Active research in the area of intrusion detection systems (IDS) for critical infrastructures, secure cyber-physical systems, and artificial intelligence / machine learning for traffic analysis
- Implementation and evaluation of new algorithms and methods
- Cooperation and knowledge transfer with industrial partners
- Publication of scientific results
- Assistance with teaching
The employment takes place with the goal of doctoral graduation (obtaining a PhD degree).
Requirements:
- Master’s degree (or equivalent) in Computer Science or related disciplines
- Strong interest in IT security and/or networking and distributed systems
- Knowledge of at least one programming language (C++, Java, etc.) and one scripting language (Perl, Python, etc.) or strong willingness to quickly learn new programming languages
- Linux/Unix skills
- Knowledge of data mining, machine learning, statistics and result visualization concepts is of advantage
- Excellent working knowledge of English; German is of advantage
- Excellent communication skills
For more information about the vacant position please contact Prof. A. Panchenko (E-Mail: itsec-jobs.informatik@lists.b-tu.de). We value diversity and therefore welcome all applications – regardless of gender, nationality, ethnic and social background, religion/belief, disability, age, sexual orientation, and identity. The BTU Cottbus-Senftenberg strives for a balanced gender relation in all employee groups. Applicants with disabilities will be given preferential treatment if they are equally qualified.
Applications containing the following documents:
Closing date for applications:
Contact: Prof. Andriy Panchenko (E-Mail: itsec-jobs.informatik@lists.b-tu.de)
More information: https://www.b-tu.de/en/fg-it-sicherheit
Shandong University, School of Cyber Science & Technology; Qingdao, China
Shandong University (SDU) stands as a prestigious beacon of academic excellence in China, renowned for its rich history, diverse academic programs, and commitment to fostering innovation and leadership. The School of Cyber Science and Technology (CST) has a faculty devoted to high-level research and teaching, led by Prof. Wang Xiaoyun, an academician of the Chinese Academy of Sciences.
About NSFC Excellent Young Scholars Fund (Overseas)The fund aims to encourage talented overseas scholars who have demonstrated notable accomplishments in natural science, engineering technology, and other fields, to return to or join China for employment. For more detailed information, please refer to: "https://www.nsfc.gov.cn/publish/portal0/tab434/info95371.htm" (in Chinese).
Eligibility- Applicants must be born on or after January 1, 1985, and have a doctoral degree.
- During the period after obtaining the doctoral degree and prior to September 15, 2025, the applicant should generally have obtained a formal teaching or research position in renowned overseas universities, scientific research institutions, or corporate R&D units, and have worked for no less than 36 consecutive months. The time limit can be relaxed as appropriate for those who obtained their doctoral degree overseas.
SDU encourages global young talents to apply in the following (and related) research areas:
- Cryptography
- Cybersecurity
- AI Security
- Theoretical CS
- Computer Architecture and Trustworthy Systems
- Information and Coding Theory
For successful applicants, the following benefits are provided:
- Position: Appointed to a tenured professor position.
- Funding: Substantial research funding.
- Salaries: Competitive salaries and comprehensive benefits package, Opportunities for career advancement and professional growth within dynamic and supportive academic environment
Closing date for applications:
Contact:
For any inquiries or further information, please contact Prof. Sihuang Hu:
- Email: husihuang@sdu.edu.cn
- WeChat: sihuanghu
Shaoxing University
Closing date for applications:
Contact: Dr Mehdi Gheisari
08 August 2025
Nir Bitansky, Saroja Erabelli, Rachit Garg, Yuval Ishai
The main open question in this context is which functions $f$ can be computed in the shuffle model with statistical security. While general feasibility results were obtained using public-key cryptography, the question of statistical security has remained elusive. The common conjecture has been that even relatively simple functions cannot be computed with statistical security in the shuffle model.
We refute this conjecture, showing that all functions can be computed in the shuffle model with statistical security. In particular, any differentially private mechanism in the central curator model can also be realized in the shuffle model with essentially the same utility, and while the evaluator learns nothing beyond the central model result.
This feasibility result is obtained by constructing a statistically secure additive randomized encoding (ARE) for any function. An ARE randomly maps individual inputs to group elements whose sum only reveals the function output. Similarly to other types of randomized encoding of functions, our statistical ARE is efficient for functions in $NC^1$ or $NL$. Alternatively, we get computationally secure ARE for all polynomial-time functions using a one-way function. More generally, we can convert any (information-theoretic or computational) ``garbling scheme'' to an ARE with a constant-factor size overhead.
Yu Zhang, Zongbin Wang
Jaehyung Kim
Malte Andersch, Cezary Pilaszewicz, Marian Margraf
07 August 2025
Shanuja Sasi, Asaf Cohen, Onur Günlü
Daniel Collins, Paul Rösler
In this work, we limit the power of CGKA to identify and analyze its core components. More concretely, we consider the case that all members of a group are always either senders or receivers. Thus, the interaction is strictly unidirectional from the former to the latter: a group of senders Alice establishes shared keys with a group of receivers Bob. With every shared key, Alice updates her local state to achieve FS and PCS; when receiving an established key, each Bob also updates their local state to achieve FS. This notion naturally lifts the so called Unidirectional Ratcheted Key Exchange concept (Bellare et al., Crypto 2017; Poettering and Rösler, Crypto 2018) to the group setting and, thereby, captures and generalizes Signal's Sender Key Mechanism, which is the core of WhatsApp and Signal's group chat protocols. We modularize this concept of Group Unidirectional RKE (GURKE) by considering either single or multiple senders, single or multiple receivers, and static or dynamic membership on each of both sides of the group.
To instantiate these new primitives, we develop a building block called Updatable Broadcast KEM (UB-KEM). Using UB-KEM, our GURKE constructions for static groups only use standard Key Encapsulation Mechanisms (KEMs) and induce only a constant communication overhead. Our GURKE constructions for dynamic groups are based on general Non-Interactive Key Exchange (NIKE) and offer a constant communication overhead as long as the set of members is unchanged; only for adding and removing users, a communication overhead logarithmic in the group size is induced. We discuss the benefits of replacing the Sender Key Mechanism in Signal and WhatsApp with our constructions, and demonstrate their practicality with a performance evaluation of our proof of concept UB-KEM implementation.