IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
20 October 2015
Ottawa, Canada, August 16 - August 18
Location: Ottawa, Canada
More Information: http://sacconference.org/
19 October 2015
Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
Zvika Brakerski, Gil Segev
We present a {\\em generic transformation} that converts any general-purpose public-key functional encryption scheme into a hierarchical one without relying on any additional assumptions. This significantly refines our understanding of the power of functional encryption, showing (somewhat surprisingly) that the existence of functional encryption is equivalent to that of its hierarchical generalization.
Instantiating our transformation with the existing functional encryption schemes yields a variety of hierarchical schemes offering various trade-offs between their delegation capabilities (i.e., the depth and width of their hierarchical structures) and underlying assumptions. When starting with a scheme secure against an unbounded number of collusions, we can support \\emph{arbitrary} hierarchical structures. In addition, even when starting with schemes that are secure against a bounded number of collusions (which are known to exist under rather minimal assumptions such as the existence of public-key encryption and shallow pseudorandom generators), we can support hierarchical structures of bounded depth and width.
Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
A large body of the recent work has focused on various constructions of non-malleable codes in the split-state model.
Many variants of NMCs have been introduced in the literature i.e. strong NMCs, super strong NMCs and continuous NMCs. Perhaps the most useful notion among these is that of continuous non-malleable codes, that allows for continuous tampering by the adversary.
In this paper we give the first efficient, information-theoretic secure construction of continuous non-malleable codes in $2$-split-state model. Enroute to our main result, we obtain constructions for almost all possible notion of non-malleable codes that have been considered in the split-state model, and for which such a construction is possible. Our result is obtained by a series of black-box reductions starting from the non-malleable codes from~\\cite{ADL14}.
One of the main technical ingredient of our result is a new concept that we call \\emph{inception coding}. We believe it may be of independent interest.
Léo Ducas, Thomas Prest
In this work, we discover that the ideas of the FFT can be applied to speed up the orthogonalization process of a circulant matrix. We show that, when $n$ is composite, it is possible to proceed to the orthogonalization in an inductive way, leading to a structured Gram-Schmidt decomposition. In turn, this structured Gram-Schmidt decomposition accelerates a cornerstone lattice algorithm: the Nearest Plane algorithm.
The results easily extend to cyclotomic rings, and can be adapted to Gaussian Samplers. This finds applications in lattice-based cryptography, improving the performances of
trapdoor functions.
Joseph Bonneau, Jeremy Clark, Steven Goldfeder
We can derive strong lower bounds on the computational min-entropy in each block: currently, at least 68 bits of min-entropy are produced every 10 minutes, from which one can derive over 32 near-uniform bits using standard extractor techniques. We show that any attack on this beacon would form an attack on Bitcoin itself and hence have a monetary cost that we can bound, unlike any other construction for a public randomness beacon in the literature. In our simplest construction, we show that a lottery producing a single unbiased bit is manipulation-resistant against an attacker with a stake of less than 50 bitcoins in the output, or about US$12,000 today. Finally, we propose making the beacon output available to smart contracts and demonstrate that this simple tool enables a number of interesting applications.
Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
Microsoft Research, Redmond, Washington
18 October 2015
MSCA Privacy&Us ITN
Funded by the EU H2020 Marie Sk?odowska-Curie program, the Privacy & Us Innovative Training Network will train thirteen creative, entrepreneurial and innovative early stage researchers (ESRs) to be able to reason, design and develop innovative solutions to questions related to the protection of citizens’ privacy, considering the multidisciplinary and intersectoral aspects of the issue. ESRs will be trained to face both current and future challenges in the area of privacy and usability.
The studentships have a duration of 36 months, starting August 2016. Students will be recruited and primarily based at the host institutions but will spend a minimum of six months in secondment to another member of the consortium or a partner organization.
All details (including consortium, positions, and application details) are available from the project website at
http://privacyus.cs.ucl.ac.uk/
17 October 2015
Kiwi Ki GmbH, Berlin, Germany
YOUR TASKS
* Design and implement firmware on embedded devices (ARM Cortex M0-M3-M4)
* Design, develop, code, test, verify and debug system software
* Review code and design
* Provide production and post-production support
YOUR QUALIFICATIONS
We are looking for an experienced engineer with
* Degree in Computer Science/Engineering/Electrical Engineering or equivalent work experience-surprise us!
* Experience in hands-on development and troubleshooting with embedded devices, including design and manufacture verification and board bring-up
* Solid programming experience with C
* Familiarity with ticket tracking tools, code review, unit testing, continuous integration, source control, and other tools for modern software development (except for GCC and GNU Make).
NICE TO HAVES
* Experience with ISM band communications/networking
* Bare-metal microcontroller development, including ARM Assembly
* Strong background in Cryptography
* Desire for strong coffee and stronger discussions
Come be a part of our diverse team! English and German are the main languages spoken in the office, however you will also be exposed to Spanish, French, and Polish.
WE OFFER
Our startup has a young international team, and you will be working with them in the heart of Berlin (no remotes, please). You
16 October 2015
Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
by Garg, Gentry and Halevi and fully homomorphic encryption by Smart
and Vercauteren. Our approach is based on a recent work by Cramer,
Ducas, Peikert and Regev on analysis of recovering a short generator of
an ideal of the q-th cyclotomic field from any generator of the ideal for
a prime power q. Unfortunately, the main result of Cramer et al. has
some flaws since they use an incorrect lower bound of the special values
of Dirichlet L-functions at 1.
Our main contribution is to correct Cramer et al.\'s main result by estimating explicit lower and upper bounds of the special values of Dirichlet L-functions at 1 for any non-trivial Dirichlet characters modulo a prime power. Moreover, we give various experimental evidence that recovering a short generator is succeeded with high probability. As a consequence, our analysis suggests that the security of the above cryptosystems based on the difficulty of recovering a short generator is reduced to solving the principal ideal problem under the number theoretical conjecture so-called Weber\'s class number problem.
Wenbin Zhang, Chik How Tan
Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
We ran the system with two servers doing the secure computation using a database with information on about 2500 users. Answers arrived in about 25 seconds.
Zhichao Zhao, T-H. Hubert Chan
expressive enough to setup digital contracts whose fund transfer can be enforced automatically.
In this paper, we design protocols for the bitcoin
voting problem, in which there are n voters, each of which wishes to fund exactly one of two candidates A and B. The winning candidate is determined by majority voting, while the privacy of individual vote is preserved. Moreover, the decision is irrevocable in the sense
that once the outcome is revealed, the winning candidate is guaranteed to have the funding from all n voters.
As in previous works, each voter is incentivized to follow the protocol by being required to put a deposit in the system, which will be used as compensation if he deviates from the protocol. Our solution is similar to previous protocols used for lottery, but needs
an additional phase to distribute secret random numbers via zero-knowledge-proofs. Moreover, we have resolved a security issue in previous protocols that could prevent compensation from being paid.
15 October 2015
Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guille
The development of techniques in the area of Template Attacks makes it feasible to extract a 256-bit secret key with only 257 traces.
This paper enhances the applicability of this attack by exploiting both the horizontal leakage of the carry propagation during the finite field multiplication, and the vertical leakage of the input data. As a further contribution, our method provides detection and auto-correction of possible errors that may occur during the key recovery. These enhancements come at the cost of extra traces, while still providing a practical attack. Finally, we show that the elliptic curve technology developed in PolarSSL running on a ARM STM32F4 platform is completely vulnerable, when used without any modifications or countermeasures.
Gunnar Alendal, Christian Kison, modg
of these devices and show several security weaknesses like RAM leakage, weak key attacks and even backdoors on some of these devices, resulting in decrypted user data, without the knowledge of any user credentials.