IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 November 2015
Eiichiro Fujisaki, Keita Xagawa
This short note disproves the security of their KDF by giving $\\Phi_{hoe\\&iocr}$-RKAs by exploiting the components of their KDF. We note that their proof is still correct for $\\Phi$-CNM for a subset of $\\Phi_{hoe\\&iocr}$; for example the KDF satisfies $\\Phi_{poly(d)}$-CNM, in which an adversary can tamper with a secret by using polynomials of degree at most $d$.
Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
- A linear near-threshold secret sharing scheme with both linear time sharing and reconstruction algorithms and large secrets (i.e. secrets of size Omega(n)). Thus, the computational overhead per shared bit in this scheme is constant.
- An efficiently reconstructible robust secret sharing scheme for n/3 0) with shares of optimal size O(1 + sec / n) and secrets of size Omega(n + sec), where sec is the security parameter.
06 November 2015
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
Bitansky, Paneth, and Rosen [FOCS 2015] prove the hardness of PPAD assuming the existence of quasi-polynomially hard indistinguishability obfuscation and sub-exponentially hard one-way functions. This leaves open the possibility of basing PPAD hardness on simpler, polynomially hard, computational assumptions.
We make further progress in this direction and reduce PPAD hardness directly to polynomially hard assumptions.
Our first result proves hardness of PPAD assuming the existence of *polynomially hard* indistinguishability obfuscation (IO) and one-way permutations. While this improves upon Bitansky et al.\'s work, it does not give us a reduction to simpler, polynomially hard computational assumption because constructions of IO inherently seems to require assumptions with sub-exponential hardness. In contrast, {\\em public key functional encryption} is a much simpler primitive and does not suffer from this drawback. Our second result shows that $\\ppad$ hardness can be based on {\\em polynomially hard} public key functional encryption and one-way permutations. Our results further demonstrate the power of polynomially hard public key functional encryption which is believed to be weaker than indistinguishability obfuscation.
Ming Li, Mingxing Wang, Dongdai Lin
05 November 2015
Arpita Maitra, Goutam Paul, Asim K. Pal
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
David Derler, Daniel Slamanig
In this paper we answer this question and introduce practical constructions of WE that are expressive enough to elegantly solve the seeming paradox sketched above. To this end, we restrict the class of supported languages from any NP-language to algebraic languages (defined over bilinear groups). In doing so, we obtain simple generic constructions, which only rely on smooth projective hash functions and can be instantiated from standard assumptions. Based on our generic constructions, we then show how to encrypt a message with respect to a given ring signature. Thereby, we only use information from a given ring signature (specifying an NP-language) such that only the anonymous signer behind the ring signature can decrypt (as only she holds the respective witness). In particular, we provide efficient instantiations for any ring signature scheme obtained from EUF-CMA-secure signature schemes and witness-indistinguishable Groth-Sahai proofs.
Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
As an immediate application, our scheme is the first to provide a way to outsource large databases to untrusted servers, and later query and update the database over time in a private and verifiable way, with complexity and description size proportional to those of the unprotected queries.
Our scheme extends the non-adaptive RAM garbling scheme of Canetti and Holmgren [ITCS 2016]. We also define and use a new primitive, called adaptive accumulators, which is an adaptive alternative to the positional accumulators of Koppula et al [STOC 2015] and somewhere statistical binding hashing of Hubacek and Wichs [ITCS 2015]. This primitive might well be useful elsewhere.
Michele Mosca
There are viable options for quantum-proofing our cryptographic infrastructure, but the road ahead is neither easy nor fast.
Impressive progress in developing the building blocks of a fault-tolerant scalable quantum computer indicates that the prospect of a large-scale quantum computer is a medium-term threat. For example, I estimate a $1/2$ chance of breaking RSA-2048 by $2031$.
In this note, I briefly overview the problem, the solutions and some of the next steps.
Razvan Barbulescu
Kim [Kim15]. We show that the discrete logarithm problem in fields GF(Q) where Q = p n wit^ p of medium size and n having a factor of the good size (specified in the article) has a complexity of
L_Q(1/3, (48/9)^(1/3)).
Dibyendu Roy, Sourav Mukhopadhyay
04 November 2015
Bo Tang, Jiapeng Zhang
We prove our results by extending the connection between traitor tracing systems and differentially private database sanitizers to the setting with random oracle access. After that, we prove the lower bound for traitor tracing schemes by constructing a differentially private sanitizer that only queries the random oracle polynomially many times. In order to reduce the query complexity of the sanitizer, we prove a large deviation bound for decision forests, which might be of independent interest.
03 November 2015
Indiana University Bloomington
****** Official Announcement **********
The School of Informatics and Computing (SoIC) at Indiana University Bloomington invites applications for a faculty position in Security Informatics. The position is open at all levels (assistant, associate, or full professor). Duties include teaching, research, and service.
Applications are welcome from information and computer scientists in a wide range of areas including but not limited to usable security, human-centered design, identity, social informatics of security, and design for privacy.
Applicants should have an established record (for senior level) or demonstrable potential for excellence (for junior level) in research and teaching, and a PhD in a relevant area or (for junior level) expected before 8/2016.
The SoIC is the first of its kind and among the largest in the country, with unsurpassed breadth. Its mission is to excel and lead in education, research, and outreach spanning and integrating the full breadth of computing and information technology. It includes Computer Science, Informatics, and Information and Library Science, with over 100 faculty, 900 graduate students, and 1500 undergraduate majors on the Bloomington Campus. It offers PhDs in Computer Science, Informatics, and Information Science.
Bloomington is a culturally thriving college town with a moderate cost of living
Vladimir Kolesnikov, Alex J. Malozemoff
Asharov and Orlandi (AO) propose a practical protocol in the PVC model, which, however, relies on a specific expensive oblivious transfer (OT) protocol incompatible with OT extension. In this work, we improve the performance of the PVC model by constructing a PVC-compatible OT extension as well as making several practical improvements to the AO protocol. As compared to the state-of-the-art OT extension-based two-party covert protocol, our PVC protocol adds relatively little: four signatures and an $\\approx 67\\%$ wider OT extension matrix. This is a significant improvement over the AO protocol, which requires public-key-based OTs per input bit. We present detailed estimates showing (up to orders of magnitude) concrete performance improvements over the AO protocol and a recent malicious protocol.
Steve Lu, Rafail Ostrovsky
One of the main advantages of cloud computing is not only that it has large storage but also that it has a large number of parallel processors. Despite multiple successful efforts on parallelizing (interactive) Oblivious RAM, the non-interactive garbling of parallel programs remained open until very recently. Specifically, Boyle, Chung and Pass in their upcoming TCC 2016 paper (see their recently updated eprint version) have recently shown how to garbled PRAM program with poly-logarithmic (parallel) overhead assuming non-black-box use of identity-based encryption. The question whether such a strong assumption and non-black-box use of such a strong assumption are needed. In this paper, we resolve this important open question and show how to garble parallel programs, with only black-box use one one-way functions and with only poly-log overhead in the (parallel) running time. Our result works for any number of parallel processors.
Yuanxi Dai, John Steinberger
from a random permutation. This result comes on the heels of (and is
part of the same body of work as) a 10-round indifferentiability
result for Feistel network recently announced by the same team of
authors. The current 8-round simulator achieves similar security,
query complexity and runtime as the 10-round simulator and is not
significantly more involved. The security of our simulator is also
slightly better than the security of the 14-round simulator of
Holenstein et al. for essentially the same runtime and query
complexity.
02 November 2015
Institute of Computer Science, University of Tartu, Estonia
• Algebraic coding theory
• Combinatorial coding theory
• Network coding
• Any area related to coding theory
Salary is at least 2000 euro per month before taxes plus social benefits, depending on qualification and experience. Some travel money will also be provided. Cost of living in Estonia is quite low, see e.g. http://www.expatistan.com/cost-of-living. Employment contract is till 31st December 2017.
A successful candidate should:
• Hold a Ph.D. degree
• Have a strong background in coding theory or a related field
• Have an international publication record at outstanding venues
To apply, please submit the following documents (by email):
• Application letter
• Research statement
• Curriculum vitae
• Publication list
• Copies of documents about academic degrees
• Two letters of reference (make sure they reach us by the application deadline)
Deadline for applications: 2nd December 2015
Hoeteck Wee
Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov