IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
05 January 2016
TCC
04 January 2016
Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
ePrint ReportWe provide a toolbox based on \emph{analytic combinatorics} for these studies. It uses the structure of the considered polynomials to derive their generating functions and applies complex analysis techniques to get asymptotics. The toolbox is versatile and can be used for many different applications, including multivariate polynomial systems with arbitrarily many unknowns (of possibly different sizes) and simultaneous modular equations over different moduli. To demonstrate the power of this approach, we apply it to recent cryptanalytic results on number-theoretic pseudorandom generators for which we easily derive precise and formal analysis. We also present new theoretical applications to two problems on RSA key generation and randomness generation used in padding functions for encryption.
CRYPTO
CHES
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
ePrint ReportWe here consider iO with a slightly ``non-trivial'' notion of efficiency: the running-time of the obfuscator may still be ``trivial'' (namely, poly(|C|,lambda) . 2^n), but we now require that the obfuscated code is just slightly smaller than the truth table of C (namely poly(|C|,lambda) . 2^{n(1-epsilon)}, where epsilon >0); we refer to this notion as *iO with exponential efficiency*, or simply *exponentially-efficient iO (XiO)*. We show that, perhaps surprisingly, under the subexponential LWE assumption, subexponentially-secure XiO for polynomial-size circuits implies (polynomial-time computable) iO for all polynomial-size circuits.
Florida Atlantic University
Job PostingResearch areas of particular interest for this position include, but are not limited to, mathematical foundations of public key cryptography, post-quantum cryptography, computational algebra, and algorithmic number theory.
Applicants must possess a Ph.D. in Mathematics or a closely related field. Candidates in all areas of cryptology and information security will be considered.
For additional information, please contact us by email to mathsearch (at) fau.edu. This position is open until filled and may close without prior notice. Priority consideration will be given to applications received by January 31, 2016. To be considered for the position, all applicants must apply and complete the Faculty, Administrative, Managerial & Professional Position Application form available online through the Office of Human Resources at: https://jobs.fau.edu. Please submit a cover letter, vita, copy of your transcript, research statement and a teaching statement through this website.
In addition, please arrange to have three letters of recommendation sent by first class mail to: Chair of the Search Committee, Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Rd., Boca Raton, FL 33431 or by email to mathsearch (at) fau.edu.
A background check will be required for the candidate selected for this position.
Florida Atlantic University is an Equal Opportunity/Affirmative Action Institution. Individuals with disabilities, requiring accommodation, please call 561-297-3057. 711
Closing date for applications: 31 January 2016
Contact: Search Committee Chair, Department of Mathematical Sciences, 777 Glades RD, Boca Raton, FL 33431
Email: mathsearch (at) fau.edu
Phone: (561) 297-3340
Fax: (561) 297-2436
More information: https://jobs.fau.edu
Trento, Italy, 18 July - 21 July 2016
Event CalendarSubmission deadline: 29 February 2016
Notification: 22 April 2016
University of Westminster, Computer Science Department, London, UK
Job PostingThe successful candidate is expected to perform research on the aforementioned areas based on their experience and research interests. They must have strong background in Computer Science and/or Mathematics. They are expected to publish articles in well-known security related conferences and journals. Although all applications will be carefully evaluated, candidates with prior publications as well as research experience in the following areas are specifically encouraged to apply: cloud computing, security and privacy in cloud environments, trusted computing, applied cryptography, privacy in participatory sensing applications, and privacy in eHealth, secure e-Voting schemes and reputation systems.
Candidates should fulfil the following requirements:
- A Master degree in Computer Science or mathematics;
- Knowledge of Cryptographic Protocols;
- Cloud Computing Architecture;
- Good Academic Writing and Presentation Skills;
- Good Social and Organizational Skills;
The Cybersecurity group at the University of Westminster intends to increase the number of women in those areas where they are underrepresented. Therefore women are explicitly encouraged to apply.
Please note only HOME and EU students can apply for this position.
Starting Date: September 2016
Salary: £16,000/year
Closing date for applications: 15 February 2016
Contact: Informal project enquiries to Dr Antonis Michalas (a.michalas (at) westminster.ac.uk); www.amichalas.com
General enquiries to Dr Stephen Getting (s.getting (at) westminster.ac.uk) or Professor Taj Keshavarz (t.keshavarz (at) westminster.ac.uk)
More information: https://www.westminster.ac.uk/__data/assets/pdf_file/0008/396935/FST-19-Sharing-in-the-Rain-Towards-Security-and-Privacy
John Jones
ePrint ReportArnold Neumaier
ePrint ReportNicolas T. Courtois
ePrint ReportIn this paper we consider a simple variant of this problem with splitting in two in binary curves. We propose an algorithm with running time of the order of 2^{n/3} for this problem. This property clearly violates the generic group assumption for these curves.
Ali Can Atici, Cemal Yilmaz, Erkay Savas
ePrint ReportYalin Chen1, Jue-Sam Chou*2, Hung - Sheng Wu
ePrint Report03 January 2016
Department of Computer Science: University of Bristol
Job Posting- Human-computer interaction and interaction design.
- Programming languages (language design and implementation).
- Software verification and validation.
- Algorithms in the context of large-scale data.
Closing date for applications: 24 January 2016
More information: http://www.bristol.ac.uk/jobs/find/details.html?nPostingID=4087&nPostingTargetID=14995&option=28&sort=DESC&respnr=1&ID=Q
02 January 2016
Jiawei Yuan
ePrint ReportAndreas Hülsing, Joost Rijneveld, Fang Song
ePrint ReportBeing a little more specific and technical, the tight security stems from new multi-target notions of hash-function properties which we define and analyze. We give precise complexity for breaking these security properties under both classical and quantum generic attacks, thus establishing a reliable estimate for the quantum security of XMSS-T. Especially, we prove quantum upper and lower bounds for the query complexity tailored for cryptographic applications, whereas standard techniques in quantum query complexity have limitations such as they usually only consider worst-case complexity. Our proof techniques may be useful elsewhere.
We also implement XMSS-T and compare its performance to that of the most recent stateful hash-based signature scheme XMSS (PQCrypto 2011).
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
ePrint ReportYohei Watanabe, Junji Shikata
ePrint ReportIn this paper, we first propose the hierarchical IKE scheme without random oracles. Our hierarchical IKE scheme is secure under the symmetric external Diffie--Hellman (SXDH) assumption, which is known as the simple and static one. Furthermore, when the hierarchy depth is one (i.e. not hierarchical case), our scheme is the first IKE scheme that achieves constant-size parameters including public parameters, secret keys, and ciphertexts.
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S.M. Chow
ePrint ReportWe mainly follow Baecher et al. to formalize a game-based definition. Roughly, a function $f$ is non-malleable if given an image $y^* \leftarrow f(x^*)$ for a randomly chosen $x^*$, it is hard to output a mauled image $y$ with a $\phi$ from some transformation class s.t. $y = f(\phi(x^*))$. A distinctive strengthening of our non-malleable notion is that $\phi(x^*) = x^*$ is always allowed. We also consider non-malleability in adaptive setting, which stipulates non-malleability maintains even when an inversion oracle is available.
We investigate the relations between non-malleability and one-wayness in depth. In the non-adaptive setting, we show that for any achievable transformation class, non-malleability implies one-wayness for poly-to-one functions but not vise versa. In the adaptive setting, we show that for most algebra-induced transformation class, adaptive non-malleability (ANM) is equivalent to adaptive one-wayness (AOW) for injective functions. These two results establish interesting theoretical connections between non-malleability and one-wayness for functions, which extend to trapdoor functions as well, and thus resolve some open problems left by Kiltz et al. (EUROCRYPT 2010). Notably, the implication AOW $\Rightarrow$ ANM not only yields constructions of NMFs from adaptive trapdoor functions, which partially solves an open problem posed by Boldyreva et al (ASIACRYPT 2009), but also provides key conceptual insight into addressing copy attacks in the context of related-key attacks (RKA).
Finally, we show that NMFs lead to a simple black-box construction of continuous non-malleable key derivation functions recently proposed by Qin et al. (PKC 2015), which have proven to be very useful in achieving RKA-security for numerous cryptographic primitives.