06 December 2024
Alexander John Lee
Kai Hu, Mustafa Khairallah, Thomas Peyrin, Quan Quan Tan
This new design framework being non-trivial to instantiate, we further propose a method for SPN ciphers using a genetic algorithm and leveraging advances in automated cryptanalysis: given a pool of good cipher candidates on $x$ rounds, our algorithm automatically generates and selects $(x+1)$-round candidates by evaluating their security and performance. We emphasize that our design pipeline is also the first to propose a fully automated design process, with completely integrated implementation and security analysis.
We finally exemplify our new design strategy on the important use-case of low-latency cryptography, by proposing the uKNIT-BC block cipher, together with a complete security analysis and benchmarks. Compared to the state-of-the-art in low-latency ciphers (PRINCEv2), uKNIT-BC improves on all crucial security and performance directions at the same time, reducing latency by 10%, while increasing resistance against classical differential/linear cryptanalysis by more than 10%. It also reduces area by 17% and energy consumption by 44% when fixing the latency of both ciphers. As a contribution of independent interest, we discovered a generalization of the Superposition-Tweakey (STK) construction for key schedules, unlocking its application to bit-oriented ciphers.
Ohad Klein, Ilan Komargodski, Chenzhi Zhu
This leaves many open problems, in particular, whether one can go below logarithmic round complexity by relaxing only one of the strong requirements from above. We manage to resolve this problem for commit-and-reveal style protocols, showing that - $\Omega(\log n/\log\log n)$ rounds are necessary if we settle for approximate fairness against very large (more than constant fraction) coalitions; - $\Omega(\log n)$ rounds are necessary if we settle for perfect fairness against $n^\epsilon$ size coalitions (for any constant $\epsilon>0$). These show that both relaxations made in prior works are necessary to go below logarithmic round complexity. Lastly, we provide several additional upper and lower bounds for the case of single-round commit-and-reveal style protocols.
Sofia Celi, Daniel Escudero, Guilhem Niot
Foteini Baldimtsi, Kostas Kryptos Chalkias, Varun Madathil, Arnab Roy
Through this analysis, we identify key gaps and challenges in current privacy solutions, highlighting areas where further research and development are needed to enhance privacy while maintaining scalability and security.
Ahmad Khoureich Ka
Nouri Alnahawi, Jacob Alperin-Sheriff, Daniel Apon, Alexander Wiesmaier
Qiuyan Du, Qiaohan Chu, Jie Chen, Man Ho Au, Debiao He
Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin
At the core of our constructions are efficient novel methods for evaluating $\mathsf{Gold}$ within two-party computation ($\mathsf{2PC}\text{-}\mathsf{Gold}$), achieving different security requirements. Here, the server $\mathcal{P}_s$ holds the PRF key $k$ whereas the client $\mathcal{P}_c$ holds the PRF input $x$, and they jointly evaluate $\mathsf{Gold}$ in 2PC. $\mathsf{2PC}\text{-}\mathsf{Gold}$ uses standard Vector Oblivious Linear Evaluation (VOLE) correlations and is information-theoretic and constant-round in the (V)OLE-hybrid model. We show:
• For a semi-honest $\mathcal{P}_s$ and a malicious $\mathcal{P}_c$: a $\mathsf{2PC}\text{-}\mathsf{Gold}$ that just uses a single (V)OLE correlation, and has a communication complexity of $3$ field elements ($2$ field elements if we only require a uniformly sampled key) and a computational complexity of $\mathcal{O}(\lambda)$ field operations. We refer to this as half-malicious security.
• For malicious $\mathcal{P}_s$ and $\mathcal{P}_c$: a $\mathsf{2PC}\text{-}\mathsf{Gold}$ that just uses $\frac{\lambda}{4} + \mathcal{O}(1)$ VOLE correlations, and has a communication complexity of $\frac{\lambda}{4} + \mathcal{O}(1)$ field elements and a computational complexity of $\mathcal{O}(\lambda)$ field operations.
These constructions support additional features and extensions, e.g., batched evaluations with better amortized costs where $\mathcal{P}_c$ repeatedly evaluates the PRF under the same key.
Furthermore, we extend $\mathsf{2PC}\text{-}\mathsf{Gold}$ to Verifiable OPRFs and use the methodology from Beullens et al. (ePrint’24) to obtain strong OPRF security in the universally composable setting.
All the protocols are efficient in practice. We implemented $\mathsf{2PC}\text{-}\mathsf{Gold}$—with (PQ) VOLEs—and benchmarked them. For example, our half-malicious (resp. malicious) $n$-batched PQ OPRFs incur about $100$B (resp. $1.9$KB) of amortized communication for $\lambda = 128$ and large enough $n$.
Jake Januzelli, Jiayu Xu
1. Regarding (T)OMDH, we show (T)OMDH is part of the $Q$-DL hierarchy in the AGM; in particular, $Q$-OMDH is equivalent to $Q$-DL. Along the way we find and repair a flaw in the original GGM hardness proof of TOMDH, thereby giving the first correct proof that TOMDH is hard in the GGM.
2. Regarding OMDL, we show the $Q$-OMDL problems constitute an infinite hierarchy of problems in the AGM incomparable to the $Q$-DL hierarchy; that is, $Q$-OMDL is separate from $Q'$-OMDL if $Q' \neq Q$, and also separate from $Q'$-DL unless $Q = Q' = 0$.
Christopher Harth-Kitzerow, Georg Carle
In this work, we study several different stochastic and exact truncation approaches found in the MPC literature that require different slack sizes, i.e., additional bits required by each secret share to ensure correctness. We provide novel, improved construction for each truncation approach in the semi-honest 3-PC and malicious 4-PC settings, which reduce communication and round complexity up to three times. Moreover, we propose a truncation scheme that does not introduce any communication overhead in the online phase and exactly matches the accuracy of plaintext floating-point PyTorch inference of VGG-16 on the ImageNet dataset with over 80% accuracy using shares with a bitlength of only 32. This is the first time that high PPML accuracy is demonstrated on ImageNet.
Corentin Jeudy, Olivier Sanders
Véronique Cortier, Alexandre Debant, Pierrick Gaudry, Léo Louistisserand
Michael Adjedj, Constantin Blokh, Geoffroy Couteau, Antoine Joux, Nikolaos Makriyannis
Motivated by applications to embedded cryptocurrency wallets, where a single server maintains distinct, shared public keys with separate clients (i.e., a star-shaped topology), and with the goal of minimizing communication, we instantiate our protocol using Paillier encryption and suitable zero-knowledge proofs. To reduce computational overhead, we thoroughly optimize all components of our protocol under sound cryptographic assumptions, specifically small-exponent variants of RSA-style assumptions.
Finally, we implement our protocol and provide benchmarks. At the 128-bit security level, the signing phase requires approximately 50ms of computation time on a standard linux machine, and 2KB of bandwidth.
Zhao Minghui, Trevor Yap
Jia-Lin Chan, Wai-Kong Lee, Denis C.-K Wong, Wun-She Yap, Bok-Min Goi
05 December 2024
University of Vienna, Faculty of Computer Science; Vienna, Austria
The position is fully funded for 4 years with a starting date on 1st of March 2025 (the precise date is negotiable). If you are interested, please find more information on the website of University of Vienna, following the link above.
Application Deadline: 24.12.2024
Closing date for applications:
Contact: Karen Klein-Azari PhD ([email protected])
More information: https://jobs.univie.ac.at/job/University-assistant-predoctoral/1148095101/
Dubrovnik, Croatia, 29 June - 4 July 2025
Submission deadline: 30 January 2025
Notification: 15 February 2025
Télécom Paris, Palaiseau, France
Telecom Paris is looking for an Associate/Assistant Professor in cybersecurity.
Within the Computer Science and Networks (INFRES) department, the Cryptography and Cybersecurity (C2) team aims to develop skills in various areas of cybersecurity, including (i) security mechanisms for future wireless networks (6G, IIoT, ITS-G5, etc.), (ii) solutions tailored to the security of virtualized architectures and cloud infrastructures, and (iii) advanced detection mechanisms and effective automatic responses to cyberattacks.
Regarding teaching, Telecom Paris has very great needs in cybersecurity, whether to give courses or to manage teaching units. The Associate/Assistant professor recruited will strengthen the school's ability to coordinate, design and implement courses on the security of IT networks and systems, for example in the cloud, radio communications and vehicular networks. It is also expected that the recruited she/he will be able to take part in the general computer science courses taught in the first year.
Closing date for applications:
Contact: Sébastien Canard
More information: https://institutminestelecom.recruitee.com/l/en/o/assistantassociate-professor-in-cybersecurity
Koç University, İstanbul, Türkiye
The ideal candidate will have a visionary research agenda, an exceptional research and publication track record, and a strong commitment to academic excellence and innovation. The successful candidate will demonstrate dedication to undergraduate and graduate education and foster an inclusive learning environment.
Koç University is a private, non-profit institution in Istanbul, Türkiye, where English is the medium of instruction. It hosts the highest number of European Research Council (ERC) Grant recipients in Türkiye and continues to secure the largest research funding from Horizon 2020. The university provides a vibrant interdisciplinary research environment, including the Koç University School of Medicine, Hospital, Translational Medicine Research Center (KUTTAM), and Koç University Is Bank Artificial Intelligence Research Center (KUIS AI). Koç University is home to Türkiye’s largest GPU cluster, providing advanced infrastructure for leading-edge AI research.
The Department of Computer Science and Engineering at Koç University has world-renowned faculty with extensive awards and projects on both national and international levels. Our faculty is a national leader in AI research and is equally strong in high-performance computing (HPC), security, and networks, with a unique emphasis on interdisciplinary work that bridges AI and medicine. For more information about the department and its faculty, please visit cs.ku.edu.tr.
Koç University offers a competitive salary and benefits package, including housing support, private insurance, K-12 education support, and research startup funding.
Application Deadline: Evaluation of applications will begin on January, 20th and continue until all open positions are filled. All applications will be treated confidentially. Apply online via the link: https://academicjobsonline.org/ajo/jobs/29250
Closing date for applications:
Contact: [email protected]
More information: https://academicjobsonline.org/ajo/jobs/29250