17 December 2024
Freie Universität Berlin
Closing date for applications:
Contact: Please send your application until 31.12.2024 with relevant documents in PDF format (preferably as a single file) electronically by email, including the reference number, to [email protected] (cc: [email protected]).
More information: https://www.fu-berlin.de/universitaet/beruf-karriere/jobs/wiss/19_fb-mathematik-und-informatik/MI-WiMi-EASEPROFIT.html
University of Amsterdam, Netherlands
For more information and to apply, please visit https://werkenbij.uva.nl/en/vacancies/phd-position-in-secure-multi-party-computation-netherlands-13605. The closing date for the applications is 15 April 2025 (for full consideration, you are encouraged to apply on or before 15 March 2025).
Closing date for applications:
Contact: Divya Ravi ([email protected])
More information: https://werkenbij.uva.nl/en/vacancies/phd-position-in-secure-multi-party-computation-netherlands-13605
University of South Florida, College of AI, Cybersecurity, and Computing
Closing date for applications:
Contact: See the advertisement for the details.
More information: https://www.usf.edu/work-at-usf/careers/
UC Santa Cruz (UCSC)
My group’s focus is on bridging the security/efficiency gap between cryptography/security and real-world systems/databases. We conduct our research and publish our findings in top-tier venues in security (e.g., USENIX Security, IEEE Security & Privacy, CCS, NDSS), cryptography (e.g., CRYPTO, Eurocrypt), and systems/databases (e.g., SIGMOD, VLDB, SOSP). Our research mission is to develop cryptographic solutions and real systems that are simultaneously practical, efficient, and provably secure. You can review my recent publications on my website: https://idemertzis.com .
- (1) PhD applicants should hold a BS/MS in computer science, electrical and computer engineering, information security, mathematics, or a related field, with strong analytical, mathematical, coding, and software engineering skills. Interested candidates should email me their CV, a brief summary of research experience and interests, and a personal website link (if available).
Please submit your application here: https://grad.soe.ucsc.edu/admissions (Computer Science & Engineering→ Apply to PhD) and mention my name in your application.
- (2) Post-doctoral applicants please email me your CV and your research statement (if available).
Closing Date for Application: December 20, 2024
Closing date for applications:
Contact: Ioannis Demertzis ([email protected])
University of New South Wales, Canberra
Closing date for applications:
Contact: The role of RA is to report to Prof. Jiankun Hu and have Prof. Jiankun Hu direct reports. Please contact Prof. Hu at [email protected] for details.
TU WIEN, Vienna, Austria
The TU Wien, Austria's leading institution for technology and science, invites applications for a PhD position in Privacy-Enhancing Technologies (PET). Our research spans cryptographic protocols, zero-knowledge proof systems, information-theoretic approaches such as differential privacy, and challenges in distributed settings, including privacy-preserving cryptocurrencies. We aim to advance both fundamental theory and practical solutions with real-world impact.
Your profile:
- Academic Excellence: Outstanding Master’s degree in Computer Science, Mathematics, or a closely related field.
- Problem-Solving Passion: Enthusiastic about tackling challenging and complex problems.
- Curiosity: Eager to learn and grow in a dynamic research environment.
- Team Spirit: Positive thinker with a supportive and collaborative mindset.
- Research Experience: Prior experience in privacy, cryptography, or distributed systems is an advantage but not required.
- Communication: Proficient in written and spoken English for effective collaboration and dissemination of research.
- Independent Thinking: Capable of working autonomously while contributing to a team-oriented environment.
- Innovative Mindset: Open to exploring novel approaches and solutions in privacy-enhancing technologies.
How to apply
Applications must be submitted over the TU Wien here https://jobs.tuwien.ac.at/Job/244516"> More information: https://www.pets.wienClosing date for applications:
Contact: Univ. Prof. Dr. Dominique Schröder
More information: https://jobs.tuwien.ac.at/Job/244516
University of Wollongong, Australia
Closing date for applications:
Contact: Willy Susilo ([email protected]) and Dung Hoang Duong ([email protected])
Assistant Professorship (W2TT)/University Professorship (W3) Cybersecurity & Artificial Intelligence
Technical University Darmstadt/Fraunhofer-Gesellschaft
to represent the field of "Cybersecurity and Artificial Intelligence" in both research and teaching. The scientific focus of the position should be on application-oriented aspects of cybersecurity with strong references to machine learning and other artificial intelligence techniques, e.g.:
For more information on the structure of the professorship and the opportunity to apply, please refer to the full advertisement on the TU Darmstadt website.
Closing date for applications:
Contact: For further information or questions, please contact Prof. Dr. Michael Waidner (professor of TU Darmstadt and CEO of ATHENE): [email protected]
More information: https://www.tu-darmstadt.de/universitaet/karriere_an_der_tu/stellenangebote/aktuelle_stellenangebote/stellenausschreibungen_detailansichten_1_572736.en.jsp
Technical University Darmstadt/Fraunhofer-Gesellschaft
to represent the field of "Applied Cybersecurity" in both research and teaching.
The scientific focus of the position should be on application-oriented aspects of cybersecurity, e.g.:
For more information on the structure of the professorship and the opportunity to apply, please refer to the full advertisement on the TU Darmstadt website.
Closing date for applications:
Contact: For further information or questions, please contact Prof. Dr. Michael Waidner (professor of TU Darmstadt and CEO of ATHENE): [email protected]
More information: https://www.tu-darmstadt.de/universitaet/karriere_an_der_tu/stellenangebote/aktuelle_stellenangebote/stellenausschreibungen_detailansichten_1_572672.en.jsp
Research Institute CODE, Universität der Bundeswehr München, Germany
- Advanced encryption: algorithmic techniques for FHE and SNARKs, updatable encryption
- Secure computation: MPC techniques and protocol design, PSI
- PQC techniques for any of the aforementioned areas
They will work closely with members of the Privacy and Applied Cryptography (PACY) lab, led by Prof. Mark Manulis, and the Quantum-Safe and Advanced Cryptography (QuSAC) lab, led by Prof. Daniel Slamanig. Candidates will benefit from our modern infrastructure and availability of funds to support own research. Also, Munich is amongst best places to live in Germany.
Positions are available for immediate start (~58k to 74k EUR p.a. depending on qualifications and experience). Initial contracts are for 1.5 - 2 years.
Requirements:
- Master's degree (or equivalent) or PhD in Mathematics, Cryptography, or Computer Science with excellent grades
- Solid knowledge and demonstrable experience in any of the aforementioned research areas
- Post-doc candidates must have a strong track record (ideally with publications at IACR conferences and/or the top 4 security conferences) and good academic writing and presentation skills
- Experience with cryptographic implementations (desirable)
- Proficiency in English (essential) and German (desirable but not essential)
- Eligible candidates must hold a working permit for the EU.
Closing date for applications:
Contact: Applications (cover letter, CV, transcripts, contacts for references) can be emailed to Prof. Mark Manulis (mark.manulis AT unibw.de).
More information: https://www.unibw.de/pacy-en/vacancies
15 December 2024
Madhurima Das, Bodhisatwa Mazumdar
Jorge Nakahara Jr
Hasan Ozgur Cildiroglu, Oguz Yayla
Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng
In this paper, we initiate the study of impact tracing. Intuitively, impact tracing traces influential spreaders central to disseminating misinformation while providing privacy protection for non-influential users. We introduce noises to hide non-influential users and demonstrate that these noises do not hinder the identification of influential spreaders. Then, we formally prove our scheme's security and show it achieves differential privacy protection for non-influential users. Additionally, we define three metrics to evaluate its traceability, correctness, and privacy using real-world datasets. The experimental results show that our scheme identifies the most influential spreaders with accuracy from 82% to 99% as the amount of noise varies. Meanwhile, our scheme requires only a 6-byte platform storage overhead for each message while maintaining a low messaging latency (< 0.25ms).
Ben Fisch, Zeyu Liu, Psi Vesely
Concretely, our scheme has smaller proofs than most other succinct post-quantum arguments for large statements. For binary vectors of length $2^{30}$ we achieve $302$KiB linear map evaluation proofs with evaluation binding, and $1$MiB proofs when extractability is required; for $32$-bit integers these sizes are $494$KiB and $1.6$MiB, respectively.