IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 May 2025
Xinrui Yang, Yijian Zhang, Ying Gao, Jie Chen
In this paper, we propose a black-box construction of key-policy registered attribute-based encryption from lattice assumptions in the standard model. Technically, our starting point is the registration-based encryption scheme by Döttling et al. (Eurocrypt, 2023). Building on this foundation, we incorporate the public-coin evasive learning with errors (LWE) assumption and the tensor LWE assumption introduced by Wee (Eurocrypt, 2022) to construct a registered ABE scheme that supports arbitrary bounded-depth circuit policies. Compared to prior private-coin approaches, our scheme is based on more intuitive and transparent security assumptions. Furthermore, the entire construction relies solely on standard lattice-based homomorphic evaluation techniques, without relying on other expensive cryptographic primitives. The scheme also enjoys scalability: the sizes of the master public key, helper decryption key and ciphertext grow polylogarithmically with the number of users. Each user's key pair remains succinct, with both the public and secret keys depending solely on the security parameter and the circuit depth.
Fiona Fuchs, Felix Walter, Florian Tschorsch
08 May 2025
NIT Rourkela, India, 5 December - 7 December 2025
Submission deadline: 20 July 2025
Notification: 10 September 2025
Plataniás, Greece, 7 September - 10 September 2025
Lund University
Closing date for applications:
Contact: Christian Gehrmann
More information: https://lu.varbi.com/en/what:job/jobID:814348/
Blockstream
Blockstream was founded in 2014 by Dr. Adam Back and a group of fellow cryptographers and engineers passionate about Bitcoin and its potential to change the future of finance.
Our research team sits at the forefront of Bitcoin innovation, aiming to be a trusted, innovative, and impactful force in the space. We advance Bitcoin protocol and application development through cryptographic research, specifications, code, and active technical discussions within the community. We foster a collaborative, quality-focused environment that values deep thinking, long-term impact, and transparent, open-source contributions, empowering each member to contribute optimally.
We are seeking a talented Applied Cryptographer to join our research team and play a key role in our Post-Quantum Cryptography (PQC) initiative. You will be instrumental in researching, evaluating, and implementing post-quantum cryptographic solutions tailored for the unique challenges and opportunities within the Bitcoin ecosystem. This is a chance to contribute significantly to the long-term security and evolution of Bitcoin.
What You'll Be Doing (Responsibilities):- Adapt state-of-the-art post-quantum cryptography research to the Bitcoin domain, exploring features particularly relevant for Bitcoin (e.g., threshold signatures, signature aggregation, Taproot tweaking, silent payments, HD wallets).
- Explore, evaluate, and benchmark various approaches for concretely integrating post-quantum schemes into Bitcoin, analyzing their implications.
- Contribute to and review Bitcoin Improvement Proposals (BIPs) and adapt standardized cryptography for use in Bitcoin.
- Implement cryptography for potential usage in Bitcoin, emphasizing performance and correctness.
Closing date for applications:
Contact: Jonas Nick ([email protected])
More information: https://job-boards.greenhouse.io/blockstream/jobs/6859234
07 May 2025
Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
05 May 2025
Christoph U. Günther, Krzysztof Pietrzak
In the blockchain context, DHTs are vulnerable to Sybil attacks, where an adversary compromises the network by joining with many malicious nodes. Mitigating such attacks requires restricting the adversary's ability to create a lot of Sybil nodes. Surprisingly, the above applications take no such measures. Seemingly, existing techniques are unsuitable for the proposed applications.
For example, a simple technique proposed in the literature uses proof of work (PoW), where nodes periodically challenge their peers to solve computational challenges. This, however, does not work well in practice. Since the above applications do not require honest nodes to have a lot of computational power, challenges cannot be too difficult. Thus, even moderately powerful hardware can sustain many Sybil nodes.
In this work, we investigate using Proof of Space (PoSp) to limit the number of Sybils DHTs. While PoW proves that a node wastes computation, PoSp proves that a node wastes disk space. This aligns better with the resource requirements of the above applications. Many of them are related to storage and ask honest nodes to contribute a substantial amount of disk space to ensure the application's functionality.
With this synergy in mind, we propose a mechanism to limit Sybils where honest nodes dedicate a fraction of their disk space to PoSp. This guarantees that the adversary cannot control a constant fraction of all DHT nodes unless it provides a constant fraction of whole the disk space contributed to the application in total. Since this is typically a significant amount, attacks become economically expensive.
Lyudmila Kovalchuk, Bingsheng Zhang, Andrii Nastenko, Zeyuan Yin, Roman Oliynykov, Mariia Rodinko
Nicolas Vallet, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Vincent Grosso
Dennis Faut, Valerie Fetzer, Jörn Müller-Quade, Markus Raiber, Andy Rupp
We consider a setting where multiple operators (e.g., different mobility providers, different car manufacturers and insurance companies), who do not fully trust each other, intend to maintain and analyze data produced by the union of their user sets. The data is collected in an anonymous (wrt.\ all operators) but authenticated way and stored in so-called user logbooks. In order for the operators to be able to perform analyses at any time without requiring user interaction, the logbooks are kept on the operator's side. Consequently, this potentially sensitive data must be protected from unauthorized access. To achieve this, we combine several selected cryptographic techniques, such as threshold signatures and oblivious RAM. The latter ensures that user anonymity is protected even against memory access pattern attacks.
To the best of our knowledge, we provide and evaluate the first generic framework that combines data collection, operator-side data storage, and data analysis in a privacy-preserving manner, while providing a formal security model, a UC-secure protocol, and a full implementation. With three operators, our implementation can handle over two million new logbook entries per day.
Uma Girish, Alex May, Leo Orshansky, Chris Waddell
1) For perfectly correct CDS, we give a separation for a promise version of the not-equals function, showing a quantum upper bound of $O(\log n)$ and classical lower bound of $\Omega(n)$.
2) We prove a $\Omega(\log \mathsf{R}_{0,A\rightarrow B}(f)+\log \mathsf{R}_{0,B\rightarrow A}(f))$ lower bound on quantum CDS where $\mathsf{R}_{0,A\rightarrow B}(f)$ is the classical one-way communication complexity with perfect correctness.
3) We prove a lower bound on quantum CDS in terms of two round, public coin, two-prover interactive proofs.
4) We give a logarithmic upper bound for quantum CDS on forrelation, while the best known classical algorithm is linear. We interpret this as preliminary evidence that classical and quantum CDS are separated even with correctness and security error allowed.
We also give a separation for classical and quantum private simultaneous message passing for a partial function, improving on an earlier relational separation. Our results use novel combinations of techniques from non-local quantum computation and communication complexity.
John Gaspoz, Siemen Dhooghe
Technical University of Denmark
As part of Project Apate, you will work on novel deception techniques to protect, among others, legacy systems from advanced cyber threats. You will collaborate closely with the Principal Investigator (PI) and five PhD students working on related topics, creating a highly interdisciplinary and supportive research environment in one of the largest cyber-deception groups in the world. Additionally, you will have opportunities to engage with top universities and leading cybersecurity researchers, expanding your professional network.
Closing date for applications:
Contact: Emmanouil Vasilomanolakis
More information: https://efzu.fa.em2.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_2001/job/5010/?utm_medium=jobshare&utm_source=External+Job+Share