ITC 2021 July 23-26, 2021, Virtual Conference

2nd Conference on Information-Theoretic Cryptography (ITC 2021)



Stefano Tessaro (Ed.)
ISBN 978-3-95977-197-9, LIPICS Vol. 199 ISSN 1868-8969
Additional Information
License
Conference Website
Complete volume (PDF, 8 MB)
Search Publication Server


Authors
  • Ando, Megumi
  • Applebaum, Benny
  • Arnon, Gal
  • Ball, Marshall
  • Block, Alexander R.
  • Blocki, Jeremiah
  • Brânzei, Simina
  • Çakan, Alper
  • Chan, T-H. Hubert
  • Choi, Gwangbae
  • Chu, Shumo
  • Damgård, Ivan Bjerre
  • Demarest, Luke
  • Dittmer, Samuel
  • Dodis, Yevgeniy
  • Durak, F. Betül
  • Falk, Brett Hemenway
  • Fuller, Benjamin
  • Gao, Yue
  • Golombek, Eyal
  • Guo, Siyao
  • Hazay, Carmit
  • Ishai, Yuval
  • Kanukurthi, Bhavana
  • Kawachi, Akinori
  • Khovratovich, Dmitry
  • Larsen, Kasper Green
  • Lee, Seunghoon
  • Li, Boyang
  • Lin, Wei-Kai
  • Li, Xinze
  • Lysyanskaya, Anna
  • Majenz, Christian
  • Maji, Hemanta K.
  • Malkin, Tal
  • Manfouo, Chanelle Matadah
  • Mehta, Himanshi
  • Mouha, Nicky
  • Mukherjee, Tamalika
  • Nandi, Mridul
  • Nayak, Kartik
  • Nguyen, Hai H.
  • Nishimura, Harumichi
  • Obbattu, Sai Lakshmi Bhavana
  • Ostrovsky, Rafail
  • Ozols, Maris
  • Policharla, Guru-Vamsi
  • Prabhakaran, Manoj
  • Raghunath, Rajeev
  • Rothblum, Guy N.
  • Russell, Alexander
  • Schul-Ganz, Gili
  • Schwartzbach, Nikolaj Ignatieff
  • Segev, Gil
  • Sekar, Sruthi
  • Sheffet, Or
  • Shi, Elaine
  • Stephens-Davidowitz, Noah
  • Tang, Qiang
  • Tessaro, Stefano
  • Tomy, Jenit
  • Upfal, Eli
  • Vaudenay, Serge
  • Venkitasubramaniam, Muthuramakrishnan
  • Vyas, Parjanya
  • Weiss, Mor
  • Xie, Zhiye
  • Yakoubov, Sophia
  • Yasunaga, Kenji
  • Yeo, Kevin
  • Zhang, Zhenfeng
  • Zhou, Samson
  • Zhuo, Danyang

  •   
    Front Matter, Table of Contents, Preface, Conference Organization
    Authors: Tessaro, Stefano

    Abstract | Document (390 KB) | BibTeX

    Group Structure in Correlations and Its Applications in Cryptography
    Authors: Policharla, Guru-Vamsi ; Prabhakaran, Manoj ; Raghunath, Rajeev ; Vyas, Parjanya

    Abstract | Document (901 KB) | BibTeX

    More Communication Lower Bounds for Information-Theoretic MPC
    Authors: Damgård, Ivan Bjerre ; Li, Boyang ; Schwartzbach, Nikolaj Ignatieff

    Abstract | Document (672 KB) | BibTeX

    On Prover-Efficient Public-Coin Emulation of Interactive Proofs
    Authors: Arnon, Gal ; Rothblum, Guy N.

    Abstract | Document (644 KB) | BibTeX

    On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
    Authors: Applebaum, Benny ; Golombek, Eyal

    Abstract | Document (877 KB) | BibTeX

    Line-Point Zero Knowledge and Its Applications
    Authors: Dittmer, Samuel ; Ishai, Yuval ; Ostrovsky, Rafail

    Abstract | Document (812 KB) | BibTeX

    ZK-PCPs from Leakage-Resilient Secret Sharing
    Authors: Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor

    Abstract | Document (836 KB) | BibTeX

    Secure Merge with O(n log log n) Secure Operations
    Authors: Falk, Brett Hemenway ; Ostrovsky, Rafail

    Abstract | Document (954 KB) | BibTeX

    Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions
    Authors: Chan, T-H. Hubert ; Shi, Elaine ; Lin, Wei-Kai ; Nayak, Kartik

    Abstract | Document (802 KB) | BibTeX

    On the Complexity of Anonymous Communication Through Public Networks
    Authors: Ando, Megumi ; Lysyanskaya, Anna ; Upfal, Eli

    Abstract | Document (888 KB) | BibTeX

    Broadcast Secret-Sharing, Bounds and Applications
    Authors: Damgård, Ivan Bjerre ; Larsen, Kasper Green ; Yakoubov, Sophia

    Abstract | Document (762 KB) | BibTeX

    Locally Reconstructable Non-Malleable Secret Sharing
    Authors: Kanukurthi, Bhavana ; Obbattu, Sai Lakshmi Bhavana ; Sekar, Sruthi ; Tomy, Jenit

    Abstract | Document (742 KB) | BibTeX

    Linear Threshold Secret-Sharing with Binary Reconstruction
    Authors: Ball, Marshall ; Çakan, Alper ; Malkin, Tal

    Abstract | Document (793 KB) | BibTeX

    Doubly-Affine Extractors, and Their Applications
    Authors: Dodis, Yevgeniy ; Yeo, Kevin

    Abstract | Document (828 KB) | BibTeX

    Online Linear Extractors for Independent Sources
    Authors: Dodis, Yevgeniy ; Guo, Siyao ; Stephens-Davidowitz, Noah ; Xie, Zhiye

    Abstract | Document (720 KB) | BibTeX

    Code Offset in the Exponent
    Authors: Demarest, Luke ; Fuller, Benjamin ; Russell, Alexander

    Abstract | Document (1,201 KB) | BibTeX

    P₄-free Partition and Cover Numbers & Applications
    Authors: Block, Alexander R. ; Brânzei, Simina ; Maji, Hemanta K. ; Mehta, Himanshi ; Mukherjee, Tamalika ; Nguyen, Hai H.

    Abstract | Document (917 KB) | BibTeX

    Replacing Probability Distributions in Security Games via Hellinger Distance
    Authors: Yasunaga, Kenji

    Abstract | Document (717 KB) | BibTeX

    Differentially Private Approximations of a Convex Hull in Low Dimensions
    Authors: Gao, Yue ; Sheffet, Or

    Abstract | Document (1,084 KB) | BibTeX

    Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
    Authors: Chu, Shumo ; Zhuo, Danyang ; Shi, Elaine ; Chan, T-H. Hubert

    Abstract | Document (857 KB) | BibTeX

    Communication Complexity of Private Simultaneous Quantum Messages Protocols
    Authors: Kawachi, Akinori ; Nishimura, Harumichi

    Abstract | Document (828 KB) | BibTeX

    Quantum-Access Security of the Winternitz One-Time Signature Scheme
    Authors: Majenz, Christian ; Manfouo, Chanelle Matadah ; Ozols, Maris

    Abstract | Document (881 KB) | BibTeX

    On the Security of Proofs of Sequential Work in a Post-Quantum World
    Authors: Blocki, Jeremiah ; Lee, Seunghoon ; Zhou, Samson

    Abstract | Document (987 KB) | BibTeX

    Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective
    Authors: Li, Xinze ; Tang, Qiang ; Zhang, Zhenfeng

    Abstract | Document (757 KB) | BibTeX

    T₅: Hashing Five Inputs with Three Compression Calls
    Authors: Dodis, Yevgeniy ; Khovratovich, Dmitry ; Mouha, Nicky ; Nandi, Mridul

    Abstract | Document (1,034 KB) | BibTeX

    Post-Compromise Security in Self-Encryption
    Authors: Choi, Gwangbae ; Durak, F. Betül ; Vaudenay, Serge

    Abstract | Document (883 KB) | BibTeX

    Generic-Group Identity-Based Encryption: A Tight Impossibility Result
    Authors: Schul-Ganz, Gili ; Segev, Gil

    Abstract | Document (803 KB) | BibTeX

      




    DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI