ITC 2023 June 6-8, 2023, Aarhus University, Aarhus, Denmark

4th Conference on Information-Theoretic Cryptography (ITC 2023)



Kai-Min Chung (Ed.)
ISBN 978-3-95977-271-6, LIPICS Vol. 267 ISSN 1868-8969
Additional Information
License
Conference Website
Complete volume (PDF, 6 MB)
Search Publication Server


Authors
  • Beimel, Amos
  • Benhamouda, Fabrice
  • Bogdanov, Andrej
  • Bouaziz-Ermann, Samuel
  • Chung, Kai-Min
  • Damgård, Ivan
  • Escudero, Daniel
  • Fleischhacker, Nils
  • Freitag, Cody
  • Ghazi, Badih
  • Ghoshal, Suparno
  • Goyal, Vipul
  • Grilo, Alex B.
  • Hajiabadi, Mohammad
  • Halevi, Shai
  • Hiwatashi, Keitaro
  • Holmgren, Justin
  • Jawale, Ruta
  • Keller, Hannah
  • Khazaei, Shahram
  • Komargodski, Ilan
  • Kumar, Ravi
  • Larsen, Kasper Green
  • Liu-Zhang, Chen-Da
  • Mahmoody, Mohammad
  • Manurangsi, Pasin
  • Mazor, Noam
  • Nelson, Jelani
  • Nuida, Koji
  • Obremski, Maciej
  • Orlandi, Claudio
  • Ostrovsky, Rafail
  • Paskin-Cherniavsky, Anat
  • Polychroniadou, Antigoni
  • Qi, Wei
  • Ravi, Divya
  • Resch, Nicolas
  • Simkin, Mark
  • Stambler, Lev
  • Tschudi, Daniel
  • Vahdani, Behzad
  • Vergnaud, Damien
  • Yakoubov, Sophia
  • Yuan, Chen
  • Zhou, Samson

  •   
    Front Matter, Table of Contents, Preface, Conference Organization
    Authors: Chung, Kai-Min

    Abstract | Document (450 KB) | BibTeX

    Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
    Authors: Resch, Nicolas ; Yuan, Chen

    Abstract | Document (798 KB) | BibTeX

    A Lower Bound on the Share Size in Evolving Secret Sharing
    Authors: Mazor, Noam

    Abstract | Document (579 KB) | BibTeX

    Csirmaz’s Duality Conjecture and Threshold Secret Sharing
    Authors: Bogdanov, Andrej

    Abstract | Document (566 KB) | BibTeX

    The Cost of Statistical Security in Proofs for Repeated Squaring
    Authors: Freitag, Cody ; Komargodski, Ilan

    Abstract | Document (837 KB) | BibTeX

    Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting
    Authors: Fleischhacker, Nils ; Ghoshal, Suparno ; Simkin, Mark

    Abstract | Document (1,018 KB) | BibTeX

    Asymmetric Multi-Party Computation
    Authors: Goyal, Vipul ; Liu-Zhang, Chen-Da ; Ostrovsky, Rafail

    Abstract | Document (833 KB) | BibTeX

    Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks
    Authors: Damgård, Ivan ; Escudero, Daniel ; Polychroniadou, Antigoni

    Abstract | Document (845 KB) | BibTeX

    Weighted Secret Sharing from Wiretap Channels
    Authors: Benhamouda, Fabrice ; Halevi, Shai ; Stambler, Lev

    Abstract | Document (875 KB) | BibTeX

    Quantum Security of Subset Cover Problems
    Authors: Bouaziz-Ermann, Samuel ; Grilo, Alex B. ; Vergnaud, Damien

    Abstract | Document (694 KB) | BibTeX

    Distributed Shuffling in Adversarial Environments
    Authors: Larsen, Kasper Green ; Obremski, Maciej ; Simkin, Mark

    Abstract | Document (798 KB) | BibTeX

    MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More
    Authors: Keller, Hannah ; Orlandi, Claudio ; Paskin-Cherniavsky, Anat ; Ravi, Divya

    Abstract | Document (971 KB) | BibTeX

    Randomness Recoverable Secret Sharing Schemes
    Authors: Hajiabadi, Mohammad ; Khazaei, Shahram ; Vahdani, Behzad

    Abstract | Document (925 KB) | BibTeX

    Secure Communication in Dynamic Incomplete Networks
    Authors: Damgård, Ivan ; Ravi, Divya ; Tschudi, Daniel ; Yakoubov, Sophia

    Abstract | Document (906 KB) | BibTeX

    Locally Covert Learning
    Authors: Holmgren, Justin ; Jawale, Ruta

    Abstract | Document (620 KB) | BibTeX

    Online Mergers and Applications to Registration-Based Encryption and Accumulators
    Authors: Mahmoody, Mohammad ; Qi, Wei

    Abstract | Document (821 KB) | BibTeX

    Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs
    Authors: Beimel, Amos

    Abstract | Document (811 KB) | BibTeX

    Differentially Private Aggregation via Imperfect Shuffling
    Authors: Ghazi, Badih ; Kumar, Ravi ; Manurangsi, Pasin ; Nelson, Jelani ; Zhou, Samson

    Abstract | Document (754 KB) | BibTeX

    Exponential Correlated Randomness Is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation
    Authors: Hiwatashi, Keitaro ; Nuida, Koji

    Abstract | Document (714 KB) | BibTeX

      




    DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI