Information-Theoretic Cryptography Conference (original) (raw)
ITC 2022: Program
(All times are in Eastern Daylight Time: GMT-4)
Location: All talks are held at the MIT Stata Center in the Patil/Kiva (G-449) seminar room. For access information, see the main ITC 2022 page.
Zoom Link:https://mit.zoom.us/j/96677742551
Recorded talks are available at this youtube playlist.
Tuesday, July 5
9:15 - 9:30 | Opening Remarks by Dana Dachman-Soled, Yael Tauman Kalai, and Vinod Vaikuntanathan |
---|---|
9:30-10:45 | Session I: Generic Models (Chair: Mor Weiss) |
On The Distributed Discrete Logarithm Problem with Preprocessing Pavel Hubáček (Charles University), Ľubica Jančová (Charles University) and Veronika Králová (Charles University) A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff Lior Rotem (Hebrew University of Jerusalem) and Gil Segev (Hebrew University of Jerusalem) Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups Lior Rotem (Hebrew University of Jerusalem) | |
10:45 - 11:00 | Break |
11:00 - 12:00 | Spotlight Talk I (Chair: Yael Kalai) |
Dakshita Khurana (UIUC)Quantum Information and Secure Computation -- A Match Made in Heaven | |
12:00 - 1:30 | Lunch (provided) |
1:30 - 2:45 | Session II: MPC (Chair: Vinod Vaikuntanathan) |
Multiparty Computation with Covert Security and Public Verifiability Peter Scholl (Aarhus University), Mark Simkin (Ethereum) and Luisa Siniscalchi (Aarhus University) Universally Composable Almost-Everywhere Secure Computation Nishanth Chandran (Microsoft Research), Pouyan Forghani (Texas A&M University), Juan Garay (Texas A&M University), Rafail Ostrovsky (UCLA), Rutvik Patel (Texas A&M University) and Vassilis Zikas (Purdue University) Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW Gilad Asharov (Bar-Ilan University), Ran Cohen (Reichman University) and Oren Shochat (Bar-Ilan University) | |
2:45 - 3:00 | Break |
3:00 - 4:00 | Spotlight Talk II (Chair: Daniel Wichs) |
Yevgeniy Dodis (New York University)Random Number Generation and Extraction | |
6:30 - 9:00 | Reception (R&D Commons) |
Pizza, Beer and Games! |
Wednesday, July 6
9:30-10:45 | Session III: MPC Tools (Chair: Gilad Asharov) |
---|---|
From Privacy-Only to Simulatable OT: Black-Box,Round-Optimal, Information-theoretic Varun Madathil (North Carolina State University), Chris Orsini (North Carolina State University), Alessandra Scafuro (North Carolina State University) and Daniele Venturi (Sapienza University of Rome) Information-Theoretic Distributed Point Functions Elette Boyle (IDC Herzliya), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion) and Victor Kolobov (Technion) Maliciously Circuit-Private FHE from Information-Theoretic Principles Jesko Dujmovic (CISPA) and Nico Döttling (CISPA) | |
10:45 - 11:00 | Break |
11:00 - 12:00 | Spotlight Talk III (Chair: Adam Smith) |
David Zuckerman (UT Austin)Randomness Extraction and Cryptography | |
12:00 - 1:30 | Lunch (provided) |
1:30 - 2:45 | Session IV: Symmetric Key Primitives (Chair: Mohammad Mahmoody) |
On Seedless PRNGs and Premature Next Sandro Coretti (IOHK), Yevgeniy Dodis (New York University), Harish Karthikeyan (New York University), Noah Stephens-Davidowitz (Cornell University) and Stefano Tessaro (University of Washington) Revisiting Collision and Local Opening Analysis of ABR Hash Chandranan Dhar (Indian Statistical Institute), Yevgeniy Dodis (New York University) and Mridul Nandi (Indian Statistical Institute). Property-Preserving Hash Functions and Combinatorial Group Testing Kazuhiko Minematsu (NEC/Yokohama National University) | |
2:45 - 3:00 | Break |
3:00 - 4:00 | Spotlight Talk IV (Chair: Gilad Asharov) |
Yuval Ishai (Technion)Cryptography with One-Way Noisy Communication |
Thursday, July 7
9:30-10:45 | Session V: Lower Bounds and Private Information Retrieval (Chair: Henry Corrigan-Gibbs) |
---|---|
A Note on the Complexity of Private Simultaneous Messages with Many Parties Marshall Ball (New York University) and Tim Randolph (Columbia University) Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC Saikrishna Badrinarayanan (Snap Inc), Yuval Ishai (Technion), Dakshita Khurana (UIUC), Amit Sahai (UCLA) and Daniel Wichs (Northeastern University) Multi-Server PIR with Full Error Detection and Limited Error Correction Reo Eriguchi (The University of Tokyo/AIST), Kaoru Kurosawa (Chuo University/AIST) and Koji Nuida (Kyushu University/AIST) | |
10:45 - 11:00 | Break |
11:00 - 12:00 | Spotlight Talk III (Chair: Benny Applebaum) |
Rafael Pass (Cornell)Cryptography from the Hardness of Kolmogorov Complexity | |
12:00 - 1:30 | Lunch (provided) |
1:30 - 2:20 | Session VI: Leakage Resilience (Chair: Daniel Wichs) |
Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More Carmit Hazay (Bar-Ilan University), Muthuramakrishnan Venkitasubramaniam (Georgetown University) and Mor Weiss (Bar-Ilan University) Tight Estimate of the Local Leakage Resilience of the Additive Secret-sharing Scheme & its Consequences Hemanta K. Maji (Purdue University), Hai H. Nguyen (Purdue University), Anat Paskin-Cherniavsky (Ariel University), Tom Suad (Ariel University), Mingyuan Wang (University of California, Berkeley), Xiuyu Ye (Purdue University) and Albert Yu (Purdue University) | |
2:20 - 2:35 | Break |
2:35 - 3:35 | Spotlight Talk VI (Chair: Dana Dachman-Soled) |
Omri Ben-Eliezer (MIT)Adversarially Robust Streaming Algorithms: How Can We Defend Against Deletions? |
Friday, July 8
Please join us for the Charles River Crypto Day immediately after ITC! For more information see the Crypto Day webpage.