Conference on Information-Theoretic Cryptography (ITC)

ITC 2020: Call For Papers

June 17-19, 2020 in Boston, MA USA


The first Information-Theoretic Cryptography (ITC) conference will take place on June 17-19, 2020 in Boston, MA USA. ITC is a new conference dedicated to all information-theoretic aspects of cryptography, broadly defined. See the charter for more information.


Submit your paper at the ITC 2020 Submission Server here.


Areas of interest include, but are not restricted to:

  • Randomness extraction and privacy amplification
  • Secret sharing
  • Secure multi-party computation
  • Information theoretic proof systems
  • Differential privacy
  • Quantum information processing
  • Oblivious data structures
  • Idealized models (e.g.,ideal channels, random oracle, generic group model)
  • Bounded storage models
  • Private information retrieval and locally decodable codes
  • Authentication codes and non-malleable codes
  • Adversarial and noisy channels
  • Information-theoretic reductions
  • Information-theoretic foundations of physical-layer security
Papers on all technical aspects of these and related topics are solicited for submission. Papers will be peer reviewed, and accepted papers will be published in conference proceedings and presented at the conference. The proceedings will be published by LIPIcs – Leibniz International Proceedings in Informatics under an open access license.


The conference will have two tracks: a publication track and a greatest hits track. The publication track operates in the usual way, where authors submit their papers and the committee selects accepted papers for publication in the proceedings and presentation at the conference. The greatest hits track consists of invited talks (not published in the proceedings) that highlight the most exciting recent advances in information-theoretic cryptography. Such talks can either survey an ITC-related topic that has seen exciting developments in the last couple of years or can be devoted to a significant ITC-related result that appeared in a paper recently. This will give us the opportunity to hear about the latest big developments in information-theoretic cryptography that have appeared in different venues like FOCS/STOC, CRYPTO/EUROCRYPT/TCC, and QIP/ISIT. The selection of speakers will be conducted by the program committee and is by invitation only. However, we solicit nominations from the community. If you would like to nominate a recent result for the greatest hits track, please send a nomination e-mail to the PC chair at itc2020chair@gmail.com. Self-nominations are discouraged.


Important Dates

  • Paper submission: 23:00 EST on Dec 16, 2019
  • Greatest-hits talk nomination deadline: Jan 5, 2020
  • Paper acceptance notification: March 5, 2020
  • Camera ready version: April 6, 2020
  • Conference: June 17-19, 2020


Conference Organization

General Chairs: Yael Tauman Kalai (MSR and MIT) and Adam Smith (BU)


Program Chair:

  • Daniel Wichs (Northeastern and NTT Research)      itc2020chair@gmail.com
Program Committee:
  • Shweta Agrawal (IIT Madras)
  • Amos Beimel (Ben Gurion University)
  • Anne Broadbent (University of Ottawa)
  • Mahdi Cheraghchi (University of Michigan Ann Arbor)
  • Kai-Min Chung (Academia Sinica)
  • Stefan Dziembowski (University of Warsaw)
  • Serge Fehr (CWI Amsterdam and Leiden University)
  • Siyao Guo (New York University Shanghai)
  • Iftach Haitner (Tel Aviv University)
  • Mohammad Hajiabadi (UC Berkeley)
  • Ilan Komargodski (NTT Research)
  • Hemanta Maji (Purdue University)
  • Moni Naor (Weizmann Institute of Science)
  • Jesper Buus Nielsen (Aarhus University)
  • Christian Schaffner (QuSoft and University of Amsterdam)
  • Stefano Tessaro (University of Washington)
  • Jonathan Ullman (Northeastern University)
  • Mary Wootters (Stanford University)
  • Mark Zhandry (Princeton University and NTT Research)


Instructions for Authors

The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. It should contain a scholarly exposition of ideas, techniques, and results, including motivation and a clear comparison with related work to give the proper context. There are no specific formatting requirements or page limits - it is solely up to the discretion of the authors to decide how to best present their work to make it easy to understand and review. It is highly recommended that authors write a good and comprehensive introduction, which clearly describes the main results of the paper and gives a high-level overview of the technical ideas within the first 10 pages.


Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other journal, conference, or workshop that has proceedings. Throughout the review period, at least one corresponding author is expected to be available to receive and quickly answer questions (via email) that arise about their submissions. At least one author of each accepted paper is required to present the paper at the conference; presentations may be recorded and made available to the public online. Authors are strongly encouraged to post full versions of their submissions in a freely accessible online repository, such as the Cryptology ePrint archive. We encourage the authors to post such a version at the time of submission. At the minimum, we expect that authors of accepted papers will post a full version of their papers by the camera-ready deadline. Titles and abstracts of accepted papers will be made public by the PC following notification.


Submit your paper at the ITC 2020 Submission Server here.