ITC 2020
June 17-19, 2020
Due to Covid19, the conference will be entirely virtual
The first Information-Theoretic Cryptography (ITC) conference will take place on June 17-19, 2020. ITC is a new conference dedicated to all information-theoretic aspects of cryptography, broadly defined. See the charter for more information.
Covid19 Update: Due to COVID-19, ITC 2020 is moving online to an entirely virtual format. There will be a live program as well as longer pre-recorded talks for the accepted papers. Details below:
- The live online program will take place via a Zoom webinar and will consist of:
- Accepted paper sessions: Authors of accepted papers give brief (5-8 minute) presentations of their work followed by a moderated discussion with questions from the virtual audience.
- Invited talks: We have 6 invited talks representing some of the greatest hits results in information-theoretic cryptography from the last few years.
- Pre-recorded talks for each accepted paper will be made available online prior to the conference start. The talks will contain a 20-25 minute self-contained overview of the main results, optionally followed by a longer technical deep dive.
- Registration is free but required for virtual attendance and only registered participants will receive a link to the zoom webinar. Thanks to generous sponsorship from Microsoft, registration is entirely free!
We look forward to seeing you online in June
Registration
Fill this form
to register. We will send out information about the logistics of
attendance (Zoom links and so on) by Monday, June 15. You must
register to receive the Zoom links!
If you have any questions, please contact Katherine D’Angelo at ktd@bu.edu
Proceedings
The open-access proceedings are published by LIPiCS, and available here.
Sponsors
We are deeply grateful to a donation from Microsoft Research that
covered the entire cost of the virtual ITC event, including
the publication fees.
Social Media
Talking about ITC 2020 on social media? Tag your post with
#itcrypto2020 .
Program
ITC 2020 will take place
virtually on Zoom on June 17-19, 2020. All times below are in Eastern Daylight Time (i.e. Boston /
Montreal time).
Talk Recordings Talks
from ITC, both precorded and live, will be made available in the
playlist 2020
Information-Theoretic Cryptography on the Youtube page for BU's Hariri Institute for
Computing. Prerecorded talks are linked below; sessions will be
streamed live, and videos will be linked below as they become available.
Wednesday, June 17
9:00 - 9:10 | Opening Remarks |
9:10 - 10:00 | Session 1: Privacy (session
chairs: Jon Ullman and Hemanta Maji) [Live
Recording]
|
|
- Separating Local and Shuffled Differential Privacy via Histograms
Victor Balcer (Harvard), Albert Cheu
(Northeastern)
[Talk]
- Pure Differentially Private Summation from Anonymous Messages
Badih Ghazi(Google Research), Noah Golowich (MIT &
Google Research), Ravi Kumar (Google Research), Pasin
Manurangsi (Google Research), Rasmus Pagh (BARC, IT
University of Copenhagen & Google Research), Ameya Velingke
(Google Research)
[Talk]
- The power of synergy in differential privacy: Combining a small curator with local randomizers
Amos Beimel (Ben-Gurion University), Aleksandra
Korolova (University of Southern California); Kobbi
Nissim (Georgetown University), Or Sheffet (Bar-Ilan
University); Uri Stemmer (Ben-Gurion University and
Google Research)
[Talk]
|
10:00 - 10:15 | Break |
10:15 - 11:30 | Invited Talk (chair: Stefano Tessaro) [Live
Recording] |
| Learning Fast Requires Good Memory:
Time-Space Tradeoff Lower Bounds for Learning and Applications to
Bounded Storage Cryptography
Ran Raz (Princeton) |
11:30 - 11:45 | Break |
11:45 - 12:45 | Session 2: Foundations
(chairs: Iftach Haitner and Mohammad Hajiabadi) [Live
Recording]
|
|
- Lower Bounds for Function Inversion with Quantum Advice
Kai-Min Chung (Academia Sinica), Tai-Ning Liao
(National Taiwan University), Luowen Qian (Boston University) [Talk]
- Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery
Moni Naor (Weizmann Institute
of Science), Lior Rotem (Hebrew University of Jerusalem), Gil Segev
(Hebrew University of Jerusalem) [Talk]
- One-One Constrained Pseudorandom Functions
Naty Peter (Ben-Gurion University of
the Negev), Rotem Tsabary (Weizmann Institute of Science), Hoeteck
Wee (CNRS, ENS and PSL) [Talk]
- Oblivious Parallel Tight Compaction
Gilad Asharov (Bar-Ilan University),
Ilan Komargodski (NTT Research), Wei-Kai Lin (Cornell University),
Enoch Peserico (Università degli Studi di Padova), Elaine Shi
(Cornell University) [Talk]
|
12:45 - 13:00 | Break |
13:00 - 14:15 | Invited Talk (chair: Mary Wootters) [Live Recording] |
| Exploring Interference Alignment
through the lens of Private Information Retrieval Syed A. Jafar (UC Irvine) |
Thursday, June 18
9:00 - 10:15 | Session 3: Secret
Sharing and Codes (chairs: Siyao Guo and Mahdi Cheraghchi)
[Live
Recording]
|
|
- d-Multiplicative Secret Sharing for Multipartite Adversary Structures
Reo Eriguchi (The University of Tokyo), Noboru
Kunihiro (University of Tsukuba)
[Talk]
- Leakage-Resilient Secret Sharing in Non-compartmentalized Models
Fuchun Lin (Imperial College London), Mahdi Cheraghchi (University of Michigan), Venkatesan Guruswami (Carnegie Mellon University), Reihaneh Safavi-Naini (University of Calgary), Huaxiong Wang (Nanyang Technological University)
[Talk]
- On Polynomial Secret Sharing Schemes
Anat Paskin-Cherniavsky (Ariel University), Artiom Radune (The Open University and Ariel University)
[Talk]
- On Locally Decodable Codes in Resource Bounded Channels
Jeremiah Blocki, Shubhang Kulkarni and Samson Zhou (Purdue)
[Talk]
- Expander Graphs are Non-Malleable Codes
Peter M. R. Rasmussen (University of Copenhagen), Amit Sahai (UCLA)
[Talk]
|
10:15 - 10:30 | Break |
10:30 - 11:45 | Invited Talk
(chair: Amos Beimel)
|
| Breaking Barriers in Secret Sharing Vinod Vaikuntanathan (MIT)
[Live
Recording]
|
11:45 - 12:00 | Break |
12 - 13:15 | Invited Talk (chair:
Stefan Dziembowski)
[Live
Recording]
|
| Non-Malleable Codes: From Split-State to Local to AC0 Dana Dachman-Soled (University of Maryland) |
Friday, June 19
9:00 - 10:15 | Invited Talk (chair: Shweta Agrawal) |
| Interactive Error Correcting Codes and the Surprising Power of Adaptivity Gillat Kol (Princeton)
[Live
Recording]
|
10:15 - 10:30 | Break |
10:30 - 11:30 | Session 4: Multiparty Computation and Interactive Proofs (chairs: Serge Fehr and Jesper Buus Nielsen)
[Live
Recording]
|
|
- Efficient MPC with a Mixed Adversary
Martin Hirt, Marta Mularczyk (ETH Zurich)
[Talk]
- Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson (Cybernetica AS), Marcel Keller (CSIRO's Data61), Claudio Orlandi (Aarhus University), Pille Pullonen (Cybernetica AS), Joonas Puura (University of Tartu), Mark Simkin (Aarhus University)
[Talk]
- Practical Relativistic Zero-Knowledge for NP
Claude Crépeau (McGill University), Arnaud Massenet (University of Oxford), Louis Salvail (Université de Montréal), Lucas Stinchcombe (Bloomberg L.P.), Nan Yang (Concordia University)
[Talk]
- Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev, Ido Shahaf (Hebrew University of Jerusalem)
[Talk]
|
11:30 - 11:45 | Break |
11:45 - 13:00 | Invited Talk (chair: Yael Kalai) |
| MIP* = RE Anand Natarajan (Caltech)
[Live
Recording]
|
Thanks
The ITC 2020 team is tremendously grateful to Microsoft for a
donation that covered the costs of making ITC2020 virtual as well as
to Katherine D'Angelo, Erica Seymour and Marika Swanberg of BU's Hariri Institute for their help.