Conference on Information-Theoretic Cryptography (ITC)

In Cooperation With

ITC 2021: Call For Papers

July 23-26, 2021

Due to COVID-19, the Steering Committee decided that it is safer to hold ITC 2021 virtually.

The second Information-Theoretic Cryptography (ITC) conference will take place virtually (see details below) on July 23-26, 2021. ITC is a conference dedicated to all information-theoretic aspects of cryptography, broadly defined. See the charter for more information.

Important: In order to better align with a number of recently modified deadlines, we decided to postpone the submission deadline to February 10th.

Submit your paper at the ITC 2021 Submission Server here.

Areas of interest include, but are not restricted to:

  • Randomness extraction and privacy amplification
  • Secret sharing
  • Secure multi-party computation
  • Information-theoretic proof systems
  • Differential privacy
  • Quantum cryptography with unconditional security
  • Oblivious data structures
  • Idealized models (e.g., random oracle and generic group models)
  • Bounded-storage cryptography
  • Private information retrieval and locally-decodable codes
  • Authentication codes and non-malleable codes
  • Adversarial and noisy channels
  • Information-theoretic reductions
  • Information-theoretic foundations of physical-layer security
Papers on all technical aspects of these and related topics are solicited for submission. Papers will be peer reviewed, and accepted papers will be published in conference proceedings and presented at the conference. The proceedings will be published by LIPIcs – Leibniz International Proceedings in Informatics under an open access license.

Continuing the successful format from ITC 2020, the conference will feature both a publication track and a spotlight track. The publication track consists of papers selected among the conference submissions by the program committee for publication in the proceedings and presentation at the conference. The spotlight track consists of invited talks (not published in the proceedings) that highlight the most exciting recent advances in information-theoretic cryptography. Such talks can either survey an ITC-related topic that has seen exciting developments in the last couple of years or can be devoted to a significant ITC-related result that appeared in a recent paper. The selection of speakers will be conducted by the program committee and is by invitation only. However, we solicit nominations from the community. If you would like to nominate a recent result for the greatest hits track, please send a nomination email to the PC chair at Self-nominations are discouraged.

Conference Format

More information on the online format will be communicated in the upcoming weeks.

Important Dates

  • Paper submission: Feb 10, 2021 (11:59pm UTC)
  • Spotlight track nomination deadline: February 28, 2021
  • Paper acceptance notification: April 22, 2021
  • Camera ready version: May 14, 2021
  • Conference: July 23-26, 2021

Conference Organization

General Chair: Daniele Venturi (Sapienza University of Rome)

Program Chair: Stefano Tessaro (University of Washington)

Program Committee:
  • Anat Paskin-Cherniavsky (Ariel University)
  • Arpita Patra (Indian Institute of Science)
  • Christian Majenz (QuSoft and CWI)
  • Divesh Aggarwal (National University of Singapore)
  • Eyal Kushilevitz (Technion)
  • Fang Song (Portland State University)
  • Gilad Asharov (Bar-Ilan University)
  • Ignacio Cascudo (IMDEA Software Institute)
  • Kai-Min Chung (Academia Sinica)
  • Krzysztof Pietrzak (IST Austria)
  • Mark Bun (Boston University)
  • Marshall Ball (Columbia University and University of Washington)
  • Martin Hirt (ETH Zurich)
  • Mary Wootters (Stanford University)
  • Mohammad Mahmoody (University of Virginia)
  • Sidharth Jaggi (Chinese University of Hong Kong and University of Bristol)
  • Siyao Guo (NYU Shanghai)
  • Uri Stemmer (Ben-Gurion University)
  • Vipul Goyal (CMU and NTT Research)

Instructions for Authors

The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. It should contain a scholarly exposition of ideas, techniques, and results, including motivation and a clear comparison with related work to give the proper context. There are no specific formatting requirements or page limits - it is solely up to the discretion of the authors to decide how to best present their work to make it easy to understand and review. It is highly recommended that authors write a good and comprehensive introduction, which clearly describes the main results of the paper and gives a high-level overview of the technical ideas within the first 10 pages. (Excluding the title page.)

Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other journal, conference, or workshop that has proceedings. Throughout the review period, at least one corresponding author is expected to be available to receive and quickly answer questions (via email) that arise about their submissions. At least one author of each accepted paper is required to present the paper at the conference; presentations may be recorded and made available to the public online. Authors are strongly encouraged to post full versions of their submissions in a freely accessible online repository, such as the Cryptology ePrint archive. We encourage the authors to post such a version at the time of submission. At the minimum, we expect that authors of accepted papers will post a full version of their papers by the camera-ready deadline. Titles and abstracts of accepted papers will be made public following notification.