ITC 2021 will take place
virtually on Zoom on July 24-26, 2021. All times below are in Eastern
Daylight Time.
Registered attendees will receive links to access the zoom webinar
prior to the beginning of the conference. You can register here. You can also
access a youtube livestream by clicking on the links next to the
session names. However, only use them in case you are not able to
use zoom access.
Pre-recorded talks are linked below, as well as the proceedings
articles. You can also access all videos as a playlist
and the complete proceedings are available here.
9:00 - 9:10 | Opening
Remarks (Daniele Venturi and Stefano Tessaro) [Stream] |
9:10 - 9:35 | Session I: Multiparty
Computation (Session chair: Elette Boyle) [Stream]
|
|
- Group Structure in Correlations and its
Applications in Cryptography
Guru-Vamsi
Policharla (Indian Institute of Technology, Bombay), Manoj
Prabhakaran (Indian Institute of Technology, Bombay), Rajeev
Raghunath (Indian Institute of Technology, Bombay), and
Parjanya Vyas (Indian Institute of Technology, Bombay)
[Paper] [Video]
- More Communication Lower Bounds for Information-Theoretic MPC
Ivan Bjerre Damgård (Aarhus University), Boyang Li, and
Nikolaj Ignatieff Schwartzbach (Aarhus University)
[Paper] [Video]
|
09:40 - 10:40 | Spotlight Talk I
(Session chair: Elette Boyle) [Stream] |
| Benny Applebaum (Tel Aviv University)
The Round Complexity of Unconditionally-Secure MPC and Completeness under Non-Interactive Reductions |
10:40 - 11:10 | Break |
11:10 - 11:55 | Session II: Proofs
(Session chair: Mohammad Mahmoody) [Stream]
|
|
- On Prover-Efficient Public-Coin Emulation of Interactive Proofs
Gal Arnon (Weizmann Institute of Science) and
Guy N. Rothblum (Weizmann Institute of Science)
[Paper] [Video]
- On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
Benny Applebaum (Tel Aviv University) and Eyal
Golombek (Tel Aviv University)
[Paper] [Video]
- Line-Point Zero Knowledge and Its Applications
Samuel Dittmer (Stealth Software Technologies, Inc),
Yuval Ishai (Technion), and Rafail Ostrovsky (University of
California, Los Angeles)
[Paper] [Video]
- ZK-PCPs from Leakage-Resilient Secret Sharing
Carmit Hazay (Bar-Ilan University),
Muthuramakrishnan Venkitasubramaniam (University of
Rochester), and Mor Weiss (Bar-Ilan University)
[Paper] [Video]
|
11:55 - 12:30 | Session III:
Obliviousness and Anonymity (Session chair: Rachel Lin) [Stream] |
|
- Secure Merge with O(n log log n) Secure Operations
Brett Falk (UPenn) and Rafail Ostrovsky (UCLA)
[Paper] [Video]
- Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions
T-H. Hubert Chan (HKU), Elaine Shi (CMU), Wei-Kai
Lin (Cornell), and Kartik Nayak (Duke)
[Paper] [Video]
- On the Complexity of Anonymous Communication Through Public Networks
Megumi Ando (MITRE), Anna Lysyanskaya (Brown University), and Eli
Upfal (Brown University)
[Paper] [Video]
|
12:30 - 12:45 | Break |
12:45 - 13:45 | Spotlight
Talk II (Session chair: Rachel Lin) [Stream] |
| Elaine Shi (CMU)
Sorting Circuits for Small Keys and Optimal Oblivious RAM
|
9:00 - 9:35 | Session IV: Secret
Sharing (Session chair: Ignacio Cascudo) [Stream]
|
|
- Broadcast Secret-Sharing, Bounds and Applications
Ivan Damgård (Aarhus University), Kasper Green Larsen
(Aarhus University), and Sophia Yakoubov (Aarhus University)
[Paper] [Video]
- Locally Reconstructable Non-malleable Secret Sharing
Bhavana Kanukurthi (Indian Institute of Science, Bangalore), Sai
Lakshmi Bhavana Obbattu (Microsoft Research, Bangalore),
Sruthi Sekar (Indian Institute of Science, Bangalore), and
Jenit Tomy (Indian Institute of Science, Bangalore)
[Paper] [Video]
- Linear Threshold Secret-Sharing with Binary Reconstruction
Marshall Ball (University of Washington), Alper Çakan (Bogazici
University), and Tal Malkin (Columbia University)
[Paper]
|
9:40 - 10:40 | Spotlight Talk III
(Session chair: Eyal Kushilevitz) [Stream] |
| Irit Dinur (Weizmann Institute of Science)
Expanders and Local Testability |
10:40 - 11:10 | Break |
11:10 - 11:45 | Session V: Randomness
Extraction (Session chair: Marshall Ball) [Stream]
|
|
- Doubly-Affine Extractors, and their Applications
Yevgeniy Dodis (New York University) and Kevin Yeo (Google and
Columbia University)
[Paper] [Video]
- Online Linear Extractors for Independent Sources
Yevgeniy Dodis (New York University), Siyao Guo (New York University
Shanghai), Noah Stephens-Davidowitz (Cornell University),
and Zhiye Xie (New York University Shanghai)
[Paper] [Video]
- Code Offset in the Exponent
Luke Demarest (University of Connecticut), Benjamin Fuller (University
of Connecticut), and Alexander Russell (University of
Connecticut)
[Paper] [Video]
|
11:45 - 12:10 | Session VI:
Foundations (Session chair: Mark Bun) [Stream]
|
|
- P4 Partition and Cover Numbers & Applications
Alexander R. Block (Purdue University), Simina Branzei (Purdue
University), Hemanta K. Maji (Purdue University), Himanshi
Mehta (Purdue University), Tamalika Mukherjee (Purdue
University), and Hai H. Nguyen (Purdue University)
[Paper] [Video]
- Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga (Osaka University)
[Paper] [Video]
|
12:10 - 12:35 | Session VII:
Differential Privacy (Session chair: Uri Stemmer) [Stream]
|
|
- Differentially Private Approximations of a Convex Hull in Low Dimensions
Yue Gao (University of Alberta) and Or Sheffet (Bar-Ilan University)
[Paper] [Video]
- Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
Shumo Chu (UCSB), Danyang Zhuo (Duke), Elaine Shi (CMU), and
T-H. Hubert Chan (HKU)
[Paper] [Video]
|
12:35 - 12:45 | Break |
12:45 - 13:45 | Spotlight
Talk IV (Session chair: Sidharth Jaggi) [Stream] |
| Salman Avestimehr (University of Southern California)
Secure Model Aggregation in Federated
Learning |
9:00 - 9:35 | Session VIII:
(Post-)Quantum Cryptography (Session chair: Kai-Min Chung) [Stream]
|
|
- Communication Complexity of Private Simultaneous Quantum Messages Protocols
Akinori Kawachi (Mie University) and Harumichi Nishimura
(Nagoya University)
[Paper] [Video]
- Quantum-Access Security of the Winternitz One-Time Signature Scheme
Christian Majenz (CWI & QuSoft), Chanelle Matadah Manfouo
(AIMS & Quantum Leap Africa), and Maris Ozols (University of
Amsterdam & QuSoft)
[Paper] [Video]
- On the Security of Proofs of Sequential Work in a Post-Quantum World
Jeremiah Blocki (Purdue), Seunghoon Lee (Purdue), and Samson Zhou
(Carnegie Mellon University)
[Paper] [Video]
|
9:40 - 10:40 | Spotlight Talk V
(Session chair: Mary Wootters) [Stream] |
| Matthieu Bloch (Georgia Institute of Technology)
Information-Theoretic Covert Communications: Limits
and Algorithms |
10:40 - 11:10 | Break |
11:10 - 11:55 | Session IX: Applications
& Lower Bounds (Session chair: Stefano Tessaro) [Stream]
|
|
- Fooling an Unbounded Adversary with a Short Key, Repeatedly: the Honey Encryption Perspective
Xinze Li (Tsinghua University), Qiang Tang (The University of Sydney),
and Zhenfeng Zhang (Institute of Software, Chinese Academy of
Sciences)
[Paper] [Video]
- T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis (New York University), Dmitry Khovratovich (Ethereum
Foundation and Dusk Network), Nicky Mouha (Strativia), and Mridul
Nandi (Indian Statistical Institute)
[Paper] [Video]
- Post-compromise Security in Self-Encryption
Gwangbae Choi (Fasoo), F. Betül Durak (Robert Bosch LLC), and Serge
Vaudenay (EPFL)
[Paper] [Video]
- Generic-Group Identity-Based Encryption: A Tight Impossibility Result
Gili Schul-Ganz (Hebrew University of Jerusalem) and Gil Segev (Hebrew
University of Jerusalem)
[Paper] [Video]
|
11:55 - 12:15 | Break |
12:15 - 13:15 | Spotlight
Talk VI (Session chair: Fang Song) [Stream] |
| Mark Zhandry (Princeton University and NTT Research)
How to Record Quantum Queries, and Applications to
Quantum Indifferentiability |
13:20 - 13:30 | Concluding
Remarks (Daniele Venturi and Stefano Tessaro) |