Conference on Information-Theoretic Cryptography (ITC)

ITC 2022: Program

(All times are in Eastern Daylight Time: GMT-4)

Location: All talks are held at the MIT Stata Center in the Patil/Kiva (G-449) seminar room. For access information, see the main ITC 2022 page.

Zoom Link: https://mit.zoom.us/j/96677742551

Recorded talks are available at this youtube playlist.

Tuesday, July 5

9:15 - 9:30Opening Remarks by Dana Dachman-Soled, Yael Tauman Kalai, and Vinod Vaikuntanathan
9:30-10:45Session I: Generic Models (Chair: Mor Weiss)
  1. On The Distributed Discrete Logarithm Problem with Preprocessing
    Pavel Hubáček (Charles University), Ľubica Jančová (Charles University) and Veronika Králová (Charles University)
  2. A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
    Lior Rotem (Hebrew University of Jerusalem) and Gil Segev (Hebrew University of Jerusalem)
  3. Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
    Lior Rotem (Hebrew University of Jerusalem)
10:45 - 11:00Break
11:00 - 12:00Spotlight Talk I (Chair: Yael Kalai)
Dakshita Khurana (UIUC)
Quantum Information and Secure Computation -- A Match Made in Heaven
12:00 - 1:30Lunch (provided)
1:30 - 2:45Session II: MPC (Chair: Vinod Vaikuntanathan)
  1. Multiparty Computation with Covert Security and Public Verifiability
    Peter Scholl (Aarhus University), Mark Simkin (Ethereum) and Luisa Siniscalchi (Aarhus University)
  2. Universally Composable Almost-Everywhere Secure Computation
    Nishanth Chandran (Microsoft Research), Pouyan Forghani (Texas A&M University), Juan Garay (Texas A&M University), Rafail Ostrovsky (UCLA), Rutvik Patel (Texas A&M University) and Vassilis Zikas (Purdue University)
  3. Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW
    Gilad Asharov (Bar-Ilan University), Ran Cohen (Reichman University) and Oren Shochat (Bar-Ilan University)
2:45 - 3:00Break
3:00 - 4:00Spotlight Talk II (Chair: Daniel Wichs)
Yevgeniy Dodis (New York University)
Random Number Generation and Extraction
6:30 - 9:00 Reception (R&D Commons)
Pizza, Beer and Games!

Wednesday, July 6

9:30-10:45Session III: MPC Tools (Chair: Gilad Asharov)
  1. From Privacy-Only to Simulatable OT: Black-Box,Round-Optimal, Information-theoretic
    Varun Madathil (North Carolina State University), Chris Orsini (North Carolina State University), Alessandra Scafuro (North Carolina State University) and Daniele Venturi (Sapienza University of Rome)
  2. Information-Theoretic Distributed Point Functions
    Elette Boyle (IDC Herzliya), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion) and Victor Kolobov (Technion)
  3. Maliciously Circuit-Private FHE from Information-Theoretic Principles
    Jesko Dujmovic (CISPA) and Nico Döttling (CISPA)
10:45 - 11:00Break
11:00 - 12:00Spotlight Talk III (Chair: Adam Smith)
David Zuckerman (UT Austin)
Randomness Extraction and Cryptography
12:00 - 1:30Lunch (provided)
1:30 - 2:45Session IV: Symmetric Key Primitives (Chair: Mohammad Mahmoody)
  1. On Seedless PRNGs and Premature Next
    Sandro Coretti (IOHK), Yevgeniy Dodis (New York University), Harish Karthikeyan (New York University), Noah Stephens-Davidowitz (Cornell University) and Stefano Tessaro (University of Washington)
  2. Revisiting Collision and Local Opening Analysis of ABR Hash
    Chandranan Dhar (Indian Statistical Institute), Yevgeniy Dodis (New York University) and Mridul Nandi (Indian Statistical Institute).
  3. Property-Preserving Hash Functions and Combinatorial Group Testing
    Kazuhiko Minematsu (NEC/Yokohama National University)
2:45 - 3:00Break
3:00 - 4:00Spotlight Talk IV (Chair: Gilad Asharov)
Yuval Ishai (Technion)
Cryptography with One-Way Noisy Communication

Thursday, July 7

9:30-10:45Session V: Lower Bounds and Private Information Retrieval (Chair: Henry Corrigan-Gibbs)
  1. A Note on the Complexity of Private Simultaneous Messages with Many Parties
    Marshall Ball (New York University) and Tim Randolph (Columbia University)
  2. Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
    Saikrishna Badrinarayanan (Snap Inc), Yuval Ishai (Technion), Dakshita Khurana (UIUC), Amit Sahai (UCLA) and Daniel Wichs (Northeastern University)
  3. Multi-Server PIR with Full Error Detection and Limited Error Correction
    Reo Eriguchi (The University of Tokyo/AIST), Kaoru Kurosawa (Chuo University/AIST) and Koji Nuida (Kyushu University/AIST)
10:45 - 11:00Break
11:00 - 12:00Spotlight Talk III (Chair: Benny Applebaum)
Rafael Pass (Cornell)
Cryptography from the Hardness of Kolmogorov Complexity
12:00 - 1:30Lunch (provided)
1:30 - 2:20Session VI: Leakage Resilience (Chair: Daniel Wichs)
  1. Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More
    Carmit Hazay (Bar-Ilan University), Muthuramakrishnan Venkitasubramaniam (Georgetown University) and Mor Weiss (Bar-Ilan University)
  2. Tight Estimate of the Local Leakage Resilience of the Additive Secret-sharing Scheme & its Consequences
    Hemanta K. Maji (Purdue University), Hai H. Nguyen (Purdue University), Anat Paskin-Cherniavsky (Ariel University), Tom Suad (Ariel University), Mingyuan Wang (University of California, Berkeley), Xiuyu Ye (Purdue University) and Albert Yu (Purdue University)
2:20 - 2:35Break
2:35 - 3:35Spotlight Talk VI (Chair: Dana Dachman-Soled)
Omri Ben-Eliezer (MIT)
Adversarially Robust Streaming Algorithms: How Can We Defend Against Deletions?

Friday, July 8

Please join us for the Charles River Crypto Day immediately after ITC! For more information see the Crypto Day webpage.