in the Patil/Kiva (G-449) seminar room. For access information, see the
9:15 - 9:30 | Opening
Remarks by Dana Dachman-Soled, Yael Tauman Kalai, and Vinod Vaikuntanathan |
9:30-10:45 | Session I: Generic Models (Chair: Mor Weiss)
|
|
- On The Distributed Discrete Logarithm Problem with Preprocessing
Pavel Hubáček (Charles University), Ľubica Jančová (Charles University) and Veronika Králová (Charles University)
- A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
Lior Rotem (Hebrew University of Jerusalem) and Gil Segev (Hebrew University of Jerusalem)
- Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
Lior Rotem (Hebrew University of Jerusalem)
|
10:45 - 11:00 | Break
|
11:00 - 12:00 | Spotlight Talk I
(Chair: Yael Kalai) |
| Dakshita Khurana (UIUC)
Quantum Information and Secure Computation -- A Match Made in Heaven |
12:00 - 1:30 | Lunch (provided) |
1:30 - 2:45 | Session II: MPC
(Chair: Vinod Vaikuntanathan)
|
|
- Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl (Aarhus University), Mark Simkin (Ethereum) and Luisa Siniscalchi (Aarhus University)
- Universally Composable Almost-Everywhere Secure Computation
Nishanth Chandran (Microsoft Research), Pouyan Forghani (Texas A&M University), Juan Garay (Texas A&M University), Rafail Ostrovsky (UCLA), Rutvik Patel (Texas A&M University) and Vassilis Zikas (Purdue University)
- Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW
Gilad Asharov (Bar-Ilan University), Ran Cohen (Reichman University) and Oren Shochat (Bar-Ilan University)
|
2:45 - 3:00 | Break
|
3:00 - 4:00 | Spotlight Talk II
(Chair: Daniel Wichs) |
| Yevgeniy Dodis (New York University)
Random Number Generation and Extraction
|
6:30 - 9:00 |
Reception (R&D Commons) |
| Pizza, Beer and Games!
|
9:30-10:45 | Session III: MPC Tools (Chair: Gilad Asharov)
|
|
- From Privacy-Only to Simulatable OT: Black-Box,Round-Optimal, Information-theoretic
Varun Madathil (North Carolina State University), Chris Orsini (North Carolina State University), Alessandra Scafuro (North Carolina State University) and Daniele Venturi (Sapienza University of Rome)
- Information-Theoretic Distributed Point Functions
Elette Boyle (IDC Herzliya), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion) and Victor Kolobov (Technion)
- Maliciously Circuit-Private FHE from Information-Theoretic Principles
Jesko Dujmovic (CISPA) and Nico Döttling (CISPA)
|
10:45 - 11:00 | Break
|
11:00 - 12:00 | Spotlight Talk III
(Chair: Adam Smith) |
| David Zuckerman (UT Austin)
Randomness Extraction and Cryptography |
12:00 - 1:30 | Lunch (provided) |
1:30 - 2:45 | Session IV: Symmetric Key Primitives
(Chair: Mohammad Mahmoody)
|
|
- On Seedless PRNGs and Premature Next
Sandro Coretti (IOHK), Yevgeniy Dodis (New York University), Harish Karthikeyan (New York University), Noah Stephens-Davidowitz (Cornell University) and Stefano Tessaro (University of Washington)
- Revisiting Collision and Local Opening Analysis of ABR Hash
Chandranan Dhar (Indian Statistical Institute), Yevgeniy Dodis (New York University) and Mridul Nandi (Indian Statistical Institute).
- Property-Preserving Hash Functions and Combinatorial Group Testing
Kazuhiko Minematsu (NEC/Yokohama National University)
|
2:45 - 3:00 | Break
|
3:00 - 4:00 | Spotlight Talk IV
(Chair: Gilad Asharov) |
| Yuval Ishai (Technion)
Cryptography with One-Way Noisy Communication |
9:30-10:45 | Session V: Lower Bounds and Private Information Retrieval (Chair: Henry Corrigan-Gibbs)
|
|
- A Note on the Complexity of Private Simultaneous Messages with Many Parties
Marshall Ball (New York University) and Tim Randolph (Columbia University)
- Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
Saikrishna Badrinarayanan (Snap Inc), Yuval Ishai (Technion), Dakshita Khurana (UIUC), Amit Sahai (UCLA) and Daniel Wichs (Northeastern University)
- Multi-Server PIR with Full Error Detection and Limited Error Correction
Reo Eriguchi (The University of Tokyo/AIST), Kaoru Kurosawa (Chuo University/AIST) and Koji Nuida (Kyushu University/AIST)
|
10:45 - 11:00 | Break
|
11:00 - 12:00 | Spotlight Talk III
(Chair: Benny Applebaum) |
| Rafael Pass (Cornell)
Cryptography from the Hardness of Kolmogorov Complexity |
12:00 - 1:30 | Lunch (provided) |
1:30 - 2:20 | Session VI: Leakage Resilience
(Chair: Daniel Wichs)
|
|
- Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More
Carmit Hazay (Bar-Ilan University), Muthuramakrishnan Venkitasubramaniam (Georgetown University) and Mor Weiss (Bar-Ilan University)
- Tight Estimate of the Local Leakage Resilience of the Additive Secret-sharing Scheme & its Consequences
Hemanta K. Maji (Purdue University), Hai H. Nguyen (Purdue University), Anat Paskin-Cherniavsky (Ariel University), Tom Suad (Ariel University), Mingyuan Wang (University of California, Berkeley), Xiuyu Ye (Purdue University) and Albert Yu (Purdue University)
|
2:20 - 2:35 | Break
|
2:35 - 3:35 | Spotlight Talk VI
(Chair: Dana Dachman-Soled) |
| Omri Ben-Eliezer (MIT)
Adversarially Robust Streaming Algorithms: How Can We Defend Against Deletions? |
Please join us for the Charles River Crypto Day immediately after ITC! For more information
see the Crypto Day webpage.