Conference on Information-Theoretic Cryptography (ITC)

ITC 2024: Program



Wednesday August 14

8:45am-9am Coffee and check-in
9:00am-9:15am Opening Remarks
9:15am - 11:20am Session 1: Complexity and Coding Theory
  • (Highlights talk) SAT reduces to the Minimum Circuit Size Problem with a Random Oracle (Speaker: Rahul Ilango)
  • (Highlights talk) A Near-Cubic Lower Bound for 3-Query Locally Decodable Codes from Semirandom CSP Refutation (Speaker: Peter Manohar)
  • (Highlights talk) On Pseudolinear Codes for Correcting Adversarial Errors (Speaker: Eric Ruzomberka)
  • (Highlights talk) Explicit Codes for Poly-Size Circuits and Functions that are Hard to Sample on Low Entropy Distributions (Speaker: Jad Silbak)
  • (Highlights talk) Hard Languages in NP cap coNP and NIZK Proofs from Unstructured Hardness (Speaker: Riddhi Ghosal)
11:20am - 11:50am Break
11:50am - 12:40pm Spotlight Talk 1: Zvika Brakerski (Weizmann Institute of Science)
Title: From Classical to Quantum (Pseudo-) Randomness
This talk will survey the effort in the quantum-cryptographic community towards understanding and instantiating pseudorandom quantum objects. A category that includes pseudorandom quantum states and pseudorandom unitaries (quantum operators). This line of work led to a number of constructions of pseudorandom states and very recently also of pseudorandom unitaries. An appealing feature of these constructions is that their main component is information theoretic: constructing the desired object in an idealized model where the construction has access to a random oracle or a random permutation, which are later instantiated computationally. These results therefore shed light on the connection between classical and quantum randomness.
12:40pm - 2pm Lunch (provided)
2pm - 4:05pm Session 2: Cryptographic Protocols
  • Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond (D. Banoun, E. Boyle, R. Cohen)
  • Secure Multiparty Computation of Symmetric Functions with Polylogarithmic Bottleneck Complexity and Correlated Randomness (R. Eriguchi)
  • Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations (L. Ottow, P. Giorgi, D. Vergnaud, F. Laguillaumie)
  • Breaking RSA Generically is Equivalent to Factoring, with Preprocessing (D. Dachman-Soled, J. Loss, A. O'Neill)
  • On the Power of Adaptivity for Function Inversion (K. Gajulapalli, A. Golovnev, S. King)
4:05pm - 4:35pm Break
4:35pm - 5:25pm Spotlight Talk 2:Rotem Oshman (Tel-Aviv University)
Title: Distributed Zero-Knowledge Proofs Over Networks
A distributed proof is a mechanism for certifying that a network is in a valid state, for example, that the network is connected and the nodes have a valid spanning tree of the network. To do this, each node is given a short certificate, and the nodes then interact with their neighbors in the network to verify the proof. Our goal is to minimize the length of the certificates, as well as the time and communication required for the verification protocol. Typically, no computational restrictions are assumed. In this talk I will describe recent work on distributed proofs, focusing on zero-knowledge proofs. The unique aspect of distributed zero-knowledge proofs over networks is that due to the dual role of the underlying graph in distributed proofs, serving as both the communication topology and the input to the problem, zero-knowledge distributed proofs must protect the communication graph itself. We suggest two definitions for zero-knowledge proofs, reconciling the traditional computational notion of zero-knowledge with the communication-based paradigm of distributed proofs, and show that efficient zero-knowledge distributed proofs can be constructed for fundamental problems such as 3-colorability and spanning tree verification. We also give a generic compiler that takes any non-ZK distributed proof and constructs from it a ZK distributed proof with related parameters. Joint work with Aviv Bick and Gillat Kol.


Thursday August 15

8:45am-9am Coffee and check-in
9am-11:05am Session 3: Randomness Extraction and Security
  • (Highlights talk) Extracting Randomness from Samplable Distributions, Revisited (Speaker: Eli Goldin)
  • Improved Trade-offs Between Amortization and Download Bandwidth for Linear HSS (K. Blackwell, M. Wootters)
  • (Highlights talk) Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance (Speaker: Jiaxin Guan)
  • Time-Space Tradeoffs for Finding Multi-collisions in Merkle-Damgård Hash Functions (Akshima)
  • (Highlights talk) From Random Probing to Noisy Leakages Without Field-Size Dependence (Speaker: Gianluca Brian)
11:05am - 11:35am Break
11:35am - 12:25pmSpotlight Talk 3:Stefano Tessaro (University of Washington)
Title: Information-theoretic Analyses of Block Ciphers
Block ciphers, such as AES, are the workhorses of applied cryptography and the standard approach to implementing pseudorandom functions in practice. Their security is inherently computational, but so far, cryptographers have struggled to develop meaningful reduction-based arguments that convincingly validate the security of practical constructions. Instead, our confidence in their security comes from decades of cryptanalysis that have not significantly compromised their security. The next best approach is to provide proofs of security for restricted classes of attacks, and the resulting analyses are inherently information theoretic. This talk will offer an overview of this research area and then focus on recent work aimed at proving that concrete block cipher constructions implement t-wise independent permutations. This property implies resilience to a wide range of statistical attacks considered by cryptanalysts. This talk is based in part on joint works with Tianren Liu, Angelos Pelecanos, and Vinod Vaikunthanathan.
12:25pm - 2pmLunch (provided)
2pm - 3:15pmSession 4: Cryptography and Key-Agreement
  • (Highlights talk) Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement (Speaker: Yanyi Liu)
  • (Highlights talk) Quantum Cryptography in Algorithmica (Speaker: William Kretschmer)
  • (Highlights talk) Computational Wiretap Coding from Indistinguishability Obfuscation (Speaker: Paul Lou)
3:15pm - 3:45pmBreak
3:45pm - 4:35pmSpotlight Talk 4: Mary Wootters (Stanford)
Title: Computing on Top of Error Correction
In many settings, one wants to compute a function of data that has been protected with an error correcting code. This flavor of problem has been studied in many different models; one take-away is that encoding data with an error-correcting code can be viewed as useful pre-computation, even in settings where one doesn't care about correcting errors. In this talk, we'll survey coding-theoretic results of this flavor, with an eye towards cryptographic applications. We'll focus in one one such result (low-bandwidth computation of linear functions, joint work with Noah Shutty), and again mention some connections to cryptography. The hope for this talk is that the audience will identify even more cryptographic connections!
4:50pm - ??? Social time!
  • Board game night! We'll have games and pizza in the Gates building. If you are interested, please RSVP here.
    • We will walk over to Gates from the Alumni Center as a group after the last talk on Thursday.
    • If you want to meet us there or head over on your own, we will be in Gates 174, and probably start around 5pm. (Warning: The front doors of the building may get locked at some point---Gates 174 is on the first floor and has doors that open out onto a courtyard, so you should be able to find the board games by coming around back to the courtyard and waving. There's a map here).
  • If board games aren't your thing, here are a few other suggestions.


Friday August 16

8:45am-9am Coffee and check-in
9am - 11:05amSession 5: Interactive Proofs and Complexity
  • (Highlights talk) IOPs with Inverse Polynomial Soundness Error (Speaker: Gal Arnon)
  • Communication Complexity vs Randomness Complexity in Interactive Proofs (B. Applebaum, K. Bhushan, M. Prabhakaran)
  • (Highlights talk) Perfect Zero-Knowledge PCPs for #P (Speaker: Jack O'Connor)
  • (Highlights talk) Approximate Lower Bound Arguments (Speaker: Anatoliy Zinovyev)
  • (Highlights talk) Efficient Interactive Coding Achieving Optimal Error Resilience Over the Binary Channel (Speaker: Meghal Gupta)
11:05am - 11:35am Break
11:35am - 12:25pm Spotlight Talk 5: Pasin Manurangsi (Google Research)
Title: Shuffle Differential Privacy: A Survey
Traditionally, differential privacy (DP) has been studied under the central model or the local model. The former offers better utility but requires a trusted curator, while the latter often results in large errors but does not require each user to trust any external party. In recent years, several models have been proposed that interpolate between these two extremes. One such model is the shuffle model. In this survey, we will provide the definition of this model and its variants. We will then go over the generic amplification-by-shuffling theorem, and specialized Shuffle DP algorithms. Finally, we will discuss known lower bounds and some open questions.
12:25pm - 2pm Lunch (provided)
2pm - 3:15pmSession 6: Cryptographic Security and Protocols
  • Information-Theoretic Single-Server PIR in the Shuffle Model (Y. Ishai, M. Kelkar, D. Lee, Y. Ma)
  • Pure-DP Aggregation in the Shuffle Model: Error-Optimal and Communication-Efficient (B. Ghazi, R. Kumar, P. Manurangsi)
  • Are Your Keys Protected? Time will Tell (M. Naor, E. Tzailk, L. David, Y. Ben-Dov)
3:15pm - 3:45pm Break
3:45pm - 4:35pm Spotlight Talk 6: Hemanta Maji (Purdue University)
Title: Geometry of Interaction through Lamination Hulls
Toward minimizing the overheads of any secure computation task, it is natural to wonder: How do we accomplish it within budgeted resources, if at all? Otherwise, what's the obstruction? Lacking appropriate mathematics, even the decidability of such questions has been unknown for over thirty years. Recently, we opened a wormhole between information complexity and geometry to tackle them. Roughly speaking, the idea is to translate such a question into a set of points and consider its lamination hull -- a generalization of the convex hull. When this hull contains the origin, the task is feasible, and the protocol is also recoverable. Otherwise, the origin is outside the hull, certifying the obstruction. Using this geometric framework, we determined the round and communication complexity of 2-party secure computation, a longstanding open problem. This framework facilitates computer-assisted protocol design and obstruction detection, exploring beyond the purview of human ingenuity and creativity. Fascinatingly, answering several of these information complexity questions motivates building new mathematics, which is of broader interest because lamination hulls find applications in hydrodynamics, operations research, formal languages, and computer graphics, among others. This talk will overview this new mathematical framework at the interface of cryptography and geometry. It is based on my collaborations with Saugata Basu, Hamidreza Amini Khorasgani, and Hai H. Nguyen.