Conference on Information-Theoretic Cryptography (ITC)

ITC 2025: Program



Saturday August 16

8:45am-9:00am Coffee and check-in (Corwin West)
9:00am-9:15am Opening Remarks
9:15am - 10:15am Session 1: Complexity and Cryptography
  • Time-Space Tradeoffs of Truncation with Preprocessing (K. Pietrzak, P. Wang)
  • Multi-Source Randomness Extraction and Generation in the Random-Oracle Model (S. Coretti, P. Farshim, P. Harasser, K. Southern)
10:15am - 10:45am Break
10:45am - 11:15am Session 2: Coding
  • Amortized Locally Decodable Codes for Insertions and Deletions (J. Zhang, J. Blocki)
11:15am - 12:15pm Invited Talk 1: Amos Beimel (Ben-Gurion Univeristy)
Title: Simplified Private Information Retrieval Protocols
12:30pm - 2:10pm Lunch (provided)
2:10pm - 3:10pm Session 3: Quantum Cryptography
  • Powerful Primitives in the Bounded Quantum Storage Model (M. Barhoush, L. Salvail)
  • Revocable Encryption, Programs, and More: The Case of Multi-Copy Security (P. Ananth, S. Mutreja, A. Poremba)
3:10pm - 3:40m Break
3:40pm - 4:40pm Session 4: PIR
  • Information-Theoretic Random-Index PIR (S. Kolby, L. Roy, J. Sternad, S. Yakoubov)
  • On the Definition of Malicious Private Information Retrieval (B. Alon, A. Beimel)
4:45pm - 5:30pm Spotlight Talk 1:Rei Ueno (Kyoto University, Japan)
Title: Information-Theoretical Analysis of Side-Channel Attack and Its Countermeasure
5:30pm - 7pm Happy Hour and PowerPoint Karaoke


Sunday August 17

9am-9:15am Coffee and check-in (Corwin West)
9:15am - 10:15pmInvited Talk 2:Yifan Song (Tsinghua University)
Title: Scalable Information-Theoretic MPC with Preprocessing
10:15am - 10:45am Break
10:45am-12:15am Session 5: Cryptographic Protocols
  • MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication (B. H. Falk, D. Noble, R. Ostrovsky)
  • Linear-Time Secure Merge in O(log log n) Rounds (P. Bunn, M. Blunk, S. Dittmer, S. Lu, R. Ostrovsky)
  • Key-Agreement with Perfect Completeness from Random Oracles (N. Mazor)
12:30pm - 2:05pmLunch (provided)
2:05pm - 3:20pmSession 6: Leakage
    Spotlight Talk 2:Maciej Obremski (National University of Singapore)
    Title: New leakage models: how to deal with rejection
  • Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places (J. Hwang, H. K. Maji, H. H. Nguyen, X. Ye)
3:20pm - 4pmBreak
4pm - 5:15pmSession 7: Secret Sharing
    Spotlight Talk 3:Aditi Partap (Stanford University)
    Title: Traceable Secret Sharing: Strong Security and Efficient Constructions
  • New results in Share Conversion, with applications to evolving access structures (T. Ben David, V. Narayanan, O. Nissenbaum, A. Paskin-Cherniavsky)
5:30pm - 7pm Reception