9:00am-9:15am | Coffee and check-in |
9:15am-9:30am |
Opening Remarks |
9:30am - 11:00am |
Session 1: Coding, Complexity and Cryptography Theory
- Amortized Locally Decodable Codes for Insertions and Deletions (J. Zhang, J. Blocki)
- Time-Space Tradeoffs of Truncation with Preprocessing (K. Pietrzak, P. Wang)
- Multi-Source Randomness Extraction and Generation in the Random-Oracle Model (S. Coretti, P. Farshim, P. Harasser, K. Southern)
|
11:00am - 11:30am | Break |
11:30am - 12:30pm |
Invited Talk 1: Amos Beimel (Ben-Gurion Univeristy)
Title: Simplified Private Information Retrieval Protocols
|
12:30pm - 2pm | Lunch (provided) |
2pm - 4pm |
Session 2: Quantum Cryptography and PIR
- Powerful Primitives in the Bounded Quantum Storage Model (M. Barhoush, L. Salvail)
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security (P. Ananth, S. Mutreja, A. Poremba)
- Information-Theoretic Random-Index PIR (S. Kolby, L. Roy, J. Sternad, S. Yakoubov)
- On the Definition of Malicious Private Information Retrieval (B. Alon, A. Beimel)
|
4:00pm - 4:30m | Break |
4:30pm - 5:15pm |
Spotlight Talk 1:Rei Ueno (Kyoto University, Japan)
Title: Information-theoretic foundations of physical-layer security
|
9:00am-9:30am | Coffee and check-in |
9:30am-11:00am |
Session 3: Cryptographic Protocols
- MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication (B. H. Falk, D. Noble, R. Ostrovsky)
- Linear-Time Secure Merge in O(log log n) Rounds (P. Bunn, M. Blunk, S. Dittmer, S. Lu, R. Ostrovsky)
- Key-Agreement with Perfect Completeness from Random Oracles (N. Mazor)
|
11:00am - 11:30am | Break |
11:30am - 12:30pm | Invited Talk 2:Yifan Song (Tsinghua University)
Title: Scalable Information-Theoretic MPC with Preprocessing
|
12:30pm - 2pm | Lunch (provided) |
2pm - 3:15pm | Session 4: Leakage
Spotlight Talk 2:Maciej Obremski (National University of Singapore)
Title: New leakage models: how to deal with rejection
- Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places (J. Hwang, H. K. Maji, H. H. Nguyen, X. Ye)
|
3:15pm - 3:45pm | Break |
3:45pm - 5pm | Session 5: Secret Sharing
Spotlight Talk 3:Aditi Partap (Stanford University)
Title: Traceable Secret Sharing: Strong Security and Efficient Constructions
- New results in Share Conversion, with applications to evolving access structures (T. Ben David, V. Narayanan, O. Nissenbaum, A. Paskin-Cherniavsky)
|