| 8:45am-9:00am | Coffee and check-in (Corwin West) |
| 9:00am-9:15am |
Opening Remarks |
| 9:15am - 10:15am |
Session 1: Complexity and Cryptography
- Time-Space Tradeoffs of Truncation with Preprocessing (K. Pietrzak, P. Wang)
- Multi-Source Randomness Extraction and Generation in the Random-Oracle Model (S. Coretti, P. Farshim, P. Harasser, K. Southern)
|
| 10:15am - 10:45am | Break |
| 10:45am - 11:15am |
Session 2: Coding
- Amortized Locally Decodable Codes for Insertions and Deletions (J. Zhang, J. Blocki)
|
| 11:15am - 12:15pm |
Invited Talk 1: Amos Beimel (Ben-Gurion Univeristy)
Title: Simplified Private Information Retrieval Protocols
|
| 12:30pm - 2:10pm | Lunch (provided) |
2:10pm - 3:10pm |
Session 3: Quantum Cryptography
- Powerful Primitives in the Bounded Quantum Storage Model (M. Barhoush, L. Salvail)
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security (P. Ananth, S. Mutreja, A. Poremba)
|
| 3:10pm - 3:40m | Break |
3:40pm - 4:40pm |
Session 4: PIR
- Information-Theoretic Random-Index PIR (S. Kolby, L. Roy, J. Sternad, S. Yakoubov)
- On the Definition of Malicious Private Information Retrieval (B. Alon, A. Beimel)
|
| 4:45pm - 5:30pm |
Spotlight Talk 1:Rei Ueno (Kyoto University, Japan)
Title: Information-Theoretical Analysis of Side-Channel Attack and Its
Countermeasure
|
| 5:30pm - 7pm | Happy Hour and PowerPoint Karaoke |
| 9am-9:15am | Coffee and check-in (Corwin West) |
| 9:15am - 10:15pm | Invited Talk 2:Yifan Song (Tsinghua University)
Title: Scalable Information-Theoretic MPC with Preprocessing
|
| 10:15am - 10:45am | Break |
| 10:45am-12:15am |
Session 5: Cryptographic Protocols
- MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication (B. H. Falk, D. Noble, R. Ostrovsky)
- Linear-Time Secure Merge in O(log log n) Rounds (P. Bunn, M. Blunk, S. Dittmer, S. Lu, R. Ostrovsky)
- Key-Agreement with Perfect Completeness from Random Oracles (N. Mazor)
|
| 12:30pm - 2:05pm | Lunch (provided) |
| 2:05pm - 3:20pm | Session 6: Leakage
Spotlight Talk 2:Maciej Obremski (National University of Singapore)
Title: New leakage models: how to deal with rejection
- Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places (J. Hwang, H. K. Maji, H. H. Nguyen, X. Ye)
|
| 3:20pm - 4pm | Break |
| 4pm - 5:15pm | Session 7: Secret Sharing
Spotlight Talk 3:Aditi Partap (Stanford University)
Title: Traceable Secret Sharing: Strong Security and Efficient Constructions
- New results in Share Conversion, with applications to evolving access structures (T. Ben David, V. Narayanan, O. Nissenbaum, A. Paskin-Cherniavsky)
|
| 5:30pm - 7pm | Reception |