Conference on Information-Theoretic Cryptography (ITC)

ITC 2025: Program



Saturday August 16

9:00am-9:15am Coffee and check-in
9:15am-9:30am Opening Remarks
9:30am - 11:00am Session 1: Coding, Complexity and Cryptography Theory
  • Amortized Locally Decodable Codes for Insertions and Deletions (J. Zhang, J. Blocki)
  • Time-Space Tradeoffs of Truncation with Preprocessing (K. Pietrzak, P. Wang)
  • Multi-Source Randomness Extraction and Generation in the Random-Oracle Model (S. Coretti, P. Farshim, P. Harasser, K. Southern)
11:00am - 11:30am Break
11:30am - 12:30pm Invited Talk 1: Amos Beimel (Ben-Gurion Univeristy)
Title: Simplified Private Information Retrieval Protocols
12:30pm - 2pm Lunch (provided)
2pm - 4pm Session 2: Quantum Cryptography and PIR
  • Powerful Primitives in the Bounded Quantum Storage Model (M. Barhoush, L. Salvail)
  • Revocable Encryption, Programs, and More: The Case of Multi-Copy Security (P. Ananth, S. Mutreja, A. Poremba)
  • Information-Theoretic Random-Index PIR (S. Kolby, L. Roy, J. Sternad, S. Yakoubov)
  • On the Definition of Malicious Private Information Retrieval (B. Alon, A. Beimel)
4:00pm - 4:30m Break
4:30pm - 5:15pm Spotlight Talk 1:Rei Ueno (Kyoto University, Japan)
Title: Information-theoretic foundations of physical-layer security


Sunday August 17

9:00am-9:30am Coffee and check-in
9:30am-11:00am Session 3: Cryptographic Protocols
  • MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication (B. H. Falk, D. Noble, R. Ostrovsky)
  • Linear-Time Secure Merge in O(log log n) Rounds (P. Bunn, M. Blunk, S. Dittmer, S. Lu, R. Ostrovsky)
  • Key-Agreement with Perfect Completeness from Random Oracles (N. Mazor)
11:00am - 11:30am Break
11:30am - 12:30pmInvited Talk 2:Yifan Song (Tsinghua University)
Title: Scalable Information-Theoretic MPC with Preprocessing
12:30pm - 2pmLunch (provided)
2pm - 3:15pmSession 4: Leakage
    Spotlight Talk 2:Maciej Obremski (National University of Singapore)
    Title: New leakage models: how to deal with rejection
  • Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places (J. Hwang, H. K. Maji, H. H. Nguyen, X. Ye)
3:15pm - 3:45pmBreak
3:45pm - 5pmSession 5: Secret Sharing
    Spotlight Talk 3:Aditi Partap (Stanford University)
    Title: Traceable Secret Sharing: Strong Security and Efficient Constructions
  • New results in Share Conversion, with applications to evolving access structures (T. Ben David, V. Narayanan, O. Nissenbaum, A. Paskin-Cherniavsky)