


default search action
1st ITC 2020: Boston, MA, USA
- Yael Tauman Kalai, Adam D. Smith, Daniel Wichs:

1st Conference on Information-Theoretic Cryptography, ITC 2020, Boston, MA, USA, June 17-19, 2020. LIPIcs 163, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2020, ISBN 978-3-95977-151-1 - Front Matter, Table of Contents, Preface, Conference Organization. 0:1-0:14

- Victor Balcer, Albert Cheu

:
Separating Local & Shuffled Differential Privacy via Histograms. 1:1-1:14 - Reo Eriguchi, Noboru Kunihiro

:
d-Multiplicative Secret Sharing for Multipartite Adversary Structures. 2:1-2:16 - Martin Hirt, Marta Mularczyk:

Efficient MPC with a Mixed Adversary. 3:1-3:23 - Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Shigeru Stinchcombe, Nan Yang:

Practical Relativistic Zero-Knowledge for NP. 4:1-4:18 - Hendrik Eerikson, Marcel Keller

, Claudio Orlandi, Pille Pullonen
, Joonas Puura, Mark Simkin
:
Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security. 5:1-5:24 - Peter Michael Reichstein Rasmussen

, Amit Sahai:
Expander Graphs Are Non-Malleable Codes. 6:1-6:10 - Fuchun Lin, Mahdi Cheraghchi

, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. 7:1-7:24 - Kai-Min Chung, Tai-Ning Liao, Luowen Qian

:
Lower Bounds for Function Inversion with Quantum Advice. 8:1-8:15 - Moni Naor, Lior Rotem, Gil Segev:

Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery. 9:1-9:25 - Gil Segev, Ido Shahaf:

Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective. 10:1-10:23 - Gilad Asharov

, Ilan Komargodski, Wei-Kai Lin
, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. 11:1-11:23 - Anat Paskin-Cherniavsky, Artiom Radune:

On Polynomial Secret Sharing Schemes. 12:1-12:21 - Naty Peter, Rotem Tsabary, Hoeteck Wee:

One-One Constrained Pseudorandom Functions. 13:1-13:22 - Amos Beimel

, Aleksandra Korolova, Kobbi Nissim
, Or Sheffet
, Uri Stemmer
:
The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers. 14:1-14:25 - Badih Ghazi, Noah Golowich

, Ravi Kumar, Pasin Manurangsi, Rasmus Pagh, Ameya Velingker:
Pure Differentially Private Summation from Anonymous Messages. 15:1-15:23 - Jeremiah Blocki

, Shubhang Kulkarni
, Samson Zhou
:
On Locally Decodable Codes in Resource Bounded Channels. 16:1-16:23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














