


default search action
1st ITC 2020: Boston, MA, USA
- Yael Tauman Kalai, Adam D. Smith, Daniel Wichs:
1st Conference on Information-Theoretic Cryptography, ITC 2020, June 17-19, 2020, Boston, MA, USA. LIPIcs 163, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2020, ISBN 978-3-95977-151-1 - Front Matter, Table of Contents, Preface, Conference Organization. 0:1-0:14
- Victor Balcer, Albert Cheu:
Separating Local & Shuffled Differential Privacy via Histograms. 1:1-1:14 - Reo Eriguchi, Noboru Kunihiro:
d-Multiplicative Secret Sharing for Multipartite Adversary Structures. 2:1-2:16 - Martin Hirt, Marta Mularczyk:
Efficient MPC with a Mixed Adversary. 3:1-3:23 - Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Shigeru Stinchcombe, Nan Yang:
Practical Relativistic Zero-Knowledge for NP. 4:1-4:18 - Hendrik Eerikson, Marcel Keller
, Claudio Orlandi, Pille Pullonen
, Joonas Puura, Mark Simkin:
Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security. 5:1-5:24 - Peter Michael Reichstein Rasmussen
, Amit Sahai:
Expander Graphs Are Non-Malleable Codes. 6:1-6:10 - Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. 7:1-7:24 - Kai-Min Chung, Tai-Ning Liao, Luowen Qian
:
Lower Bounds for Function Inversion with Quantum Advice. 8:1-8:15 - Moni Naor, Lior Rotem, Gil Segev:
Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery. 9:1-9:25 - Gil Segev, Ido Shahaf:
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective. 10:1-10:23 - Gilad Asharov
, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. 11:1-11:23 - Anat Paskin-Cherniavsky, Artiom Radune:
On Polynomial Secret Sharing Schemes. 12:1-12:21 - Naty Peter, Rotem Tsabary, Hoeteck Wee:
One-One Constrained Pseudorandom Functions. 13:1-13:22 - Amos Beimel
, Aleksandra Korolova, Kobbi Nissim
, Or Sheffet
, Uri Stemmer
:
The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers. 14:1-14:25 - Badih Ghazi, Noah Golowich, Ravi Kumar, Pasin Manurangsi, Rasmus Pagh, Ameya Velingker:
Pure Differentially Private Summation from Anonymous Messages. 15:1-15:23 - Jeremiah Blocki
, Shubhang Kulkarni
, Samson Zhou
:
On Locally Decodable Codes in Resource Bounded Channels. 16:1-16:23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.