@Proceedings{tessaro:LIPIcs.ITC.2021, title = {{LIPIcs, Volume 199, ITC 2021, Complete Volume}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {1--590}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021}, URN = {urn:nbn:de:0030-drops-143187}, doi = {10.4230/LIPIcs.ITC.2021}, annote = {Keywords: LIPIcs, Volume 199, ITC 2021, Complete Volume} } @InProceedings{tessaro:LIPIcs.ITC.2021.0, author = {Tessaro, Stefano}, title = {{Front Matter, Table of Contents, Preface, Conference Organization}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {0:i--0:xii}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.0}, URN = {urn:nbn:de:0030-drops-143195}, doi = {10.4230/LIPIcs.ITC.2021.0}, annote = {Keywords: Front Matter, Table of Contents, Preface, Conference Organization} } @InProceedings{policharla_et_al:LIPIcs.ITC.2021.1, author = {Policharla, Guru-Vamsi and Prabhakaran, Manoj and Raghunath, Rajeev and Vyas, Parjanya}, title = {{Group Structure in Correlations and Its Applications in Cryptography}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {1:1--1:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.1}, URN = {urn:nbn:de:0030-drops-143208}, doi = {10.4230/LIPIcs.ITC.2021.1}, annote = {Keywords: Group correlations, bi-affine correlations, secure computation} } @InProceedings{damgard_et_al:LIPIcs.ITC.2021.2, author = {Damg\r{a}rd, Ivan Bjerre and Li, Boyang and Schwartzbach, Nikolaj Ignatieff}, title = {{More Communication Lower Bounds for Information-Theoretic MPC}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {2:1--2:18}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.2}, URN = {urn:nbn:de:0030-drops-143211}, doi = {10.4230/LIPIcs.ITC.2021.2}, annote = {Keywords: Multiparty Computation, Lower bounds} } @InProceedings{arnon_et_al:LIPIcs.ITC.2021.3, author = {Arnon, Gal and Rothblum, Guy N.}, title = {{On Prover-Efficient Public-Coin Emulation of Interactive Proofs}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {3:1--3:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.3}, URN = {urn:nbn:de:0030-drops-143226}, doi = {10.4230/LIPIcs.ITC.2021.3}, annote = {Keywords: Interactive Proofs, Computational complexity, Cryptography} } @InProceedings{applebaum_et_al:LIPIcs.ITC.2021.4, author = {Applebaum, Benny and Golombek, Eyal}, title = {{On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {4:1--4:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.4}, URN = {urn:nbn:de:0030-drops-143238}, doi = {10.4230/LIPIcs.ITC.2021.4}, annote = {Keywords: Interactive proofs, Zero-knowledge proofs, Pseudorandomness} } @InProceedings{dittmer_et_al:LIPIcs.ITC.2021.5, author = {Dittmer, Samuel and Ishai, Yuval and Ostrovsky, Rafail}, title = {{Line-Point Zero Knowledge and Its Applications}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {5:1--5:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.5}, URN = {urn:nbn:de:0030-drops-143249}, doi = {10.4230/LIPIcs.ITC.2021.5}, annote = {Keywords: Zero-knowledge proofs, NIZK, correlated randomness, vector oblivious linear evaluation, non-interactive secure computation} } @InProceedings{hazay_et_al:LIPIcs.ITC.2021.6, author = {Hazay, Carmit and Venkitasubramaniam, Muthuramakrishnan and Weiss, Mor}, title = {{ZK-PCPs from Leakage-Resilient Secret Sharing}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {6:1--6:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.6}, URN = {urn:nbn:de:0030-drops-143250}, doi = {10.4230/LIPIcs.ITC.2021.6}, annote = {Keywords: Zero Knowledge, Probabilisitically Checkable Proofs, PCPs of Proximity, Leakage Resilience, Secret Sharing} } @InProceedings{falk_et_al:LIPIcs.ITC.2021.7, author = {Falk, Brett Hemenway and Ostrovsky, Rafail}, title = {{Secure Merge with O(n log log n) Secure Operations}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {7:1--7:29}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.7}, URN = {urn:nbn:de:0030-drops-143265}, doi = {10.4230/LIPIcs.ITC.2021.7}, annote = {Keywords: Secure computation, Data-oblivious algorithms, Sorting, Merging, Shuffling, Compaction} } @InProceedings{chan_et_al:LIPIcs.ITC.2021.8, author = {Chan, T-H. Hubert and Shi, Elaine and Lin, Wei-Kai and Nayak, Kartik}, title = {{Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {8:1--8:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.8}, URN = {urn:nbn:de:0030-drops-143271}, doi = {10.4230/LIPIcs.ITC.2021.8}, annote = {Keywords: perfect oblivious RAM, oblivious PRAM} } @InProceedings{ando_et_al:LIPIcs.ITC.2021.9, author = {Ando, Megumi and Lysyanskaya, Anna and Upfal, Eli}, title = {{On the Complexity of Anonymous Communication Through Public Networks}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {9:1--9:25}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.9}, URN = {urn:nbn:de:0030-drops-143282}, doi = {10.4230/LIPIcs.ITC.2021.9}, annote = {Keywords: Anonymity, privacy, onion routing} } @InProceedings{damgard_et_al:LIPIcs.ITC.2021.10, author = {Damg\r{a}rd, Ivan Bjerre and Larsen, Kasper Green and Yakoubov, Sophia}, title = {{Broadcast Secret-Sharing, Bounds and Applications}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {10:1--10:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.10}, URN = {urn:nbn:de:0030-drops-143299}, doi = {10.4230/LIPIcs.ITC.2021.10}, annote = {Keywords: Secret-Sharing, Ad-hoc Threshold Encryption} } @InProceedings{kanukurthi_et_al:LIPIcs.ITC.2021.11, author = {Kanukurthi, Bhavana and Obbattu, Sai Lakshmi Bhavana and Sekar, Sruthi and Tomy, Jenit}, title = {{Locally Reconstructable Non-Malleable Secret Sharing}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {11:1--11:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.11}, URN = {urn:nbn:de:0030-drops-143302}, doi = {10.4230/LIPIcs.ITC.2021.11}, annote = {Keywords: Information Theoretic Cryptography, Secret Sharing, Non-malleability, Local Reconstructability} } @InProceedings{ball_et_al:LIPIcs.ITC.2021.12, author = {Ball, Marshall and \c{C}akan, Alper and Malkin, Tal}, title = {{Linear Threshold Secret-Sharing with Binary Reconstruction}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {12:1--12:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.12}, URN = {urn:nbn:de:0030-drops-143313}, doi = {10.4230/LIPIcs.ITC.2021.12}, annote = {Keywords: Secret sharing, Span programs, Lattice-based cryptography} } @InProceedings{dodis_et_al:LIPIcs.ITC.2021.13, author = {Dodis, Yevgeniy and Yeo, Kevin}, title = {{Doubly-Affine Extractors, and Their Applications}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {13:1--13:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.13}, URN = {urn:nbn:de:0030-drops-143320}, doi = {10.4230/LIPIcs.ITC.2021.13}, annote = {Keywords: extractors, information-theoretic privacy, everlasting privacy} } @InProceedings{dodis_et_al:LIPIcs.ITC.2021.14, author = {Dodis, Yevgeniy and Guo, Siyao and Stephens-Davidowitz, Noah and Xie, Zhiye}, title = {{Online Linear Extractors for Independent Sources}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {14:1--14:14}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.14}, URN = {urn:nbn:de:0030-drops-143339}, doi = {10.4230/LIPIcs.ITC.2021.14}, annote = {Keywords: feasibility of randomness extraction, randomness condensers, Fourier analysis} } @InProceedings{demarest_et_al:LIPIcs.ITC.2021.15, author = {Demarest, Luke and Fuller, Benjamin and Russell, Alexander}, title = {{Code Offset in the Exponent}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {15:1--15:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.15}, URN = {urn:nbn:de:0030-drops-143348}, doi = {10.4230/LIPIcs.ITC.2021.15}, annote = {Keywords: fuzzy extractors, code offset, learning with errors, error-correction, generic group model} } @InProceedings{block_et_al:LIPIcs.ITC.2021.16, author = {Block, Alexander R. and Br\^{a}nzei, Simina and Maji, Hemanta K. and Mehta, Himanshi and Mukherjee, Tamalika and Nguyen, Hai H.}, title = {{P₄-free Partition and Cover Numbers \& Applications}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {16:1--16:25}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.16}, URN = {urn:nbn:de:0030-drops-143357}, doi = {10.4230/LIPIcs.ITC.2021.16}, annote = {Keywords: Secure keys, Secure private randomness, Gray-Wyner system, Cryptographic complexity, Nondeterministic communication complexity, Leakage-resilience, Combinatorial optimization, Product dimension, Zarankiewicz problem, Algebraic lower-bounding techniques, P₄-free partition number, P₄-free cover number} } @InProceedings{yasunaga:LIPIcs.ITC.2021.17, author = {Yasunaga, Kenji}, title = {{Replacing Probability Distributions in Security Games via Hellinger Distance}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {17:1--17:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.17}, URN = {urn:nbn:de:0030-drops-143361}, doi = {10.4230/LIPIcs.ITC.2021.17}, annote = {Keywords: Security proof, Hellinger distance, randomness extractor, entropy loss} } @InProceedings{gao_et_al:LIPIcs.ITC.2021.18, author = {Gao, Yue and Sheffet, Or}, title = {{Differentially Private Approximations of a Convex Hull in Low Dimensions}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {18:1--18:16}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.18}, URN = {urn:nbn:de:0030-drops-143377}, doi = {10.4230/LIPIcs.ITC.2021.18}, annote = {Keywords: Differential Privacy, Computational Geometry, Tukey Depth} } @InProceedings{chu_et_al:LIPIcs.ITC.2021.19, author = {Chu, Shumo and Zhuo, Danyang and Shi, Elaine and Chan, T-H. Hubert}, title = {{Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {19:1--19:24}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.19}, URN = {urn:nbn:de:0030-drops-143386}, doi = {10.4230/LIPIcs.ITC.2021.19}, annote = {Keywords: differentially oblivious, database join, instance-specific performance} } @InProceedings{kawachi_et_al:LIPIcs.ITC.2021.20, author = {Kawachi, Akinori and Nishimura, Harumichi}, title = {{Communication Complexity of Private Simultaneous Quantum Messages Protocols}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {20:1--20:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.20}, URN = {urn:nbn:de:0030-drops-143393}, doi = {10.4230/LIPIcs.ITC.2021.20}, annote = {Keywords: Communication complexity, private simultaneous messages, quantum protocols, secure multi-party computation} } @InProceedings{majenz_et_al:LIPIcs.ITC.2021.21, author = {Majenz, Christian and Manfouo, Chanelle Matadah and Ozols, Maris}, title = {{Quantum-Access Security of the Winternitz One-Time Signature Scheme}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {21:1--21:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.21}, URN = {urn:nbn:de:0030-drops-143406}, doi = {10.4230/LIPIcs.ITC.2021.21}, annote = {Keywords: quantum cryptography, one-time signature schemes, quantum random oracle model, post-quantum cryptography, quantum world, hash-based signatures, information-theoretic security} } @InProceedings{blocki_et_al:LIPIcs.ITC.2021.22, author = {Blocki, Jeremiah and Lee, Seunghoon and Zhou, Samson}, title = {{On the Security of Proofs of Sequential Work in a Post-Quantum World}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {22:1--22:27}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.22}, URN = {urn:nbn:de:0030-drops-143415}, doi = {10.4230/LIPIcs.ITC.2021.22}, annote = {Keywords: Proof of Sequential Work, Parallel Quantum Random Oracle Model, Lower Bounds} } @InProceedings{li_et_al:LIPIcs.ITC.2021.23, author = {Li, Xinze and Tang, Qiang and Zhang, Zhenfeng}, title = {{Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {23:1--23:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.23}, URN = {urn:nbn:de:0030-drops-143425}, doi = {10.4230/LIPIcs.ITC.2021.23}, annote = {Keywords: unconditional security, information theoretic encryption, honey encryption} } @InProceedings{dodis_et_al:LIPIcs.ITC.2021.24, author = {Dodis, Yevgeniy and Khovratovich, Dmitry and Mouha, Nicky and Nandi, Mridul}, title = {{T₅: Hashing Five Inputs with Three Compression Calls}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {24:1--24:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.24}, URN = {urn:nbn:de:0030-drops-143430}, doi = {10.4230/LIPIcs.ITC.2021.24}, annote = {Keywords: hash functions, Merkle trees, Merkle-Damg\r{a}rd, collision resistance} } @InProceedings{choi_et_al:LIPIcs.ITC.2021.25, author = {Choi, Gwangbae and Durak, F. Bet\"{u}l and Vaudenay, Serge}, title = {{Post-Compromise Security in Self-Encryption}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {25:1--25:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.25}, URN = {urn:nbn:de:0030-drops-143447}, doi = {10.4230/LIPIcs.ITC.2021.25}, annote = {Keywords: Encryption, Ratchet, Post-Compromise Security, Instant Messaging, Session Resumption, Cloud Storage} } @InProceedings{schulganz_et_al:LIPIcs.ITC.2021.26, author = {Schul-Ganz, Gili and Segev, Gil}, title = {{Generic-Group Identity-Based Encryption: A Tight Impossibility Result}}, booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)}, pages = {26:1--26:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-197-9}, ISSN = {1868-8969}, year = {2021}, volume = {199}, editor = {Tessaro, Stefano}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.26}, URN = {urn:nbn:de:0030-drops-143455}, doi = {10.4230/LIPIcs.ITC.2021.26}, annote = {Keywords: Identity-based encryption, generic-group model} }