LIPIcs, Volume 199, ITC 2021
-
Stefano Tessaro
LIPIcs, Volume 199, ITC 2021, Complete Volume
10.4230/LIPIcs.ITC.2021
-
Stefano Tessaro
Front Matter, Table of Contents, Preface, Conference Organization
10.4230/LIPIcs.ITC.2021.0
-
Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, and Parjanya Vyas
Group Structure in Correlations and Its Applications in Cryptography
10.4230/LIPIcs.ITC.2021.1
-
Ivan Bjerre Damgård, Boyang Li, and Nikolaj Ignatieff Schwartzbach
More Communication Lower Bounds for Information-Theoretic MPC
10.4230/LIPIcs.ITC.2021.2
-
Gal Arnon and Guy N. Rothblum
On Prover-Efficient Public-Coin Emulation of Interactive Proofs
10.4230/LIPIcs.ITC.2021.3
-
Benny Applebaum and Eyal Golombek
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
10.4230/LIPIcs.ITC.2021.4
-
Samuel Dittmer, Yuval Ishai, and Rafail Ostrovsky
Line-Point Zero Knowledge and Its Applications
10.4230/LIPIcs.ITC.2021.5
-
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
ZK-PCPs from Leakage-Resilient Secret Sharing
10.4230/LIPIcs.ITC.2021.6
-
Brett Hemenway Falk and Rafail Ostrovsky
Secure Merge with O(n log log n) Secure Operations
10.4230/LIPIcs.ITC.2021.7
-
T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, and Kartik Nayak
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions
10.4230/LIPIcs.ITC.2021.8
-
Megumi Ando, Anna Lysyanskaya, and Eli Upfal
On the Complexity of Anonymous Communication Through Public Networks
10.4230/LIPIcs.ITC.2021.9
-
Ivan Bjerre Damgård, Kasper Green Larsen, and Sophia Yakoubov
Broadcast Secret-Sharing, Bounds and Applications
10.4230/LIPIcs.ITC.2021.10
-
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, and Jenit Tomy
Locally Reconstructable Non-Malleable Secret Sharing
10.4230/LIPIcs.ITC.2021.11
-
Marshall Ball, Alper Çakan, and Tal Malkin
Linear Threshold Secret-Sharing with Binary Reconstruction
10.4230/LIPIcs.ITC.2021.12
-
Yevgeniy Dodis and Kevin Yeo
Doubly-Affine Extractors, and Their Applications
10.4230/LIPIcs.ITC.2021.13
-
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, and Zhiye Xie
Online Linear Extractors for Independent Sources
10.4230/LIPIcs.ITC.2021.14
-
Luke Demarest, Benjamin Fuller, and Alexander Russell
Code Offset in the Exponent
10.4230/LIPIcs.ITC.2021.15
-
Alexander R. Block, Simina Brânzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, and Hai H. Nguyen
P₄-free Partition and Cover Numbers & Applications
10.4230/LIPIcs.ITC.2021.16
-
Kenji Yasunaga
Replacing Probability Distributions in Security Games via Hellinger Distance
10.4230/LIPIcs.ITC.2021.17
-
Yue Gao and Or Sheffet
Differentially Private Approximations of a Convex Hull in Low Dimensions
10.4230/LIPIcs.ITC.2021.18
-
Shumo Chu, Danyang Zhuo, Elaine Shi, and T-H. Hubert Chan
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
10.4230/LIPIcs.ITC.2021.19
-
Akinori Kawachi and Harumichi Nishimura
Communication Complexity of Private Simultaneous Quantum Messages Protocols
10.4230/LIPIcs.ITC.2021.20
-
Christian Majenz, Chanelle Matadah Manfouo, and Maris Ozols
Quantum-Access Security of the Winternitz One-Time Signature Scheme
10.4230/LIPIcs.ITC.2021.21
-
Jeremiah Blocki, Seunghoon Lee, and Samson Zhou
On the Security of Proofs of Sequential Work in a Post-Quantum World
10.4230/LIPIcs.ITC.2021.22
-
Xinze Li, Qiang Tang, and Zhenfeng Zhang
Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective
10.4230/LIPIcs.ITC.2021.23
-
Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, and Mridul Nandi
T₅: Hashing Five Inputs with Three Compression Calls
10.4230/LIPIcs.ITC.2021.24
-
Gwangbae Choi, F. Betül Durak, and Serge Vaudenay
Post-Compromise Security in Self-Encryption
10.4230/LIPIcs.ITC.2021.25
-
Gili Schul-Ganz and Gil Segev
Generic-Group Identity-Based Encryption: A Tight Impossibility Result
10.4230/LIPIcs.ITC.2021.26