LIPIcs, Volume 230, ITC 2022
-
Dana Dachman-Soled
LIPIcs, Volume 230, ITC 2022, Complete Volume
10.4230/LIPIcs.ITC.2022
-
Dana Dachman-Soled
Front Matter, Table of Contents, Preface, Conference Organization
10.4230/LIPIcs.ITC.2022.0
-
Reo Eriguchi, Kaoru Kurosawa, and Koji Nuida
Multi-Server PIR with Full Error Detection and Limited Error Correction
10.4230/LIPIcs.ITC.2022.1
-
Kazuhiko Minematsu
Property-Preserving Hash Functions and Combinatorial Group Testing
10.4230/LIPIcs.ITC.2022.2
-
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More
10.4230/LIPIcs.ITC.2022.3
-
Nico Döttling and Jesko Dujmovic
Maliciously Circuit-Private FHE from Information-Theoretic Principles
10.4230/LIPIcs.ITC.2022.4
-
Varun Madathil, Chris Orsini, Alessandra Scafuro, and Daniele Venturi
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic
10.4230/LIPIcs.ITC.2022.5
-
Pavel Hubáček, Ľubica Jančová, and Veronika Králová
On the Distributed Discrete Logarithm Problem with Preprocessing
10.4230/LIPIcs.ITC.2022.6
-
Marshall Ball and Tim Randolph
A Note on the Complexity of Private Simultaneous Messages with Many Parties
10.4230/LIPIcs.ITC.2022.7
-
Peter Scholl, Mark Simkin, and Luisa Siniscalchi
Multiparty Computation with Covert Security and Public Verifiability
10.4230/LIPIcs.ITC.2022.8
-
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, and Stefano Tessaro
On Seedless PRNGs and Premature Next
10.4230/LIPIcs.ITC.2022.9
-
Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, and Daniel Wichs
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
10.4230/LIPIcs.ITC.2022.10
-
Chandranan Dhar, Yevgeniy Dodis, and Mridul Nandi
Revisiting Collision and Local Opening Analysis of ABR Hash
10.4230/LIPIcs.ITC.2022.11
-
Lior Rotem and Gil Segev
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
10.4230/LIPIcs.ITC.2022.12
-
Lior Rotem
Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
10.4230/LIPIcs.ITC.2022.13
-
Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, and Vassilis Zikas
Universally Composable Almost-Everywhere Secure Computation
10.4230/LIPIcs.ITC.2022.14
-
Gilad Asharov, Ran Cohen, and Oren Shochat
Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW
10.4230/LIPIcs.ITC.2022.15
-
Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, and Albert Yu
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences
10.4230/LIPIcs.ITC.2022.16
-
Elette Boyle, Niv Gilboa, Yuval Ishai, and Victor I. Kolobov
Information-Theoretic Distributed Point Functions
10.4230/LIPIcs.ITC.2022.17