6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 1-258, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@Proceedings{gilboa:LIPIcs.ITC.2025, title = {{LIPIcs, Volume 343, ITC 2025, Complete Volume}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {1--258}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025}, URN = {urn:nbn:de:0030-drops-246585}, doi = {10.4230/LIPIcs.ITC.2025}, annote = {Keywords: LIPIcs, Volume 343, ITC 2025, Complete Volume} }
6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 0:i-0:xii, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{gilboa:LIPIcs.ITC.2025.0, author = {Gilboa, Niv}, title = {{Front Matter, Table of Contents, Preface, Conference Organization}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {0:i--0:xii}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.0}, URN = {urn:nbn:de:0030-drops-246579}, doi = {10.4230/LIPIcs.ITC.2025.0}, annote = {Keywords: Front Matter, Table of Contents, Preface, Conference Organization} }
Jeremiah Blocki and Justin Zhang. Amortized Locally Decodable Codes for Insertions and Deletions. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 1:1-1:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{blocki_et_al:LIPIcs.ITC.2025.1, author = {Blocki, Jeremiah and Zhang, Justin}, title = {{Amortized Locally Decodable Codes for Insertions and Deletions}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {1:1--1:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.1}, URN = {urn:nbn:de:0030-drops-243518}, doi = {10.4230/LIPIcs.ITC.2025.1}, annote = {Keywords: Amortized Locally Decodable Codes, Insertion and Deletion Errors} }
Mohammed Barhoush and Louis Salvail. Powerful Primitives in the Bounded Quantum Storage Model. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 2:1-2:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{barhoush_et_al:LIPIcs.ITC.2025.2, author = {Barhoush, Mohammed and Salvail, Louis}, title = {{Powerful Primitives in the Bounded Quantum Storage Model}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {2:1--2:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.2}, URN = {urn:nbn:de:0030-drops-243523}, doi = {10.4230/LIPIcs.ITC.2025.2}, annote = {Keywords: Quantum Cryptography, Bounded Quantum Storage Model, Information-Theoretic Security} }
Jihun Hwang, Hemanta K. Maji, Hai H. Nguyen, and Xiuyu Ye. Leakage-Resilience of Shamir’s Secret Sharing: Identifying Secure Evaluation Places. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 3:1-3:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{hwang_et_al:LIPIcs.ITC.2025.3, author = {Hwang, Jihun and Maji, Hemanta K. and Nguyen, Hai H. and Ye, Xiuyu}, title = {{Leakage-Resilience of Shamir’s Secret Sharing: Identifying Secure Evaluation Places}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {3:1--3:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.3}, URN = {urn:nbn:de:0030-drops-243531}, doi = {10.4230/LIPIcs.ITC.2025.3}, annote = {Keywords: Shamir’s secret sharing, leakage resilience, physical bit probing, secure evaluation places, secure modulus choice, square wave families, LLL algorithm, Fourier analysis} }
Krzysztof Pietrzak and Pengxiang Wang. Time-Space Tradeoffs of Truncation with Preprocessing. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 4:1-4:10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{pietrzak_et_al:LIPIcs.ITC.2025.4, author = {Pietrzak, Krzysztof and Wang, Pengxiang}, title = {{Time-Space Tradeoffs of Truncation with Preprocessing}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {4:1--4:10}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.4}, URN = {urn:nbn:de:0030-drops-243544}, doi = {10.4230/LIPIcs.ITC.2025.4}, annote = {Keywords: Time-Space Lower Bounds, Blockchains} }
Sebastian Kolby, Lawrence Roy, Jure Sternad, and Sophia Yakoubov. Information-Theoretic Random-Index PIR. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 5:1-5:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{kolby_et_al:LIPIcs.ITC.2025.5, author = {Kolby, Sebastian and Roy, Lawrence and Sternad, Jure and Yakoubov, Sophia}, title = {{Information-Theoretic Random-Index PIR}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {5:1--5:15}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.5}, URN = {urn:nbn:de:0030-drops-243559}, doi = {10.4230/LIPIcs.ITC.2025.5}, annote = {Keywords: Private information retrieval, Multi-server, Lower bounds} }
Brett Hemenway Falk, Daniel Noble, and Rafail Ostrovsky. MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 6:1-6:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{falk_et_al:LIPIcs.ITC.2025.6, author = {Falk, Brett Hemenway and Noble, Daniel and Ostrovsky, Rafail}, title = {{MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {6:1--6:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.6}, URN = {urn:nbn:de:0030-drops-243560}, doi = {10.4230/LIPIcs.ITC.2025.6}, annote = {Keywords: ORAM, MPC, DORAM, multi-server ORAM, active ORAM} }
Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, and Rafail Ostrovsky. Linear-Time Secure Merge in O(loglog n) Rounds. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 7:1-7:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{blunk_et_al:LIPIcs.ITC.2025.7, author = {Blunk, Mark and Bunn, Paul and Dittmer, Samuel and Lu, Steve and Ostrovsky, Rafail}, title = {{Linear-Time Secure Merge in O(loglog n) Rounds}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {7:1--7:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.7}, URN = {urn:nbn:de:0030-drops-243573}, doi = {10.4230/LIPIcs.ITC.2025.7}, annote = {Keywords: Secure Merge, Secure Sort, Secure Databases, Private Set Intersection} }
Bar Alon and Amos Beimel. On the Definition of Malicious Private Information Retrieval. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 8:1-8:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{alon_et_al:LIPIcs.ITC.2025.8, author = {Alon, Bar and Beimel, Amos}, title = {{On the Definition of Malicious Private Information Retrieval}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {8:1--8:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.8}, URN = {urn:nbn:de:0030-drops-243581}, doi = {10.4230/LIPIcs.ITC.2025.8}, annote = {Keywords: Private information retrieval, secure multiparty computation} }
Prabhanjan Ananth, Saachi Mutreja, and Alexander Poremba. Revocable Encryption, Programs, and More: The Case of Multi-Copy Security. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 9:1-9:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{ananth_et_al:LIPIcs.ITC.2025.9, author = {Ananth, Prabhanjan and Mutreja, Saachi and Poremba, Alexander}, title = {{Revocable Encryption, Programs, and More: The Case of Multi-Copy Security}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {9:1--9:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.9}, URN = {urn:nbn:de:0030-drops-243592}, doi = {10.4230/LIPIcs.ITC.2025.9}, annote = {Keywords: quantum cryptography, unclonable primitives} }
Sandro Coretti, Pooya Farshim, Patrick Harasser, and Karl Southern. Multi-Source Randomness Extraction and Generation in the Random-Oracle Model. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 10:1-10:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{coretti_et_al:LIPIcs.ITC.2025.10, author = {Coretti, Sandro and Farshim, Pooya and Harasser, Patrick and Southern, Karl}, title = {{Multi-Source Randomness Extraction and Generation in the Random-Oracle Model}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {10:1--10:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.10}, URN = {urn:nbn:de:0030-drops-243605}, doi = {10.4230/LIPIcs.ITC.2025.10}, annote = {Keywords: Multi-source randomness extraction, Multi-source randomness generation, Compression argument, Convex decomposition} }
Tamar Ben David, Varun Narayanan, Olga Nissenbaum, and Anat Paskin-Cherniavsky. New Results in Share Conversion, with Applications to Evolving Access Structures. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 11:1-11:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{bendavid_et_al:LIPIcs.ITC.2025.11, author = {Ben David, Tamar and Narayanan, Varun and Nissenbaum, Olga and Paskin-Cherniavsky, Anat}, title = {{New Results in Share Conversion, with Applications to Evolving Access Structures}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {11:1--11:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.11}, URN = {urn:nbn:de:0030-drops-243610}, doi = {10.4230/LIPIcs.ITC.2025.11}, annote = {Keywords: secret sharing, linear secret sharing, evolving access structures, share conversion, feasibility} }
Noam Mazor. Key-Agreement with Perfect Completeness from Random Oracles. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 12:1-12:11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{mazor:LIPIcs.ITC.2025.12, author = {Mazor, Noam}, title = {{Key-Agreement with Perfect Completeness from Random Oracles}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {12:1--12:11}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.12}, URN = {urn:nbn:de:0030-drops-243628}, doi = {10.4230/LIPIcs.ITC.2025.12}, annote = {Keywords: Key-Agreement, Random Oracle, Merkle’s Puzzles, Perfect Completeness} }
Feedback for Dagstuhl Publishing