6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 1-258, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@Proceedings{gilboa:LIPIcs.ITC.2025,
title = {{LIPIcs, Volume 343, ITC 2025, Complete Volume}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {1--258},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025},
URN = {urn:nbn:de:0030-drops-246585},
doi = {10.4230/LIPIcs.ITC.2025},
annote = {Keywords: LIPIcs, Volume 343, ITC 2025, Complete Volume}
}
6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 0:i-0:xii, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{gilboa:LIPIcs.ITC.2025.0,
author = {Gilboa, Niv},
title = {{Front Matter, Table of Contents, Preface, Conference Organization}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {0:i--0:xii},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.0},
URN = {urn:nbn:de:0030-drops-246579},
doi = {10.4230/LIPIcs.ITC.2025.0},
annote = {Keywords: Front Matter, Table of Contents, Preface, Conference Organization}
}
Jeremiah Blocki and Justin Zhang. Amortized Locally Decodable Codes for Insertions and Deletions. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 1:1-1:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{blocki_et_al:LIPIcs.ITC.2025.1,
author = {Blocki, Jeremiah and Zhang, Justin},
title = {{Amortized Locally Decodable Codes for Insertions and Deletions}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {1:1--1:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.1},
URN = {urn:nbn:de:0030-drops-243518},
doi = {10.4230/LIPIcs.ITC.2025.1},
annote = {Keywords: Amortized Locally Decodable Codes, Insertion and Deletion Errors}
}
Mohammed Barhoush and Louis Salvail. Powerful Primitives in the Bounded Quantum Storage Model. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 2:1-2:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{barhoush_et_al:LIPIcs.ITC.2025.2,
author = {Barhoush, Mohammed and Salvail, Louis},
title = {{Powerful Primitives in the Bounded Quantum Storage Model}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {2:1--2:20},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.2},
URN = {urn:nbn:de:0030-drops-243523},
doi = {10.4230/LIPIcs.ITC.2025.2},
annote = {Keywords: Quantum Cryptography, Bounded Quantum Storage Model, Information-Theoretic Security}
}
Jihun Hwang, Hemanta K. Maji, Hai H. Nguyen, and Xiuyu Ye. Leakage-Resilience of Shamir’s Secret Sharing: Identifying Secure Evaluation Places. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 3:1-3:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{hwang_et_al:LIPIcs.ITC.2025.3,
author = {Hwang, Jihun and Maji, Hemanta K. and Nguyen, Hai H. and Ye, Xiuyu},
title = {{Leakage-Resilience of Shamir’s Secret Sharing: Identifying Secure Evaluation Places}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {3:1--3:20},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.3},
URN = {urn:nbn:de:0030-drops-243531},
doi = {10.4230/LIPIcs.ITC.2025.3},
annote = {Keywords: Shamir’s secret sharing, leakage resilience, physical bit probing, secure evaluation places, secure modulus choice, square wave families, LLL algorithm, Fourier analysis}
}
Krzysztof Pietrzak and Pengxiang Wang. Time-Space Tradeoffs of Truncation with Preprocessing. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 4:1-4:10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{pietrzak_et_al:LIPIcs.ITC.2025.4,
author = {Pietrzak, Krzysztof and Wang, Pengxiang},
title = {{Time-Space Tradeoffs of Truncation with Preprocessing}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {4:1--4:10},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.4},
URN = {urn:nbn:de:0030-drops-243544},
doi = {10.4230/LIPIcs.ITC.2025.4},
annote = {Keywords: Time-Space Lower Bounds, Blockchains}
}
Sebastian Kolby, Lawrence Roy, Jure Sternad, and Sophia Yakoubov. Information-Theoretic Random-Index PIR. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 5:1-5:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{kolby_et_al:LIPIcs.ITC.2025.5,
author = {Kolby, Sebastian and Roy, Lawrence and Sternad, Jure and Yakoubov, Sophia},
title = {{Information-Theoretic Random-Index PIR}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {5:1--5:15},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.5},
URN = {urn:nbn:de:0030-drops-243559},
doi = {10.4230/LIPIcs.ITC.2025.5},
annote = {Keywords: Private information retrieval, Multi-server, Lower bounds}
}
Brett Hemenway Falk, Daniel Noble, and Rafail Ostrovsky. MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 6:1-6:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{falk_et_al:LIPIcs.ITC.2025.6,
author = {Falk, Brett Hemenway and Noble, Daniel and Ostrovsky, Rafail},
title = {{MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {6:1--6:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.6},
URN = {urn:nbn:de:0030-drops-243560},
doi = {10.4230/LIPIcs.ITC.2025.6},
annote = {Keywords: ORAM, MPC, DORAM, multi-server ORAM, active ORAM}
}
Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, and Rafail Ostrovsky. Linear-Time Secure Merge in O(loglog n) Rounds. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 7:1-7:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{blunk_et_al:LIPIcs.ITC.2025.7,
author = {Blunk, Mark and Bunn, Paul and Dittmer, Samuel and Lu, Steve and Ostrovsky, Rafail},
title = {{Linear-Time Secure Merge in O(loglog n) Rounds}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {7:1--7:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.7},
URN = {urn:nbn:de:0030-drops-243573},
doi = {10.4230/LIPIcs.ITC.2025.7},
annote = {Keywords: Secure Merge, Secure Sort, Secure Databases, Private Set Intersection}
}
Bar Alon and Amos Beimel. On the Definition of Malicious Private Information Retrieval. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 8:1-8:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{alon_et_al:LIPIcs.ITC.2025.8,
author = {Alon, Bar and Beimel, Amos},
title = {{On the Definition of Malicious Private Information Retrieval}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {8:1--8:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.8},
URN = {urn:nbn:de:0030-drops-243581},
doi = {10.4230/LIPIcs.ITC.2025.8},
annote = {Keywords: Private information retrieval, secure multiparty computation}
}
Prabhanjan Ananth, Saachi Mutreja, and Alexander Poremba. Revocable Encryption, Programs, and More: The Case of Multi-Copy Security. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 9:1-9:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{ananth_et_al:LIPIcs.ITC.2025.9,
author = {Ananth, Prabhanjan and Mutreja, Saachi and Poremba, Alexander},
title = {{Revocable Encryption, Programs, and More: The Case of Multi-Copy Security}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {9:1--9:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.9},
URN = {urn:nbn:de:0030-drops-243592},
doi = {10.4230/LIPIcs.ITC.2025.9},
annote = {Keywords: quantum cryptography, unclonable primitives}
}
Sandro Coretti, Pooya Farshim, Patrick Harasser, and Karl Southern. Multi-Source Randomness Extraction and Generation in the Random-Oracle Model. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 10:1-10:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{coretti_et_al:LIPIcs.ITC.2025.10,
author = {Coretti, Sandro and Farshim, Pooya and Harasser, Patrick and Southern, Karl},
title = {{Multi-Source Randomness Extraction and Generation in the Random-Oracle Model}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {10:1--10:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.10},
URN = {urn:nbn:de:0030-drops-243605},
doi = {10.4230/LIPIcs.ITC.2025.10},
annote = {Keywords: Multi-source randomness extraction, Multi-source randomness generation, Compression argument, Convex decomposition}
}
Tamar Ben David, Varun Narayanan, Olga Nissenbaum, and Anat Paskin-Cherniavsky. New Results in Share Conversion, with Applications to Evolving Access Structures. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 11:1-11:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{bendavid_et_al:LIPIcs.ITC.2025.11,
author = {Ben David, Tamar and Narayanan, Varun and Nissenbaum, Olga and Paskin-Cherniavsky, Anat},
title = {{New Results in Share Conversion, with Applications to Evolving Access Structures}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {11:1--11:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.11},
URN = {urn:nbn:de:0030-drops-243610},
doi = {10.4230/LIPIcs.ITC.2025.11},
annote = {Keywords: secret sharing, linear secret sharing, evolving access structures, share conversion, feasibility}
}
Noam Mazor. Key-Agreement with Perfect Completeness from Random Oracles. In 6th Conference on Information-Theoretic Cryptography (ITC 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 343, pp. 12:1-12:11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{mazor:LIPIcs.ITC.2025.12,
author = {Mazor, Noam},
title = {{Key-Agreement with Perfect Completeness from Random Oracles}},
booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)},
pages = {12:1--12:11},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-385-0},
ISSN = {1868-8969},
year = {2025},
volume = {343},
editor = {Gilboa, Niv},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.12},
URN = {urn:nbn:de:0030-drops-243628},
doi = {10.4230/LIPIcs.ITC.2025.12},
annote = {Keywords: Key-Agreement, Random Oracle, Merkle’s Puzzles, Perfect Completeness}
}