


default search action
4th ITC 2023: Aarhus, Denmark
- Kai-Min Chung

:
4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus University, Aarhus, Denmark. LIPIcs 267, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2023, ISBN 978-3-95977-271-6 - Front Matter, Table of Contents, Preface, Conference Organization. 0:1-0:12

- Nicolas Resch

, Chen Yuan:
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate. 1:1-1:20 - Noam Mazor:

A Lower Bound on the Share Size in Evolving Secret Sharing. 2:1-2:9 - Andrej Bogdanov:

Csirmaz's Duality Conjecture and Threshold Secret Sharing. 3:1-3:6 - Cody Freitag, Ilan Komargodski:

The Cost of Statistical Security in Proofs for Repeated Squaring. 4:1-4:23 - Nils Fleischhacker, Suparno Ghoshal

, Mark Simkin
:
Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting. 5:1-5:26 - Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky

:
Asymmetric Multi-Party Computation. 6:1-6:25 - Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou:

Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks. 7:1-7:21 - Fabrice Benhamouda, Shai Halevi, Lev Stambler:

Weighted Secret Sharing from Wiretap Channels. 8:1-8:19 - Samuel Bouaziz-Ermann

, Alex B. Grilo, Damien Vergnaud
:
Quantum Security of Subset Cover Problems. 9:1-9:17 - Kasper Green Larsen

, Maciej Obremski, Mark Simkin
:
Distributed Shuffling in Adversarial Environments. 10:1-10:15 - Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi:

MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More. 11:1-11:22 - Mohammad Hajiabadi, Shahram Khazaei, Behzad Vahdani:

Randomness Recoverable Secret Sharing Schemes. 12:1-12:25 - Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov

:
Secure Communication in Dynamic Incomplete Networks. 13:1-13:21 - Justin Holmgren

, Ruta Jawale:
Locally Covert Learning. 14:1-14:12 - Mohammad Mahmoody, Wei Qi

:
Online Mergers and Applications to Registration-Based Encryption and Accumulators. 15:1-15:23 - Amos Beimel:

Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs. 16:1-16:13 - Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Jelani Nelson, Samson Zhou:

Differentially Private Aggregation via Imperfect Shuffling. 17:1-17:22 - Keitaro Hiwatashi, Koji Nuida

:
Exponential Correlated Randomness Is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation. 18:1-18:16

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














