Information Theoretic Cryptography
February 17-20, 2020
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries. This area covers a wide array of topics at the intersection of cryptography, coding theory, information-theory and theory of computation. Information-theoretic protocols provide unconditional security that is not based on unproven computational intractability assumptions, whereas information-theoretic lower-bounds reveal the inherent limitations on the achievability of unconditional security. In addition, information-theoretic methods and reductions lie at the heart of many computational constructions.
In the 10th BIU Winter School on Cryptography, we will study the theory of information-theoretic cryptography. The program will cover the following topics:
private-information retrieval, secret sharing and conditional disclosure of secrets, consensus, and secure multiparty protocols.
The winter school program is designed to teach the topic from its basics up to the latest research. The target audience for the school is graduate students and postdocs in cryptography (we will assume that participants have taken at least one university-level course in cryptography). However, all faculty, undergrads and professionals with the necessary background are welcome. The winter school is open to participants from all over the world; all talks will be in English.
- Ittai Abraham, VMware Research
- Benny Applebaum, Tel-Aviv University
- Gilad Asharov, Bar-Ilan University
- Ivan Damgård, Aarhus University
- klim Efremenko, Ben-Gurion University
- Niv Gilboa, Ben-Gurion University
- Yuval Ishai, Technion
Organizers: Benny Applebaum, The School of Electrical Engineering, Tel Aviv University, Carmit Hazay, Faculty of Engineering, Bar-Ilan University and Benny Pinkas , Department of Computer Science, Bar-Ilan University, Israel.
Where: The winter school will take place at the Rayman hall at Kfar Hamaccabiah events & conference center in Ramat Gan
When: Monday, February 17, 2020 to Thursday, February 20, 2020
Registration: We are sorry but the maximum number of participants has already been reached, and registration is now closed.
Contact: For any questions or queries, please send an e-mail to: firstname.lastname@example.org
Hotel: We have arranged a special rate at the Kfar Hamaccabiah Hotel where the conference center is located. The rate is $180 a night for a single room, $200 a night for a double room (with two occupants) and $240 for a triple room (with three occupants). The rate includes breakfast. Hotel reservation form will be available soon.
Sponsorship: This winter school is graciously sponsored by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office and Bar-Ilan University.
The detailed schedule for the winter school can be downloaded here.
Monday, February 17 – Part 1- PIR + Secret Sharing
- Benny Applebaum: School Overview
- Gilad Asharov: Threshold Secret Sharing – part 1
- Gilad Asharov: Threshold Secret Sharing – part 2
- Yuval Ishai: Private Information Retrieval – part 1
- Yuval Ishai: Private Information Retrieval – part 2
- Klim Efremenko: Private Information Retrieval – part 3
Tuesday, February 18 – Part 2- Secret Sharing + Consensus
- Klim Efremenko: Private Information Retrieval – part 4
- Benny Applebaum: General Secret Sharing + Conditional Disclosure of Secrets – part 1
- Benny Applebaum: General Secret Sharing + Conditional Disclosure of Secrets – part 2
- Ittai Abraham: Consensus – part 1
- Ittai Abraham: Consensus – part 2
- Ittai Abraham: Consensus – part 3
Wednesday, February 19 – Part 3 – Consensus + MPC
- Ittai Abraham: Consensus – part 4
- Ivan Damgard: Secure Multi-Party Computation – part 1
- Ivan Damgard: Secure Multi-Party Computation – part 2
Thursday, February 20 – Part 4 – MPC
- Ivan Damgard: Secure Multi-Party Computation – part 3
- Yuval Ishai: Secure Multi-Party Computation – part 4
- Yuval Ishai: Secure Multi-Party Computation – part 5
- Niv Gilboa: Fully-Linear PCPs and Their Cryptographic Applications
- Benny Applebaum: Round Optimal Honest Majority – part 1
- Benny Applebaum: Round Optimal Honest Majority – part 2