Crypto and Privacy

Crypto and Privacy

Published on ● Video Link: https://www.youtube.com/watch?v=LE1MmdjfrHM



Duration: 1:17:39
797 views
10


On Distributed Differential Privacy and Counting Distinct Elements
Lijie Chen (MIT), Badih Ghazi (Google), Ravi Kumar (Google), Pasin Manurangsi (Google)

On Basing Auxiliary-Input Cryptography on NP-hardness via Nonadaptive Black-Box Reductions
Mikito Nanashima (Tokyo Institute of Technology)

Query complexity lower bounds for local list-decoding and hard-core predicates (even for small rate and huge lists)
Noga Ron-Zewi (University of Haifa), Ronen Shaltiel (University of Haifa), Nithin Varma (University of Haifa)

Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski (University of Warsaw), Grzegorz Fabiański (University of Warsaw), Sebastian Faust (TU Darmstadt), Siavash Riahi (TU Darmstadt)

Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau (CNRS & IRIF), Pooya Farshim (University of York), Mohammad Mahmoody (University of Virginia)

ITCS 2021







Tags:
Simons Institute
theoretical computer science
UC Berkeley
Computer Science
Theory of Computation
Theory of Computing
ITCS 2021