Technical Program


November 29

Welcome Reception

November 30

8:40 - 8:50 AIT G02 Opening Remarks
8:50 - 9:50 AIT G02 Invited Talk
Sufficiently Myopic Adversaries Are Blind
Sidharth Jaggi (The Chinese University of Hong Kong, Hong Kong)
9:50 - 10:10 Coffee Break
10:10 - 10:50 AIT G02 Workshop Track: Secure Coding I
  • On Secure Asymmetric Multilevel Diversity Coding Systems
  • Congduan Li (City University of Hong Kong, Hong Kong), Xuan Guang (The Chinese University of Hong Kong, Hong Kong), Chee Wei Tan (City University of Hong Kong, Hong Kong), and Raymond W. Yeung (The Chinese University of Hong Kong, Hong Kong)
  • Secrecy and Robustness for Active Attack in Secure Network Coding and its Application to Network Quantum Key Distribution
  • Masahito Hayashi (Nagoya University, Japan, and National University of Singapore, Singapore), Masaki Owari (Shizuoka University, Japan), Go Kato (NTT Corporation, Japan), and Ning Cai (ShanghaiTech University, China)
10:50 - 11:15 Coffee Break
11:15 - 12:15 AIT G02 /
WMY 404
CANS/ICITS Joint Invited Talk
Physical Assumptions for Long-term Secure Communication
Rei Safavi-Naini (University of Calgary, Canada)
12:15 - 14:30 Lunch
14:30 - 15:30 CYT LT4 Invited Talk
Quantum Wiretap Channel Coding and Information Spectrum Methods
Tomohiro Ogawa (The University of Electro-Communications, Japan)
15:30 - 16:00 Coffee Break
16:00 - 16:50 CYT LT4 Conference Track: Secret Sharing
  • Contrast Optimal XOR Based Visual Cryptographic Schemes
  • Sabyasachi Dutta (Indian Statistical Institute, India), and Avishek Adhikari (University of Calcutta, India)
  • Verifiably Multiplicative Secret Sharing
  • Maki Yoshida (NICT, Japan), and Satoshi Obana (Hosei University, Japan)
16:50 - 17:10 Coffee Break
17:10 - 17:50 CYT LT4 Workshop Track: Secure Coding II
  • Information-theoretic Physical Layer Security for Satellite Channels
  • Angeles Vazquez-Castro (Autonomous University of Barcelona, Spain), and Masahito Hayashi (Nagoya University, Japan, and National University of Singapore, Singapore)
  • Secure Wireless Communication under Spatial and Local Gaussian Noise Assumptions
  • Masahito Hayashi (Nagoya University, Japan, and National University of Singapore, Singapore)
19:00 - 21:30 Banquet

December 1

9:00 - 10:15 WMY 304 Conference Track: Foundations
  • Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model
  • Ronald Cramer (CWI Amsterdam and Leiden University, The Netherlands), Ivan Damgård (Aarhus University, Denmark), Nico Döttling (Friedrich-Alexander-University Erlangen-Nürnberg, Germany), Irene Giacomelli (University of Wisconsin-Madison, USA), and Chaoping Xing (Nanyang Technological University, Singapore)
  • Disproving the Conjectures from "On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model"
  • Daniel Malinowski, and Karol Żebrowski (University of Warsaw, Poland)
  • Broadcast Encryption with Guessing Secrecy
  • Yohei Watanabe (The University of Electro-Communications, and National Institute of Advanced Industrial Science and Technology, Japan)
10:15 - 10:45 Coffee Break
10:45 - 12:00 WMY 304 Conference Track: Secure Coding
  • Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication
  • Go Kato (NTT Corporation, Japan), Masaki Owari (Shizuoka University, Japan), and Masahito Hayashi (Nagoya University, Japan, and National University of Singapore, Singapore)
  • Secure Network Coding for Multiple Unicast: On the Case of Single Source
  • Gaurav Kumar Agarwal, Martina Cardone, and Christina Fragouli (University of California Los Angeles, USA)
  • Rényi Resolvability and Its Applications to the Wiretap Channel
  • Lei Yu, and Vincent Y. F. Tan (National University of Singapore, Singapore)
12:00 - 14:00 Lunch
14:00 - 15:00 WMY 301 Invited Talk
Randomness Extraction in the Quantum World
Kai-Min Chung (Academia Sinica, Taiwan)
15:00 - 15:30 Coffee Break
15:30 - 16:20 WMY 301 Conference Track: Multi-Party Computation
  • Round and Communication Efficient Unconditionally-secure MPC with t<n/3 in Partially Synchronous Network
  • Ashish Choudhury (International Institute of Information Technology Bangalore, India), Arpita Patra, and Divya Ravi (Indian Institute of Science, Bangalore, India)
  • Catching MPC Cheaters: Identification and Openability
  • Robert Cunningham (Massachusetts Institute of Technology, USA), Benjamin Fuller (University of Connecticut, USA), and Sophia Yakoubov (Massachusetts Institute of Technology, USA)
16:20 - 16:50 Coffee Break
16:50 - 17:50 WMY 301 CANS/ICITS Joint Invited Talk
Secret Sharing Schemes: Some New Approaches and Problems
Huaxiong Wang (Nanyang Technological University, Singapore)

December 2

9:00 - 10:00 WMY 305 Invited Talk
A Unified Paradigm of Organized Complexity and Semantic Information Theory
Tatsuaki Okamoto (NTT, Japan)
10:00 - 10:20 Coffee Break
10:20 - 11:10 WMY 305 Conference Track: Card-Based Protocols
  • Secure Grouping Protocol Using a Deck of Cards
  • Yuji Hashimoto (Tokyo Denki University, and National Institute of Advanced Industrial Science and Technology, Japan), Kazumasa Shinagawa (Tokyo Institute of Technology, and National Institute of Advanced Industrial Science and Technology, Japan), Koji Nuida (National Institute of Advanced Industrial Science and Technology, Japan), Masaki Inamura (Tokyo Denki University, Japan), Goichiro Hanaoka (National Institute of Advanced Industrial Science and Technology, Japan)
  • Four Cards Are Sufficient for Card-based Three-Input Voting Protocol Utilizing Private Permutations
  • Takeshi Nakai, Satoshi Shirouchi, Mitsugu Iwamoto, and Kazuo Ohta (The University of Electro-Communications, Japan)
11:10 - 11:30 Coffee Break
11:30 - 12:30 WMY 305 Workshop Track: Cryptographic Protocols
  • Compressed Secret Key Agreement
  • Chung Chan (The Chinese University of Hong Kong, Hong Kong)
  • Computing on Quantum Shared Secrets
  • Yingkai Ouyang, Si-Hui Tan, Liming Zhao, and Joseph Fitzsimons (Singapore University of Technology and Design, and Centre of Quantum Technologies, Singapore)
  • Worst-Case Guessing Secrecy Is Meaningful in Secret Sharing Schemes
  • Mitsugu Iwamoto (The University of Electro-Communications, Japan)