Skip to main content

Utility navigation

  • Calendar
  • Contact
  • Login
  • MAKE A GIFT
Berkeley University of California
Home Home

Main navigation

  • Home
  • Programs & Events
    • Research Programs
    • Workshops & Symposia
    • Public Lectures
    • Research Pods
    • Internal Program Activities
    • Algorithms, Society, and the Law
  • People
    • Scientific Leadership
    • Staff
    • Current Long-Term Visitors
    • Research Fellows
    • Postdoctoral Researchers
    • Scientific Advisory Board
    • Governance Board
    • Industry Advisory Council
    • Affiliated Faculty
    • Science Communicators in Residence
    • Law and Society Fellows
  • Participate
    • Apply to Participate
    • Plan Your Visit
    • Accessibility
    • Location & Directions
    • Postdoctoral Research Fellowships
    • Law and Society Fellowships
    • Science Communicator in Residence Program
    • Circles
    • Breakthroughs Workshops and Goldwasser Exploratory Workshops
  • Support
    • Annual Fund
    • All Funders
    • Institutional Partnerships
  • News & Videos
    • News
    • Videos
  • About
Image
Cryptography 10 Years Later - Program Logo

Secure Computation

Program
Cryptography 10 Years Later: Obfuscation, Proof Systems, and Secure Computation
Location

Calvin Lab auditorium

Date
Monday, Aug. 4 – Friday, Aug. 8, 2025
Back to calendar

Breadcrumb

  1. Home
  2. Workshop & Symposia
  3. Schedule

Secondary tabs

  • The Workshop
  • Schedule
  • Videos

9 – 9:20 a.m.
Coffee and Check-In
9:20 – 9:30 a.m.
Introduction from Simons Institute
9:30 – 10:30 a.m.
Secure Computation and Low-Complexity Cryptography

Yuval Ishai (Technion and AWS)
Video
10:30 – 11:15 a.m.
Break
11:15 – 11:45 a.m.
Geometry of Secure Computation

Hemanta Maji (Purdue University)
Video
11:45 a.m. – 1:45 p.m.
Lunch (on your own)
1:45 – 2:45 p.m.
Beyond Boolean Circuits in Garbled Circuits

David Heath (UIUC)
Video
2:45 – 3:30 p.m.
Break
3:30 – 4 p.m.
BitGC: Garbled Circuits with 1 Bit per Gate

Xiao Wang (Northwestern University)
Video
4 – 4:30 p.m.
A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing

Rachel Lin (University of Washington)
Video
4:30 – 5 p.m.
Reception
9 – 9:30 a.m.
Coffee and Check-In
9:30 – 10:30 a.m.
The Communication Complexity Landscape of Information-theoretic MPC

Arpita Patra (Indian Institute of Science)
Video
10:30 – 11:15 a.m.
Break
11:15 – 11:45 a.m.
On the Optimal Round Complexity of Multi-Party Computation in the Plain Model

Luisa Siniscalchi (Technical University of Denmark (DTU))
Video
11:45 a.m. – 1:45 p.m.
Lunch (on your own)
1:45 – 2:15 p.m.
Peeking into the Future: MPC Resilient to Super-Rushing Adversaries

Ran Cohen (Reichman University)
Video
2:15 – 2:45 p.m.
Broadcast Optimal Multi-Party Computation

Divya Ravi (University of Amsterdam)
Video
2:45 – 3:30 p.m.
Break
3:30 – 4 p.m.
Towards Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing

Vipul Goyal (NTT Research)
Video
4 – 4:30 p.m.
How to Share an NP Statement or Combiners for Zero-Knowledge Proofs

Benny Applebaum (Tel-Aviv University)
Video
9 – 9:30 a.m.
Coffee and Check-In
9:30 – 10:30 a.m.
Private information retrieval at 30: Achievements, disappointments, and open problems

Henry Corrigan-Gibbs (MIT)
Video
10:30 – 11:15 a.m.
Break
11:15 – 11:45 a.m.
Lower-Bounds on Public-Key Operations in PIR

Mohammad Hajiabadi (University of Waterloo)
Video
11:45 a.m. – 1:45 p.m.
Lunch (on your own)
1:45 – 2:15 p.m.
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs

Mihir Bellare (UCSD)
Video
2:15 – 2:45 p.m.
PULSE: Parallel Private Set Union for Large-Scale Entities

Ni Trieu (Arizona State University)
Video
2:45 – 3:30 p.m.
Break
3:30 – 4 p.m.
Distance-Aware OT with Application to Fuzzy PSI

Jaspal Singh (Purdue University, Georgia Tech)
Video
4 – 4:30 p.m.
Updatable Private Set Intersection

Peihan Miao (Brown University)
Video
9 – 9:30 a.m.
Coffee and Check-In
9:30 – 10 a.m.
Efficient Modular Arithmetic using Vectorization on CPUs and GPUs

Srini Devadas (Massachusetts Institute of Technology)
Video
10 – 10:30 a.m.
Optimizing Pseudorandom Correlation Generators from LPN

Peter Rindal (Visa Research)
Video
10:30 – 11:15 a.m.
Break
11:15 – 11:45 a.m.
Multi-Party Distributed Point Functions

Mingyuan Wang (New York University, Shanghai)
Video
11:45 a.m. – 1:45 p.m.
Lunch (on your own)
1:45 – 2:15 p.m.
Is It Even Possible? On the Parallel Composition of Asynchronous MPC Protocols

Juan Garay (Texas A&M University)
Video
2:15 – 2:45 p.m.
On the Adaptive Security of Key-Unique Threshold Signatures

Chelsea Komlo (University of Waterloo)
Video
2:45 – 3:30 p.m.
Break
3:30 – 4 p.m.
Recent Advances in Asynchronous Multi-Party Computation

Chen-Da Liu-Zhang (Lucerne University of Applied Sciences and Arts & Web3 Found…
Video
4 – 4:30 p.m.
New Techniques for Building Information-Theoretic Asynchronous MPC with Linear Communication

Yifan Song (Tsinghua University)
Video
9 – 9:30 a.m.
Coffee and Check-In
9:30 – 10:30 a.m.
The modern anonymous credential (how ZK landed in Google Wallet)

Abhi Shelat (Northeastern)
Video
10:30 – 11:15 a.m.
Break
11:15 – 11:45 a.m.
Privacy Preserving Aggregation of Ad Conversions using MPC

Daniel Masny (Meta)
Video
11:45 a.m. – 1:45 p.m.
Lunch (on your own)
1:45 – 2:45 p.m.
From 10,000-Party Protocols to Vibe Coding ZK: Engineering Cryptography Through Black-Box Design

Muthu Venkitasubramaniam (Ligero Inc.)
Video
2:45 – 3:30 p.m.
Break
3:30 – 4 p.m.
Secure Computation in Action: Real-World Deployments in Finance

Antigoni Polychroniadou (JP Morgan)
Video
4 – 4:30 p.m.
Willow: Secure Aggregation with One-Shot Clients

Mariana Raykova (Google)
Video
Share this page
Copy URL of this page
Home
The Simons Institute for the Theory of Computing is the world's leading venue for collaborative research in theoretical computer science.

Footer

  • Programs & Events
  • About
  • Participate
  • Workshops & Symposia
  • Contact Us
  • Calendar
  • Accessibility

Footer social media

  • Twitter
  • Facebook
  • Youtube
© 2013–2025 Simons Institute for the Theory of Computing. All Rights Reserved.
link to homepage

Main navigation

  • Home
  • Programs & Events
    • Research Programs
    • Workshops & Symposia
    • Public Lectures
    • Research Pods
    • Internal Program Activities
    • Algorithms, Society, and the Law
  • People
    • Scientific Leadership
    • Staff
    • Current Long-Term Visitors
    • Research Fellows
    • Postdoctoral Researchers
    • Scientific Advisory Board
    • Governance Board
    • Industry Advisory Council
    • Affiliated Faculty
    • Science Communicators in Residence
    • Law and Society Fellows
  • Participate
    • Apply to Participate
    • Plan Your Visit
    • Accessibility
    • Location & Directions
    • Postdoctoral Research Fellowships
    • Law and Society Fellowships
    • Science Communicator in Residence Program
    • Circles
    • Breakthroughs Workshops and Goldwasser Exploratory Workshops
  • Support
    • Annual Fund
    • All Funders
    • Institutional Partnerships
  • News & Videos
    • News
    • Videos
  • About

Utility navigation

  • Calendar
  • Contact
  • Login
  • MAKE A GIFT
link to homepage