Demo Section: Dynamic Block
The Dynamic Block section is a powerful tool for content editors. It allows you to embed a dynamically updating list of content, such as a list of upcoming events or latest articles. Each "Block" option has it's own configuration options.
Events – Upcoming
Exploring de Sitter Space Along an Observer’s Worldline
Yiming Chen
11:00am|Bloomberg Hall Physics Library
Abstract: It was recently observed that
introducing an observer makes the sphere path integral in de Sitter
space positive, allowing for a state-counting interpretation. To
better assess the status of this proposal, we analyze additional
observables...
Nan Liu
11:00am|Bloomberg Lecture Hall
AdS3 Quantum Gravity via Finite-N Expansions
11:00am|Bloomberg Lecture Hall (IAS) & Zoom
Abstract: I will discuss the bulk mechanism of
the stringy exclusion principle in the AdS3/CFT2 case. Consider the
duality between string theory on AdS3 × S3 × M4 and
Sym^N(M4). At finite N, both the chiral-chiral spectrum and the
number of the...
Events - Previous
Analog Coding, List Decoding, Bandwidth, and Mean Dimension
10:30am|Simonyi Hall 101 and Remote Access
Suppose we have some system X, that evolves over time. We want
to communicate the status of a point in X at all times using a
bandwidth limited channel. How big a bandwidth is needed to achieve
this? And what is the connection to Shannon entropy and...
How to Amplify the Distance of a Code Optimally
Sidhanth Mohanty
11:00am|Simonyi Classroom (S-114)
We consider the problem of explicitly constructing binary linear
codes achieving the optimal rate-distance tradeoff. In 2017,
Ta-Shma gave an almost-optimal construction in the low-rate regime,
i.e., he gave a construction of binary linear codes...
Algorithms for Overcomplete Tensor Decomposition
Pravesh Kothari
10:30am|Simonyi 101 and Remote Access
Tensor decomposition is the task of writing an n x n x n input
tensor T as \sum_{i = 1}^r a_i \otimes b_i \otimes c_i for the
smallest possible r (called the rank of T). This problem is NP-hard
in general. Jennrich's algorithm succeeds if a_is, b_is...
Upcoming Talk
When:
Tuesday, May 12, 2026 | 10:30 AM EDT
Where: Simonyi 101 and Remote Access
Abstract
A common tool in the construction of probabilistically checkable proofs is low degree encodings. Babai, Fortnow and Lund proved the local testability of the individual low degree code, and used it to provide a multi-prover interactive proof (MIP) protocol for every non-deterministic exponential time (NEXP) language. In 2019, Ji, Natarajan, Vidick, Wright and Yuen settled the analogous quantum question, showing that there is a quantum MIP protocol (MIP*) for every recursively enumerable (RE) language. Arguably, the most technical part in their argument is the quantum local testability of the individual low degree code. I aim to present both the classical and quantum local testability results with some detail.
Upcoming Schedule
Monday, May 18, 2026 | 11:00am
Nir Bitansky, New York University
Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions
Abstract
The shuffle model is a widely used abstraction for non-interactive anonymous communication. It allows $n$ parties holding private inputs $x_1,\dots,x_n$ to simultaneously send messages to an evaluator, so that the messages are received in a random order. The evaluator can then compute a joint function $f(x_1,\dots,x_n)$, ideally while learning nothing else about the private inputs. The model has become increasingly popular both in cryptography, as an alternative to non-interactive secure computation in trusted setup models, and even more so in differential privacy, as an intermediate between the high-privacy, little-utility {\em local model} and the little-privacy, high-utility {\em central curator model}.
The main open question in this context is which functions $f$ can be computed in the shuffle model with {\em statistical security.} While general feasibility results were obtained using public-key cryptography, the question of statistical security has remained elusive. The common conjecture has been that even relatively simple functions cannot be computed with statistical security in the shuffle model.
We refute this conjecture, showing that {\em all} functions can be computed in the shuffle model with statistical security. In particular, any differentially private mechanism in the central curator model can also be realized in the shuffle model with essentially the same utility, and while the evaluator learns nothing beyond the central model result.
This feasibility result is obtained by constructing a statistically secure {\em additive randomized encoding} (ARE) for any function. An ARE randomly maps individual inputs to group elements whose sum only reveals the function output.
Similarly to other types of randomized encoding of functions, our statistical ARE is efficient for functions in $NC^1$ or $NL$. Alternatively, we get computationally secure ARE for all polynomial-time functions using a one-way function. More generally, we can convert any (information-theoretic or computational) ``garbling scheme'' to an ARE with a constant-factor size overhead.
Joint work with Saroja Erabelli, Rachit Garg, and Yuval Ishai.
News - Latest Dynamic Block
Proin nibh magna, euismod quis libero vel, consectetur faucibus
metus. Fusce pretium mattis lectus, id scelerisque urna vestibulum
quis. In vitae odio tortor. Praesent at maximus lectus. Maecenas
pharetra suscipit lacus quis blandit. Pellentesque...
Read More
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras
commodo placerat blandit. Proin id nulla a mi suscipit pharetra.
Cras fringilla nec nibh vitae hendrerit. Nam et dolor tristique,
pretium mi ac, semper quam. Quisque vel congue est, sit...
Read More
Related Content by Tag Dynamic Block