Demo Section: Dynamic Block

The Dynamic Block section is a powerful tool for content editors. It allows you to embed a dynamically updating list of content, such as a list of upcoming events or latest articles. Each "Block" option has it's own configuration options.

Events – Upcoming

May
07
2026

IAS Quantum Aspects of Black Holes Group Meeting

Exploring de Sitter Space Along an Observer’s Worldline
Yiming Chen
11:00am|Bloomberg Hall Physics Library

Abstract: It was recently observed that introducing an observer makes the sphere path integral in de Sitter space positive, allowing for a state-counting interpretation. To better assess the status of this proposal, we analyze additional observables...

May
08
2026

IAS High Energy Theory Seminar

AdS3 Quantum Gravity via Finite-N Expansions
11:00am|Bloomberg Lecture Hall (IAS) & Zoom

Abstract: I will discuss the bulk mechanism of the stringy exclusion principle in the AdS3/CFT2 case. Consider the duality between  string theory on AdS3 × S3 × M4 and Sym^N(M4). At finite N, both the chiral-chiral spectrum and the number of the...

Events - Previous

May
04
2026

Computer Science/Discrete Mathematics Seminar I

Analog Coding, List Decoding, Bandwidth, and Mean Dimension
10:30am|Simonyi Hall 101 and Remote Access

Suppose we have some system X, that evolves over time. We want to communicate the status of a point in X at all times using a bandwidth limited channel. How big a bandwidth is needed to achieve this? And what is the connection to Shannon entropy and...

Apr
30
2026

Computer Science/Discrete Mathematics Seminar I

How to Amplify the Distance of a Code Optimally
Sidhanth Mohanty
11:00am|Simonyi Classroom (S-114)

We consider the problem of explicitly constructing binary linear codes achieving the optimal rate-distance tradeoff.  In 2017, Ta-Shma gave an almost-optimal construction in the low-rate regime, i.e., he gave a construction of binary linear codes...

Apr
28
2026

Computer Science/Discrete Mathematics Seminar II

Algorithms for Overcomplete Tensor Decomposition
Pravesh Kothari
10:30am|Simonyi 101 and Remote Access

Tensor decomposition is the task of writing an n x n x n input tensor T as \sum_{i = 1}^r a_i \otimes b_i \otimes c_i for the smallest possible r (called the rank of T). This problem is NP-hard in general. Jennrich's algorithm succeeds if a_is, b_is...

Upcoming Talk

Informal Talk on the Quantum Soundness of the Low (individual) Degree Test: Part II

Speaker: Michael Chapman, Institute for Advanced Study
When: Tuesday, May 12, 2026 | 10:30 AM EDT
Where: Simonyi 101 and Remote Access

Abstract

A common tool in the construction of probabilistically checkable proofs is low degree encodings. Babai, Fortnow and Lund proved the local testability of the individual low degree code, and used it to provide a multi-prover interactive proof (MIP) protocol for every non-deterministic exponential time (NEXP) language. In 2019, Ji, Natarajan, Vidick, Wright and Yuen settled the analogous quantum question, showing that there is a quantum MIP protocol (MIP*) for every recursively enumerable (RE) language. Arguably, the most technical part in their argument is the quantum local testability of the individual low degree code. I aim to present both the classical and quantum local testability results with some detail.

Add to calendar 05/12/2026 10:3005/12/2026 12:30America/New_YorkComputer Science/Discrete Mathematics Seminar IIuse-titleTopic: Informal Talk on the Quantum Soundness of the Low (individual) Degree Test: Part II Speakers: Michael Chapman, Institute for Advanced Study More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-ii-622 A common tool in the construction of probabilistically checkable proofs is low degree encodings. Babai, Fortnow and Lund proved the local testability of the individual low degree code, and used it to provide a multi-prover interactive proof (MIP) protocol for every non-deterministic exponential time (NEXP) language. In 2019, Ji, Natarajan, Vidick, Wright and Yuen settled the analogous quantum question, showing that there is a quantum MIP protocol (MIP*) for every recursively enumerable (RE) language. Arguably, the most technical part in their argument is the quantum local testability of the individual low degree code. I aim to present both the classical and quantum local testability results with some detail. Simonyi 101 and Remote Accessa7a99c3d46944b65a08073518d638c23

Upcoming Schedule

Monday, May 18, 2026 | 11:00am
Nir Bitansky, New York University
Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions
Abstract

The shuffle model is a widely used abstraction for non-interactive anonymous communication. It allows $n$ parties holding private inputs $x_1,\dots,x_n$ to simultaneously send messages to an evaluator, so that the messages are received in a random order. The evaluator can then compute a joint function $f(x_1,\dots,x_n)$, ideally while learning nothing else about the private inputs. The model has become increasingly popular both in cryptography, as an alternative to non-interactive secure computation in trusted setup models, and even more so in differential privacy, as an intermediate between the high-privacy, little-utility {\em local model} and the little-privacy, high-utility {\em central curator model}.

The main open question in this context is which functions $f$ can be computed in the shuffle model with {\em statistical security.} While general feasibility results were obtained using public-key cryptography, the question of statistical security has remained elusive. The common conjecture has been that even relatively simple functions cannot be computed with statistical security in the shuffle model.

We refute this conjecture, showing that {\em all} functions can be computed in the shuffle model with statistical security. In particular, any differentially private mechanism in the central curator model can also be realized in the shuffle model with essentially the same utility, and while the evaluator learns nothing beyond the central model result.

This feasibility result is obtained by constructing a statistically secure {\em additive randomized encoding} (ARE) for any function. An ARE randomly maps individual inputs to group elements whose sum only reveals the function output.
Similarly to other types of randomized encoding of functions,  our statistical ARE is efficient for functions in $NC^1$ or $NL$. Alternatively, we get computationally secure ARE for all polynomial-time functions using a one-way function. More generally, we can convert any (information-theoretic or computational) ``garbling scheme'' to an ARE with a constant-factor size overhead.

Joint work with Saroja Erabelli, Rachit Garg, and Yuval Ishai.

Add to calendar Monday, 2026-05-18 11:00Monday, 2026-05-18 12:00America/New_YorkComputer Science/Discrete Mathematics Seminar Iuse-titleTopic: Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions Speakers: Nir Bitansky, New York University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-i-626 The shuffle model is a widely used abstraction for non-interactive anonymous communication. It allows $n$ parties holding private inputs $x_1,\dots,x_n$ to simultaneously send messages to an evaluator, so that the messages are received in a random order. The evaluator can then compute a joint function $f(x_1,\dots,x_n)$, ideally while learning nothing else about the private inputs. The model has become increasingly popular both in cryptography, as an alternative to non-interactive secure computation in trusted setup models, and even more so in differential privacy, as an intermediate between the high-privacy, little-utility {\em local model} and the little-privacy, high-utility {\em central curator model}. The main open question in this context is which functions $f$ can be computed in the shuffle model with {\em statistical security.} While general feasibility results were obtained using public-key cryptography, the question of statistical security has remained elusive. The common conjecture has been that even relatively simple functions cannot be computed with statistical security in the shuffle model. We refute this conjecture, showing that {\em all} functions can be computed in the shuffle model with statistical security. In particular, any differentially private mechanism in the central curator model can also be realized in the shuffle model with essentially the same utility, and while the evaluator learns nothing beyond the central model result. This feasibility result is obtained by constructing a statistically secure {\em additive randomized encoding} (ARE) for any function. An ARE randomly maps individual inputs to group elements whose sum only reveals the function output. Similarly to other types of randomized encoding of functions,  our statistical ARE is…West Lecture Hall and Remote Accessa7a99c3d46944b65a08073518d638c23
Monday, Jun 01, 2026 | 11:00am
Jarosław Błasiok, Bocconi University
Expanders Meet Reed-Muller: Easy Instances of Noisy k-XOR
Abstract
Add to calendar Monday, 2026-06-01 11:00Monday, 2026-06-01 12:00America/New_YorkComputer Science/Discrete Mathematics Seminar Iuse-titleTopic: Expanders Meet Reed-Muller: Easy Instances of Noisy k-XOR Speakers: Jarosław Błasiok, Bocconi University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-i-627 Simonyi Hall 101 and Remote Accessa7a99c3d46944b65a08073518d638c23
Tuesday, Jun 02, 2026 | 10:30am
Itzhak Tamo, Tel-Aviv University
Computer Science/Discrete Mathematics Seminar II
Abstract
Add to calendar Tuesday, 2026-06-02 10:30Tuesday, 2026-06-02 12:30America/New_YorkComputer Science/Discrete Mathematics Seminar IIuse-titleSpeakers: Itzhak Tamo, Tel-Aviv University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-ii-621 Simonyi 101 and Remote Accessa7a99c3d46944b65a08073518d638c23

News - Latest Dynamic Block

Proin nibh magna, euismod quis libero vel, consectetur faucibus metus. Fusce pretium mattis lectus, id scelerisque urna vestibulum quis. In vitae odio tortor. Praesent at maximus lectus. Maecenas pharetra suscipit lacus quis blandit. Pellentesque...

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras commodo placerat blandit. Proin id nulla a mi suscipit pharetra. Cras fringilla nec nibh vitae hendrerit. Nam et dolor tristique, pretium mi ac, semper quam. Quisque vel congue est, sit...

Related Content by Tag Dynamic Block

Scholars by Affiliation

Sort by: