Book Volume 8317 2014

Information Theoretic Security

7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings


ISBN: 978-3-319-04267-1 (Print) 978-3-319-04268-8 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages I-XII

  2. Chapter

    Pages 1-17

    How to Construct Strongly Secure Network Coding Scheme

  3. Chapter

    Pages 18-38

    Secure Two-Party Computation: A Visual Way

  4. Chapter

    Pages 39-55

    Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes

  5. Chapter

    Pages 56-68

    On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties

  6. Chapter

    Pages 69-89

    New Lower Bounds for Privacy in Communication Protocols

  7. Chapter

    Pages 90-102

    On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis

  8. Chapter

    Pages 103-121

    Information Theoretic Security for Encryption Based on Conditional Rényi Entropies

  9. Chapter

    Pages 122-141

    Insider-Proof Encryption with Applications for Quantum Key Distribution

  10. Chapter

    Pages 142-161

    Superposition Attacks on Cryptographic Protocols

  11. Chapter

    Pages 162-178

    Overcoming Weak Expectations via the R \(\acute{e}\) nyi Entropy and the Expanded Computational Entropy

  12. Chapter

    Pages 179-199

    Modulus Computational Entropy

  13. Chapter

    Pages 200-219

    Broadcast (and Round) Efficient Verifiable Secret Sharing

  14. Chapter

    Pages 220-237

    Leakage Resilience of the Blom’s Key Distribution Scheme

  15. Chapter

    Pages 238-258

    Detection of Algebraic Manipulation in the Presence of Leakage

  16. Back Matter

    Pages 259-259