Information Theoretic Security

7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings

  • Carles Padró
Conference proceedings ICITS 2013

DOI: 10.1007/978-3-319-04268-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8317)

Table of contents (14 papers)

  1. Front Matter
    Pages I-XII
  2. How to Construct Strongly Secure Network Coding Scheme
    Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta
    Pages 1-17
  3. Secure Two-Party Computation: A Visual Way
    Paolo D’Arco, Roberto De Prisco
    Pages 18-38
  4. Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
    Paolo D’Arco, Roberto De Prisco, Alfredo De Santis
    Pages 39-55
  5. On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties
    Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang
    Pages 56-68
  6. New Lower Bounds for Privacy in Communication Protocols
    Iordanis Kerenidis, Mathieu Laurière, David Xiao
    Pages 69-89
  7. On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
    Maksym A. Girnyk, Frédéric Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund
    Pages 90-102
  8. Superposition Attacks on Cryptographic Protocols
    Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
    Pages 142-161
  9. Modulus Computational Entropy
    Maciej Skórski
    Pages 179-199
  10. Broadcast (and Round) Efficient Verifiable Secret Sharing
    Juan Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov
    Pages 200-219
  11. Leakage Resilience of the Blom’s Key Distribution Scheme
    Michał Jastrzȩbski, Stefan Dziembowski
    Pages 220-237
  12. Detection of Algebraic Manipulation in the Presence of Leakage
    Hadi Ahmadi, Reihaneh Safavi-Naini
    Pages 238-258
  13. Back Matter
    Pages 259-259

About these proceedings

Introduction

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Keywords

cryptography information theory information-theoretic cryptography quantum cryptography quantum information theory

Editors and affiliations

  • Carles Padró
    • 1
  1. 1.Nanyang Technological UniversitySingaporeSingapore

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-04267-1
  • Online ISBN 978-3-319-04268-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349