Information Theoretic Security

7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings

Editors:

ISBN: 978-3-319-04267-1 (Print) 978-3-319-04268-8 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages I-XII

  2. No Access

    Book Chapter

    Pages 1-17

    How to Construct Strongly Secure Network Coding Scheme

  3. No Access

    Book Chapter

    Pages 18-38

    Secure Two-Party Computation: A Visual Way

  4. No Access

    Book Chapter

    Pages 39-55

    Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes

  5. No Access

    Book Chapter

    Pages 56-68

    On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties

  6. No Access

    Book Chapter

    Pages 69-89

    New Lower Bounds for Privacy in Communication Protocols

  7. No Access

    Book Chapter

    Pages 90-102

    On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis

  8. No Access

    Book Chapter

    Pages 103-121

    Information Theoretic Security for Encryption Based on Conditional Rényi Entropies

  9. No Access

    Book Chapter

    Pages 122-141

    Insider-Proof Encryption with Applications for Quantum Key Distribution

  10. No Access

    Book Chapter

    Pages 142-161

    Superposition Attacks on Cryptographic Protocols

  11. No Access

    Book Chapter

    Pages 162-178

    Overcoming Weak Expectations via the R \(\acute{e}\) nyi Entropy and the Expanded Computational Entropy

  12. No Access

    Book Chapter

    Pages 179-199

    Modulus Computational Entropy

  13. No Access

    Book Chapter

    Pages 200-219

    Broadcast (and Round) Efficient Verifiable Secret Sharing

  14. No Access

    Book Chapter

    Pages 220-237

    Leakage Resilience of the Blom’s Key Distribution Scheme

  15. No Access

    Book Chapter

    Pages 238-258

    Detection of Algebraic Manipulation in the Presence of Leakage

  16. Back Matter

    Pages 259-259