Information Theoretic Security

4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers

  • Kaoru Kurosawa
Conference proceedings ICITS 2009

DOI: 10.1007/978-3-642-14496-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5973)

Table of contents (18 papers)

  1. Front Matter
  2. Leakage Resilient Cryptography

  3. Quantum Cryptography and Indistinguishability

  4. Connection to Computational Security

  5. Secret Sharing

    1. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
      Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 74-92
    2. On the Optimization of Bipartite Secret Sharing Schemes
      Oriol Farràs, Jessica Ruth Metcalf-Burton, Carles Padró, Leonor Vázquez
      Pages 93-109
    3. Linear Threshold Multisecret Sharing Schemes
      Oriol Farràs, Ignacio Gracia, Sebastià Martín, Carles Padró
      Pages 110-126
  6. Key Agreement from Common Randomness

    1. Information Theoretic Security Based on Bounded Observability
      Jun Muramatsu, Kazuyuki Yoshimura, Peter Davis
      Pages 128-139
  7. Random Graph and Group Testing

    1. Group Testing and Batch Verification
      Gregory M. Zaverucha, Douglas R. Stinson
      Pages 140-157
  8. Reliable Data Transmision and Computation

  9. Fingerprint and Watermarking

  10. Back Matter

About these proceedings

Introduction

ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, aiming to bring together the leading researchers in the area of information and/or quantum theoretic security.

Keywords

DES Information algorithms coding theory cryptography data transmission fingerprinting information hiding network security privacy and reliability quantum cryptography security

Editors and affiliations

  • Kaoru Kurosawa
    • 1
  1. 1.Department of Computer and Information SciencesIbaraki UniversityHitachiJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14495-0
  • Online ISBN 978-3-642-14496-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349