Information Theoretic Security

5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings

  • Serge Fehr
Conference proceedings ICITS 2011

DOI: 10.1007/978-3-642-20728-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6673)

Table of contents (19 papers)

  1. Front Matter
  2. Quantum-Resilient Randomness Extraction
    Renato Renner
    Pages 52-57
  3. Common Randomness and Secret Key Capacities of Two-Way Channels
    Hadi Ahmadi, Reihaneh Safavi-Naini
    Pages 76-93
  4. Unconditionally Secure Signature Schemes Revisited
    Colleen M. Swanson, Douglas R. Stinson
    Pages 100-116
  5. Efficient Reductions for Non-signaling Cryptographic Primitives
    Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
    Pages 120-137
  6. Some Notions of Entropy for Cryptography
    Leonid Reyzin
    Pages 138-142
  7. The Round Complexity of Perfectly Secure General VSS
    Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
    Pages 143-162
  8. Graceful Degradation in Multi-Party Computation (Extended Abstract)
    Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
    Pages 163-180
  9. Using Colors to Improve Visual Cryptography for Black and White Images
    Roberto De Prisco, Alfredo De Santis
    Pages 182-201
  10. Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption
    Alexander Barg, Grigory Kabatiansky
    Pages 202-205

About these proceedings


This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones.


authentication cryptography directed networks multi-party computation statistical security

Editors and affiliations

  • Serge Fehr
    • 1
  1. 1.Centrum Wiskunde & Incormatica (CWI)AmsterdemThe Netherlands

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-20727-3
  • Online ISBN 978-3-642-20728-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349