Information Theoretic Security

6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings

  • Adam Smith
Conference proceedings ICITS 2012

DOI: 10.1007/978-3-642-32284-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7412)

Table of contents (11 papers)

  1. Front Matter
  2. Guessing Secrecy
    Mohsen Alimomeni, Reihaneh Safavi-Naini
    Pages 1-13
  3. Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority
    Anne Broadbent, Stacey Jeffery, Samuel Ranellucci, Alain Tapp
    Pages 14-36
  4. Two Protocols for Delegation of Computation
    Ran Canetti, Ben Riva, Guy N. Rothblum
    Pages 37-61
  5. On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
    Ronald Cramer, Ivan Damgård, Valerio Pastro
    Pages 62-79
  6. Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
    Bernardo Machado David, Anderson C. A. Nascimento, Jörn Müller-Quade
    Pages 80-99
  7. Shannon Impossibility, Revisited
    Yevgeniy Dodis
    Pages 100-110
  8. Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
    Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
    Pages 111-128
  9. Passive Corruption in Statistical Multi-Party Computation
    Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
    Pages 129-146
  10. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
    Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
    Pages 147-166
  11. Optimum General Threshold Secret Sharing
    Maki Yoshida, Toru Fujiwara, Marc Fossorier
    Pages 187-204
  12. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.

The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.

Keywords

encryption information theory oblivious affine function evaluation privacy zero knowledge protocols

Editors and affiliations

  • Adam Smith
    • 1
  1. 1.Department of Computer Science and EngineeringPennsylvania State UniversityUniversity ParkUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-32283-9
  • Online ISBN 978-3-642-32284-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349