Skip to main content

Information Theoretic Security

4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers

  • Conference proceedings
  • © 2010

Overview

  • Fast-track conference proceedings
  • State-of-the-art research
  • Unique selling points

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5973)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ICITS 2009.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (18 papers)

  1. Leakage Resilient Cryptography

  2. Quantum Cryptography and Indistinguishability

  3. Connection to Computational Security

  4. Secret Sharing

  5. Key Agreement from Common Randomness

  6. Random Graph and Group Testing

  7. Reliable Data Transmision and Computation

Other volumes

  1. Information Theoretic Security

Keywords

About this book

ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, aiming to bring together the leading researchers in the area of information and/or quantum theoretic security.

Editors and Affiliations

  • Department of Computer and Information Sciences, Ibaraki University, Hitachi, Japan

    Kaoru Kurosawa

Bibliographic Information

Publish with us