Skip to main content
  • Conference proceedings
  • © 2014

Information Theoretic Security

7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8317)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ITC: International Conference on Information-Theoretic Cryptography

Conference proceedings info: ICITS 2013.

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-04268-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (14 papers)

  1. Front Matter

    Pages I-XII
  2. How to Construct Strongly Secure Network Coding Scheme

    • Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta
    Pages 1-17
  3. Secure Two-Party Computation: A Visual Way

    • Paolo D’Arco, Roberto De Prisco
    Pages 18-38
  4. Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes

    • Paolo D’Arco, Roberto De Prisco, Alfredo De Santis
    Pages 39-55
  5. On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties

    • Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang
    Pages 56-68
  6. New Lower Bounds for Privacy in Communication Protocols

    • Iordanis Kerenidis, Mathieu Laurière, David Xiao
    Pages 69-89
  7. On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis

    • Maksym A. Girnyk, Frédéric Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund
    Pages 90-102
  8. Superposition Attacks on Cryptographic Protocols

    • Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
    Pages 142-161
  9. Modulus Computational Entropy

    • Maciej Skórski
    Pages 179-199
  10. Broadcast (and Round) Efficient Verifiable Secret Sharing

    • Juan Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov
    Pages 200-219
  11. Leakage Resilience of the Blom’s Key Distribution Scheme

    • Michał Jastrzȩbski, Stefan Dziembowski
    Pages 220-237
  12. Detection of Algebraic Manipulation in the Presence of Leakage

    • Hadi Ahmadi, Reihaneh Safavi-Naini
    Pages 238-258
  13. Back Matter

    Pages 259-259

Other Volumes

  1. Information Theoretic Security

    7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings

About this book

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Keywords

  • cryptography
  • information theory
  • information-theoretic cryptography
  • quantum cryptography
  • quantum information theory

Editors and Affiliations

  • Nanyang Technological University, Singapore, Singapore

    Carles Padró

Bibliographic Information

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-04268-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)