Skip to main content
  • Conference proceedings
  • © 2009

Information Theoretic Security

Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4883)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ITC: International Conference on Information-Theoretic Cryptography

Conference proceedings info: ICITS 2007.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (17 papers)

  1. Front Matter

  2. Authentication I

    1. Commitment and Authentication Systems

      • Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
      Pages 1-22
    2. Unconditionally Secure Blind Signatures

      • Yuki Hara, Takenobu Seito, Junji Shikata, Tsutomu Matsumoto
      Pages 23-43
  3. Keynote Lecture

    1. Random Systems: Theory and Applications

      • Ueli Maurer
      Pages 44-45
  4. Group Cryptography

    1. Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation

      • Paolo D’Arco, Alfredo De Santis
      Pages 46-64
    2. Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement

      • Renato Renner, Stefan Wolf, Jürg Wullschleger
      Pages 65-75
    3. Improvement of Collusion Secure Convolutional Fingerprinting Information Codes

      • Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano
      Pages 76-88
  5. Private and Reliable Message Transmission

    1. On Exponential Lower Bound for Protocols for Reliable Communication in Networks

      • K. Srinathan, C. Pandu Rangan, R. Kumaresan
      Pages 89-98
    2. Almost Secure (1-Round, n-Channel) Message Transmission Scheme

      • Kaoru Kurosawa, Kazuhiro Suzuki
      Pages 99-112
  6. Authentication II

    1. New Results on Unconditionally Secure Multi-receiver Manual Authentication

      • Shuhong Wang, Reihaneh Safavi-Naini
      Pages 115-132
    2. Unconditionally Secure Chaffing-and-Winnowing for Multiple Use

      • Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
      Pages 133-145
  7. Invited Talk

    1. Introduction to Quantum Information Theory

      • Iordanis Kerenidis
      Pages 146-147
  8. Secret Sharing

    1. Strongly Multiplicative Hierarchical Threshold Secret Sharing

      • Emilia Käsper, Ventzislav Nikov, Svetla Nikova
      Pages 148-168
    2. Secret Sharing Comparison by Transformation and Rotation

      • Tord Ingolf Reistad, Tomas Toft
      Pages 169-180
  9. Invited Talk

    1. Anonymous Quantum Communication

      • Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, Alain Tapp
      Pages 181-182
  10. Applications of Information Theory

    1. Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation

      • Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento
      Pages 183-194
    2. Cryptographic Security of Individual Instances

      • L. Antunes, S. Laplante, A. Pinto, L. Salvador
      Pages 195-210
  11. Back Matter

Other Volumes

  1. Information Theoretic Security

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007. The 13 revised full papers presented in this volume were carefully reviewed and selected from 26 submissions. There were one invited keynote speech and 3 invited talks to the conference. The topics covered are authentication, group cryptography, private and reliable message transmission, secret sharing, and applications of information theory.

Keywords

  • Kolmogorov complexity
  • access control
  • authentication
  • broadcast encryption
  • commitment
  • communication efficiency
  • cryptographic protocols
  • cryptography
  • efficiency
  • fingerprinting
  • information hiding
  • information theory
  • key distribution
  • multi-party com
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science, University College London, London, UK

    Yvo Desmedt

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions