Skip to main content
  • Conference proceedings
  • © 2011

Information Theoretic Security

5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011, Proceedings

Editors:

  • Fast track conference proceedings

  • Unique visibility

  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6673)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ITC: International Conference on Information-Theoretic Cryptography

Conference proceedings info: ICITS 2011.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (19 papers)

  1. Front Matter

  2. Quantum-Resilient Randomness Extraction

    • Renato Renner
    Pages 52-57
  3. Common Randomness and Secret Key Capacities of Two-Way Channels

    • Hadi Ahmadi, Reihaneh Safavi-Naini
    Pages 76-93
  4. Unconditionally Secure Signature Schemes Revisited

    • Colleen M. Swanson, Douglas R. Stinson
    Pages 100-116
  5. Efficient Reductions for Non-signaling Cryptographic Primitives

    • Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
    Pages 120-137
  6. Some Notions of Entropy for Cryptography

    • Leonid Reyzin
    Pages 138-142
  7. The Round Complexity of Perfectly Secure General VSS

    • Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
    Pages 143-162
  8. Graceful Degradation in Multi-Party Computation (Extended Abstract)

    • Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
    Pages 163-180
  9. Using Colors to Improve Visual Cryptography for Black and White Images

    • Roberto De Prisco, Alfredo De Santis
    Pages 182-201
  10. Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption

    • Alexander Barg, Grigory Kabatiansky
    Pages 202-205

Other Volumes

  1. Information Theoretic Security

About this book

This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones.

Keywords

  • authentication
  • cryptography
  • directed networks
  • multi-party computation
  • statistical security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Centrum Wiskunde & Incormatica (CWI), Amsterdem, The Netherlands

    Serge Fehr

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions