Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held on Awaji Island, Japan, October 16-19, 2005, as the 2005 IEEE Information T- ory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005,Japan). The General Chair of ICITS 2007,Javier Lopez, and the Organ- ing Committee were responsible for local organization, registration, etc. Modern unclassi?ed research on cryptography started with Shannon's work on cryptography using information theory. Since then we have seen several - search topics studied, requiring information theoretical security, also called - conditional security. Examples are anonymity, authenticity, reliable and private networks, secure multi-party computation, traitor tracing, etc. Moreover, we have also seen that coding as well as other aspects of information theory have been used in the design of cryptographic schemes. In the last few years there have been plenty of conferences and workshopson specializedtopicsincryptography.ExamplesareCHES,FSE,PKCandTCC.In view ofthe multitude oftopics incryptographyrequiringinformationtheoretical security or using information theory, it is time to have a regular conference on this topic. This was ?rst realized by Prof. Imai (then at University of Tokyo, Japan), who organized the ?rst event in October 2005. The goal is to continue this event on a regular basis. Therewere26 paperssubmitted to ICITS2007,ofwhich onewaswithdrawn.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
1-round A-code access structure adversary structure algorithm Alice and Bob attack authentication code authentication system bits blind signature blind signature schemes chaﬃng-and-winnowing cipher system ciphertext codeword commitment scheme computes consider construction convolutional code corrupt CRYPTO cryptographic deﬁned Deﬁnition denote Desmedt diﬀerent distribution eﬃcient encryption scheme entropy exists ﬁeld ﬁngerprinting ﬁnite ﬁrst ﬂows follows Heidelberg HTAccS information theoretic security information theory input key assignment key-tree Kolmogorov complexity Lemma LKH scheme LNCS manual authentication manual channel message transmission scheme message-signature pair min-entropy multicast n-channel nodes non-zero oblivious transfer one-time pad optimal outputs participants plaintext polynomial probability problem Proof quantum random variable receiver reliable unicast revoked secret keys secret sharing scheme security notions sender sends Shannon entropy signer Springer string strongly multiplicative subset suﬃcient Theorem threshold unconditional unconditionally secure unforgeability unicast valid vector veriﬁers