Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
Springer, Nov 2, 2009 - Computers - 211 pages
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007. The 13 revised full papers presented in this volume were carefully reviewed and selected from 26 submissions. There were one invited keynote speech and 3 invited talks to the conference. The topics covered are authentication, group cryptography, private and reliable message transmission, secret sharing, and applications of information theory.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
1-round A-code access structure adversary structure algorithm Alice and Bob attack authentication code authentication system bits blind signature blind signature schemes chaffing-and-winnowing cipher system ciphertext codeword colluders commitment scheme computes consider construction convolutional code corrupt CRYPTO cryptographic define Definition denote Desmedt distribution E(wn efficient encoding encryption scheme exists fingerprinting follows Heidelberg HTAccS ICITS information theoretic security information theory input key assignment key-tree Kolmogorov complexity Lemma LKH schemes LNCS lower bound manual authentication manual channel matrix message transmission scheme message-signature pair min-entropy multicast n-channel Naor nodes non-zero oblivious transfer one-time pad optimal outputs participants plaintext polynomial probability problem Proof quantum random variables receiver reliable unicast revoked secret keys secret sharing scheme security notions sender sends Shannon entropy signer Springer string strongly multiplicative subset Theorem unconditional unconditionally secure unforgeability unicast valid vector