Information theoretic security : 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings / Adam Smith (ed.).
Contributor(s): Smith, AdamMaterial type: TextSeries: SerienbezeichnungLecture notes in computer science: 7412.; LNCS sublibrary: Publisher: Berlin ; New York : Springer, ©2012Description: 1 online resource (x, 211 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642322846; 3642322840; 3642322832; 9783642322839Other title: ICITS 2012Subject(s): Data encryption (Computer science) -- Congresses | Computer networks -- Security measures -- Congresses | Computer security -- Congresses | Informatique | Computer networks -- Security measures | Computer security | Data encryption (Computer science) | Informationstheorie | Codierungstheorie | Kryptologie | Secret-Sharing | Kryptosystem | Informationsloses Beweissystem | Mehrparteienprotokoll | Computer science | Data protection | Data encryption (Computer science) | Coding theory | Information Systems | Systems and Data Security | Coding and Information Theory | e-Commerce/e-business | Management of Computing and Information Systems | Computers and Society | computerwetenschappen | computer sciences | informatiesystemen | informatietheorie | information theory | elektronische handel | electronic commerce | computers | samenleving | society | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Information theoretic security.DDC classification: 005.8/2 LOC classification: QA76.9.A25 | I25 2012Online resources: Click here to access online
|Item type||Current location||Collection||Call number||Status||Date due||Barcode||Item holds|
Guessing Secrecy / Mohsen Alimomeni and Reihaneh Safavi-Naini -- Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority / Anne Broadbent, Stacey Jeffery, Samuel Ranellucci and Alain Tapp -- Two Protocols for Delegation of Computation / Ran Canetti, Ben Riva and Guy N. Rothblum -- On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations / Ronald Cramer, Ivan Damgård and Valerio Pastro -- Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions / Bernardo Machado David, Anderson C.A. Nascimento and Jörn Müller-Quade -- Shannon Impossibility, Revisited / Yevgeniy Dodis -- Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation / Nico Döttling, Daniel Kraschewski and Jörn Müller-Quade -- Passive Corruption in Statistical Multi-Party Computation / (Extended Abstract) / Martin Hirt, Christoph Lucas, Ueli Maurer and Dominik Raub -- Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols / Marcel Keller, Gert Læssøe Mikkelsen and Andy Rupp -- Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes / Yohei Watanabe, Takenobu Seito and Junji Shikata -- Optimum General Threshold Secret Sharing / Maki Yoshida, Toru Fujiwara and Marc Fossorier.
International conference proceedings.
Includes bibliographical references and author index.
Online resource; title from PDF title page (SpringerLink, viewed Aug. 23, 2012).
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.