This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.
The 13 revised full papers presented in this volume were carefully reviewed and selected from 26 submissions. There were one invited keynote speech and 3 invited talks to the conference. The topics covered are authentication, group cryptography, private and reliable message transmission, secret sharing, and applications of information theory.
Author(s): Alexandre Pinto, André Souto, Armando Matos, Luís Antunes (auth.), Yvo Desmedt (eds.)
Series: Lecture Notes in Computer Science 4883 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 211
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society
Front Matter....Pages -
Commitment and Authentication Systems....Pages 1-22
Unconditionally Secure Blind Signatures....Pages 23-43
Random Systems: Theory and Applications....Pages 44-45
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation....Pages 46-64
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement....Pages 65-75
Improvement of Collusion Secure Convolutional Fingerprinting Information Codes....Pages 76-88
On Exponential Lower Bound for Protocols for Reliable Communication in Networks....Pages 89-98
Almost Secure (1-Round, n -Channel) Message Transmission Scheme....Pages 99-112
Construction Methodology of Unconditionally Secure Signature Schemes....Pages 113-114
New Results on Unconditionally Secure Multi-receiver Manual Authentication....Pages 115-132
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use....Pages 133-145
Introduction to Quantum Information Theory....Pages 146-147
Strongly Multiplicative Hierarchical Threshold Secret Sharing....Pages 148-168
Secret Sharing Comparison by Transformation and Rotation....Pages 169-180
Anonymous Quantum Communication....Pages 181-182
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation....Pages 183-194
Cryptographic Security of Individual Instances....Pages 195-210
Back Matter....Pages -