Information Theoretic Security

Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers

  • Yvo Desmedt
Conference proceedings ICITS 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4883)

Table of contents

  1. Front Matter
  2. Authentication I

    1. Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
      Pages 1-22
    2. Yuki Hara, Takenobu Seito, Junji Shikata, Tsutomu Matsumoto
      Pages 23-43
  3. Keynote Lecture

    1. Ueli Maurer
      Pages 44-45
  4. Group Cryptography

    1. Renato Renner, Stefan Wolf, Jürg Wullschleger
      Pages 65-75
    2. Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano
      Pages 76-88
  5. Private and Reliable Message Transmission

    1. K. Srinathan, C. Pandu Rangan, R. Kumaresan
      Pages 89-98
    2. Kaoru Kurosawa, Kazuhiro Suzuki
      Pages 99-112
  6. Invited Talk

  7. Authentication II

    1. Shuhong Wang, Reihaneh Safavi-Naini
      Pages 115-132
    2. Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
      Pages 133-145
  8. Invited Talk

    1. Iordanis Kerenidis
      Pages 146-147
  9. Secret Sharing

    1. Emilia Käsper, Ventzislav Nikov, Svetla Nikova
      Pages 148-168
    2. Tord Ingolf Reistad, Tomas Toft
      Pages 169-180
  10. Invited Talk

    1. Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, Alain Tapp
      Pages 181-182
  11. Applications of Information Theory

    1. Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento
      Pages 183-194
    2. L. Antunes, S. Laplante, A. Pinto, L. Salvador
      Pages 195-210
  12. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.

The 13 revised full papers presented in this volume were carefully reviewed and selected from 26 submissions. There were one invited keynote speech and 3 invited talks to the conference. The topics covered are authentication, group cryptography, private and reliable message transmission, secret sharing, and applications of information theory.


Kolmogorov complexity access control authentication broadcast encryption commitment communication efficiency cryptographic protocols cryptography efficiency fingerprinting information hiding information theory key distribution multi-party com security

Editors and affiliations

  • Yvo Desmedt
    • 1
  1. 1.Department of Computer ScienceUniversity College LondonLondonUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-10229-5
  • Online ISBN 978-3-642-10230-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software