Advertisement

Information Theoretic Security

10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings

  • Junji Shikata
Conference proceedings ICITS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10681)

Also part of the Security and Cryptology book sub series (LNSC, volume 10681)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
    Pages 1-25
  3. Yohei Watanabe
    Pages 39-57
  4. Sabyasachi Dutta, Avishek Adhikari
    Pages 58-72
  5. Maki Yoshida, Satoshi Obana
    Pages 73-82
  6. Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
    Pages 110-134
  7. Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka
    Pages 135-152
  8. Takeshi Nakai, Satoshi Shirouchi, Mitsugu Iwamoto, Kazuo Ohta
    Pages 153-165
  9. Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli
    Pages 188-207
  10. Back Matter
    Pages 235-235

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.

The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Keywords

Authentication codes Adversarial channel models Biometric security Bounded storage models Information theoretic cryptography Information theoretic security Network coding security Multiparty computations Physical layer security Quantum cryptograph Secret sharing Unconditional security data security wireless telecommunication systems software engineering wireless networks multicasting unicast

Editors and affiliations

  1. 1.Yokohama National University YokohamaJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-72089-0
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-72088-3
  • Online ISBN 978-3-319-72089-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering