rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642144950

Information Theoretic Security : 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers

by
  • ISBN13:

    9783642144950

  • ISBN10:

    3642144950

  • Format: Paperback
  • Copyright: 2010-08-04
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $89.99 Save up to $70.19
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the thoroughly refereed post-conferenceproceedings of the 4th International Conference on Information TheoreticSecurity, held in Shizuoka, Japan, in December 2009.The 13 revised full papers presented together with 6 invited lectureswere carefully reviewed and selected from 50 submissions. The papers areorganized in topical sections on leakage resilient cryptography, quantumcryptography and indistinguishability, connection to computationalsecurity, secret sharing, key agreement from common randomness, randomgraph and group testing, reliable data transmission and computation, aswell as fingerprint and watermarking.

Table of Contents

Leakage Resilient Cryptography
Survey: Leakage Resilience and the Bounded Retrieval Modelp. 1
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemesp. 19
Quantum Cryptography and Indistinguishability
Security of Key Distribution and Complementarity in Quantum Mechanicsp. 27
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplificationp. 28
Connection to Computational Security
Code-Based Public-Key Cryptosystems and Their Applicationsp. 45
On the Security of Pseudorandomized Information-Theoretically Secure Schemesp. 56
Secret Sharing
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resiliencep. 74
On the Optimization of Bipartite Secret Sharing Schemesp. 93
Linear Threshold Multisecret Sharing Schemesp. 110
Key Agreement from Common Randomness
Multiterminal Secrecy Generation and Tree Packingp. 127
Information Theoretic Security Based on Bounded Observabilityp. 128
Random Graph and Group Testing
Group Testing and Batch Verificationp. 140
Reliable Data Transmision and Computation
What Can Cryptography Do for Coding Theory?p. 158
Cryptanalysis of Secure Message Transmission Protocols with Feedbackp. 159
The Optimum Leakage Principle for Analyzing Multi-threaded Programsp. 117
Fingerprint and Watermarking
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure?p. 194
An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codesp. 213
Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreadingp. 231
Author Indexp. 249
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program