did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642207273

Information Theoretic Security : 5th International Conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings

by
  • ISBN13:

    9783642207273

  • ISBN10:

    3642207278

  • Format: Paperback
  • Copyright: 2011-06-30
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $89.99 Save up to $71.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011. The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones.

Table of Contents

Correlation Extractors and Their Applications (Invited Talk)p. 1
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, Authenticityp. 6
Randomly Encoding Functions: A New Cryptographic Paradigm (Invited Talk)p. 25
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networksp. 32
Quantum-Resilient Randomness Extraction (Invited Talk)p. 52
Homogeneous Faults, Colored Edge Graphs, and Cover Free Familiesp. 58
On Information Theoretic Security: Mathematical Models and Techniques (Invited Talk)p. 73
Common Randomness and Secret Key Capacities of Two-Way Channelsp. 76
LT-Codes and Phase Transitions for Mutual Information (Invited Talk)p. 94
Unconditionally Secure Signature Schemes Revisitedp. 100
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? (Invited Talk)p. 117
Efficient Reductions for Non-signaling Cryptographic Primitivesp. 120
Some Notions of Entropy for Cryptography (Invited Talk)p. 138
The Round Complexity of Perfectly Secure General VSSp. 143
Graceful Degradation in Multi-Party Computationp. 163
Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk)p. 181
Using Colors to Improve Visual Cryptography for Black and White Imagesp. 182
Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption (Invited Talk)p. 202
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resiliencep. 206
Author Indexp. 227
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program