did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540850922

Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 Proceedings

by
  • ISBN13:

    9783540850922

  • ISBN10:

    3540850929

  • Format: Paperback
  • Copyright: 2008-09-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00

Summary

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.

Table of Contents

Secure and Reliable Communication I
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problemsp. 1
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryptionp. 2
Quantum Information and Communication
Interactive Hashing: An Information Theoretic Toolp. 14
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Networkp. 29
Networks and Devices
Strong Secrecy for Wireless Channelsp. 40
Efficient Key Predistribution for Grid-Based Wireless Sensor Networksp. 54
Does Physical Security of Cryptographic Devices Need a Formal Study?p. 70
Mulitparty Computation
A Single Initialization Server for Multi-party Cryptographyp. 71
Statistical Security Conditions for Two-Party Secure Function Evaluationp. 86
Information Hiding and Tracing
Upper Bounds for Set Systems with the Identifiable Parent Propertyp. 100
Coding Theory and Security Oblivious Transfer Based on the McEliece Assumptionsp. 107
List Error-Correction with Optimal Information Ratep. 118
Quantum Computation
Theory of Quantum Key Distribution: The Road Aheadp. 120
Susceptible Two-Party Quantum Computationsp. 121
Secure and Reliable Communication II
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversaryp. 137
Key Refreshing in Wireless Sensor Networksp. 156
Efficient Traitor Tracing from Collusion Secure Codesp. 171
Foundation
Revisiting the Karnin, Greene and Hellman Boundsp. 183
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplificationp. 199
The Complexity of Distinguishing Distributionsp. 210
Encryption
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Securityp. 223
A Proof of Security in O(2[superscript n]) for the Xor of Two Random Pennutationsp. 232
Author Indexp. 249
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program