Description |
1 online resource (x, 211 pages) : illustrations |
Series |
Lecture notes in computer science, 1611-3349 ; 7412 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7412. 1611-3349
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Guessing secrecy / Mohsen Alimomeni and Reihaneh Safavi-Naini -- Trading robustness for correctness and privacy in certain multiparty computations, beyond an honest majority / Anne Broadbent, Stacey Jeffery, Samuel Ranellucci, and Alain Tapp -- Two protocols for delegation of computation / Ran Canetti, Ben Riva, and Guy N. Rothblum -- On the amortized complexity of zero knowledge protocols for multiplicative relations / Ronald Cramer, Ivan Damgård, and Valerio Pastro -- Universally composable oblivious transfer from lossy encryption and the McEliece assumptions / Bernardo Machado David, Anderson C.A. Nascimento, and Jörn Müller-Quade -- Shannon impossibility, revisited / Yevgeniy Dodis -- Statistically secure linear-rate dimension extension for oblivious affine function evaluation / Nico Döttling, Daniel Kraschewski, and Jörn Müller-Quade -- Passive corruption in statistical multi-party Computation / (extended abstract) / Martin Hirt, Christoph Lucas, Ueli Maurer, and Dominik Raub -- Efficient threshold zero-knowledge with applications to user-centric protocols / Marcel Keller, Gert Læssøe Mikkelsen, and Andy Rupp -- Information-theoretic timed-release security : key-agreement, encryption, and authentication codes / Yohei Watanabe, Takenobu Seito, and Junji Shikata -- Optimum general threshold secret sharing / Maki Yoshida, Toru Fujiwara, and Marc Fossorier -- Workshop track abstracts |
Summary |
ICITS 2012 was the 6th International Conference of Information-theoretic Security, held at the Université de Montreal in Montréal, Quebec, Canada, during August 15-17, 2012. ICITS 2012 was held in cooperation with the International Association for Cryptologic Research (IACR). The two-track format represented an experiment in bringing together researchers from three communities--information theory, cryptography, quantum computing--with very different publication cultures. The "conference" track was set up as a traditional computer science conference with only original submissions. Papers accepted to the "workshop" track do not appear in these proceedings except, at the discretion of the authors, as one-page abstracts. Workshop-track papers represent recently published or as-yet unpublished research. A full list of the workshop-track papers presented at the conference appears before the table of contents. The goal of the two-track format was to encourage participation from researchers from communities where a conference publication may preclude publication in a top journal, and to draw participants who normally publish in other conferences (CRYPTO and ISIT, for example). Thanks to the many people who contributed to the success of ICITS 2012. Above all, thanks to all the authors who submitted papers. ICITS exists to disseminate their research |
Analysis |
Computer science |
|
Data protection |
|
Data encryption (Computer science) |
|
Coding theory |
|
Information Systems |
|
Systems and Data Security |
|
Coding and Information Theory |
|
e-Commerce/e-business |
|
Management of Computing and Information Systems |
|
Computers and Society |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
informatietheorie |
|
information theory |
|
elektronische handel |
|
electronic commerce |
|
computers |
|
samenleving |
|
society |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references at chapter ends, and index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed August 23, 2012) |
In |
Springer eBooks |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer security -- Congresses
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Informationstheorie
|
|
Codierungstheorie
|
|
Kryptologie
|
|
Secret-Sharing
|
|
Kryptosystem
|
|
Informationsloses Beweissystem
|
|
Mehrparteienprotokoll
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Smith, Adam (Adam Davison), editor.
|
LC no. |
2012943067 |
ISBN |
9783642322846 |
|
3642322840 |
|
3642322832 |
|
9783642322839 |
|