Skip to main content
  • Conference proceedings
  • © 2016

Information Theoretic Security

9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10015)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ITC: International Conference on Information-Theoretic Cryptography

Conference proceedings info: ICITS 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

    Pages I-VIII
  2. Secret Sharing

    1. Front Matter

      Pages 1-1
    2. Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters

      • Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
      Pages 3-23
    3. Dynamic and Verifiable Hierarchical Secret Sharing

      • Giulia Traverso, Denise Demirel, Johannes Buchmann
      Pages 24-43
  3. Quantum Cryptography

    1. Front Matter

      Pages 45-45
    2. Computational Security of Quantum Encryption

      • Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
      Pages 47-71
    3. Efficient Simulation for Quantum Message Authentication

      • Anne Broadbent, Evelyn Wainewright
      Pages 72-91
  4. Visual Cryptography

    1. Front Matter

      Pages 93-93
    2. Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography

      • Paolo D’Arco, Roberto De Prisco, Yvo Desmedt
      Pages 95-113
  5. Cryptographic Protocols

    1. Front Matter

      Pages 127-127
    2. Detecting Algebraic Manipulation in Leaky Storage Systems

      • Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang
      Pages 129-150
    3. Cheater Detection in SPDZ Multiparty Computation

      • Gabriele Spini, Serge Fehr
      Pages 151-176
    4. Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)

      • Samuel Ranellucci, Alain Tapp, Rasmus Zakarias
      Pages 190-212
    5. Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness

      • Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
      Pages 213-237
  6. Entropy, Extractors and Privacy

    1. Front Matter

      Pages 239-239
    2. A Practical Fuzzy Extractor for Continuous Features

      • Vladimir P. Parente, Jeroen van de Graaf
      Pages 241-258
    3. Almost Perfect Privacy for Additive Gaussian Privacy Filters

      • Shahab Asoodeh, Fady Alajaji, Tamás Linder
      Pages 259-278

Other Volumes

  1. Information Theoretic Security

About this book

This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.

Editors and Affiliations

  • University of Washington Tacoma , Tacoma, USA

    Anderson C.A. Nascimento

  • University of Washington , Tacoma, USA

    Paulo Barreto

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access