Skip to main content
  • Conference proceedings
  • © 2017

Information Theoretic Security

10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10681)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ITC: International Conference on Information-Theoretic Cryptography

Conference proceedings info: ICITS 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

    Pages I-XII
  2. Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model

    • Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
    Pages 1-25
  3. Broadcast Encryption with Guessing Secrecy

    • Yohei Watanabe
    Pages 39-57
  4. Contrast Optimal XOR Based Visual Cryptographic Schemes

    • Sabyasachi Dutta, Avishek Adhikari
    Pages 58-72
  5. Verifiably Multiplicative Secret Sharing

    • Maki Yoshida, Satoshi Obana
    Pages 73-82
  6. Catching MPC Cheaters: Identification and Openability

    • Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
    Pages 110-134
  7. Secure Grouping Protocol Using a Deck of Cards

    • Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka
    Pages 135-152
  8. Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations

    • Takeshi Nakai, Satoshi Shirouchi, Mitsugu Iwamoto, Kazuo Ohta
    Pages 153-165
  9. Secure Network Coding for Multiple Unicast: On the Case of Single Source

    • Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli
    Pages 188-207
  10. Back Matter

    Pages 235-235

Other Volumes

  1. Information Theoretic Security

About this book

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.


The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Editors and Affiliations

  • Yokohama National University , Yokohama, Japan

    Junji Shikata

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access