LEADER 03972nam 22007335 450 001 9910483087403321 005 20251226193414.0 010 $a3-319-17470-3 024 7 $a10.1007/978-3-319-17470-9 035 $a(CKB)3710000000404068 035 $a(SSID)ssj0001501535 035 $a(PQKBManifestationID)11921012 035 $a(PQKBTitleCode)TC0001501535 035 $a(PQKBWorkID)11446919 035 $a(PQKB)10613101 035 $a(DE-He213)978-3-319-17470-9 035 $a(MiAaPQ)EBC6295340 035 $a(MiAaPQ)EBC5578202 035 $a(Au-PeEL)EBL5578202 035 $a(OCoLC)906942342 035 $a(PPN)185489117 035 $a(EXLCZ)993710000000404068 100 $a20150401d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Theoretic Security $e8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /$fedited by Anja Lehmann, Stefan Wolf 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIV, 297 p. 29 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9063 300 $aIncludes index. 311 08$a3-319-17469-X 327 $aPractical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. 330 $aThis book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9063 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aData and Information Security 606 $aCryptology 606 $aCoding and Information Theory 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 676 $a005.82 702 $aLehmann$b Anja$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWolf$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483087403321 996 $aInformation Theoretic Security$9773803 997 $aUNINA