LEADER 05213nam 22008775 450 001 9910484384403321 005 20251226202317.0 010 $a3-540-85093-7 024 7 $a10.1007/978-3-540-85093-9 035 $a(CKB)1000000000490686 035 $a(SSID)ssj0000715696 035 $a(PQKBManifestationID)11426947 035 $a(PQKBTitleCode)TC0000715696 035 $a(PQKBWorkID)10705484 035 $a(PQKB)11704133 035 $a(DE-He213)978-3-540-85093-9 035 $a(MiAaPQ)EBC3063118 035 $a(MiAaPQ)EBC6511689 035 $a(Au-PeEL)EBL6511689 035 $a(OCoLC)288472112 035 $a(PPN)128125861 035 $a(EXLCZ)991000000000490686 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Theoretic Security $eThird International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings /$fedited by Reihaneh Safavi-Naini 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XI, 249 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5155 300 $aIncludes index. 311 08$a3-540-85092-9 320 $aIncludes bibliographical references and index. 327 $aSecure and Reliable Communication I -- Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk) -- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption -- Quantum Information and Communication -- Interactive Hashing: An Information Theoretic Tool (Invited Talk) -- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network -- Networks and Devices -- Strong Secrecy for Wireless Channels (Invited Talk) -- Efficient Key Predistribution for Grid-Based Wireless Sensor Networks -- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk) -- Mulitparty Computation -- A Single Initialization Server for Multi-party Cryptography -- Statistical Security Conditions for Two-Party Secure Function Evaluation -- Information Hiding and Tracing -- Upper Bounds for Set Systems with the Identifiable Parent Property -- Coding Theory and Security -- Oblivious Transfer Based on the McEliece Assumptions -- List Error-Correction with Optimal Information Rate (Invited Talk) -- Quantum Computation -- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk) -- Susceptible Two-Party Quantum Computations -- Secure and Reliable Communication II -- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary -- Key Refreshing in Wireless Sensor Networks -- Efficient Traitor Tracing from Collusion Secure Codes -- Foundation -- Revisiting the Karnin, Greene and Hellman Bounds -- Simple Direct Reduction of String (1,2)-OT to Rabin?s OT without Privacy Amplification -- The Complexity of Distinguishing Distributions (Invited Talk) -- Encryption -- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-CiphertextSecurity (Invited Talk) -- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations. 330 $aThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5155 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aData protection 606 $aAlgorithms 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aCoding and Information Theory 606 $aData and Information Security 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 676 $a004 702 $aSafavi-Naini$b Reihanah 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484384403321 996 $aInformation Theoretic Security$9773803 997 $aUNINA