LEADER 04138nam 22007095 450 001 996207295603316 005 20200705140039.0 010 $a3-319-17470-3 024 7 $a10.1007/978-3-319-17470-9 035 $a(CKB)3710000000404068 035 $a(SSID)ssj0001501535 035 $a(PQKBManifestationID)11921012 035 $a(PQKBTitleCode)TC0001501535 035 $a(PQKBWorkID)11446919 035 $a(PQKB)10613101 035 $a(DE-He213)978-3-319-17470-9 035 $a(MiAaPQ)EBC6295340 035 $a(MiAaPQ)EBC5578202 035 $a(Au-PeEL)EBL5578202 035 $a(OCoLC)906942342 035 $a(PPN)185489117 035 $a(EXLCZ)993710000000404068 100 $a20150401d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Theoretic Security$b[electronic resource] $e8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings /$fedited by Anja Lehmann, Stefan Wolf 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIV, 297 p. 29 illus.) 225 1 $aSecurity and Cryptology ;$v9063 300 $aIncludes index. 311 $a3-319-17469-X 327 $aPractical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. 330 $aThis book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics. 410 0$aSecurity and Cryptology ;$v9063 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 676 $a005.82 702 $aLehmann$b Anja$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWolf$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996207295603316 996 $aInformation Theoretic Security$9773803 997 $aUNISA