Information Theoretic Security 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings / [electronic resource] : edited by Junji Shikata. - 1st ed. 2017. - XII, 235 p. 31 illus. online resource. - Security and Cryptology, 10681 2946-1863 ; . - Security and Cryptology, 10681 .

Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

9783319720890

10.1007/978-3-319-72089-0 doi


Data protection.
Coding theory.
Information theory.
Computer networks .
Software engineering.
Computer science--Mathematics.
Mathematical statistics.
Computer vision.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Software Engineering.
Probability and Statistics in Computer Science.
Computer Vision.

QA76.9.A25

005.8