Full Description
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.
The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
Contents
Quantum cryptography.- Quantum information theory.- Post-quantum cryptography (e.g. lattices and cryptography).- Physical layer security.- Wiretap channels.- Adversarial channel models.- Cryptography from noisy channels.- Bounded storage models.- Network coding security.- Biometric security.- Randomness extraction.- Key and message rates.- Secret sharing.- Authentication codes.- Multiparty computations.- Information theoretic reductions.- Implementation challenges.