Information Theoretic Security : 8th International Conference, Icits 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
Overview
Practical Sharing of Quantum Secrets over Untrusted Channels.- Generalizing Efficient Multiparty Computation.- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity.- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits.- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy.- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation.- Metric Pseudoentropy: Characterizations, Transformations and Applications.- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy.- Gambling, Computational Information and Encryption Security.- Query-Complexity Amplification for Random Oracles.- The Chaining Lemma and Its Application.- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens.- Limited View Adversary Codes: Bounds, Constructions and Applications.- Locally Decodable Codes for Edit Distance.- The Multivariate Hidden Number Problem.- Lattice Point Enumeration on Block Reduced Bases.- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9783319174693
- ISBN-10: 331917469X
- Publisher: Springer
- Publish Date: April 2015
- Dimensions: 9.21 x 6.14 x 0.65 inches
- Shipping Weight: 0.97 pounds
- Page Count: 297
Related Categories
