default search action
9th ICITS 2016: Tacoma, WA, USA
- Anderson C. A. Nascimento, Paulo S. L. M. Barreto:
Information Theoretic Security - 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10015, 2016, ISBN 978-3-319-49174-5
Secret Sharing
- Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. 3-23 - Giulia Traverso, Denise Demirel, Johannes Buchmann:
Dynamic and Verifiable Hierarchical Secret Sharing. 24-43
Quantum Cryptography
- Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules:
Computational Security of Quantum Encryption. 47-71 - Anne Broadbent, Evelyn Wainewright:
Efficient Simulation for Quantum Message Authentication. 72-91
Visual Cryptography
- Paolo D'Arco, Roberto De Prisco, Yvo Desmedt:
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography. 95-113 - Koray Karabina, Angela Robinson:
Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes. 114-125
Cryptographic Protocols
- Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. 129-150 - Gabriele Spini, Serge Fehr:
Cheater Detection in SPDZ Multiparty Computation. 151-176 - Kenji Yasunaga:
Error-Correcting Codes Against Chosen-Codeword Attacks. 177-189 - Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias:
Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract). 190-212 - Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. 213-237
Entropy, Extractors and Privacy
- Vladimir P. Parente, Jeroen van de Graaf:
A Practical Fuzzy Extractor for Continuous Features. 241-258 - Shahab Asoodeh, Fady Alajaji, Tamás Linder:
Almost Perfect Privacy for Additive Gaussian Privacy Filters. 259-278 - Maciej Skórski:
A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage. 279-299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.