Conferences In Information Security

Conference Name The 4th International Conference on Information Theoretic Security
Venue Shizuoka, Japan
URL http://www.rcis.aist.go.jp/ICITS2009/index.html
Submission Deadline 13-Aug-10
Conference Date December 3 - 6, 2010
Sponsership/Publisher IEEE
Aim/Scope/Research Area Over the last few decades, we have seen several research topics studied requiring information theoretical security, also called unconditional security, where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information theoretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption are broken. Seeing the multitude of topics in modern cryptography requiring information theoretical security or using information theory, it is time to have a regular conference on this topic.
This is the 4th conference of this series that is aimed to bring together the leading researchers in the area of information and/or quantum theoretic security. Original research papers on all technical aspects of information and/or quantum theoretic security are solicited for submission to ICITS 2009.

The topics of interest are (but not limited to)
Information Theoretic Analysis of Security
Public Key Cryptosystems using Codes
Conventional Cryptography using Codes
Authentication Codes
Key Distribution
Quantum Cryptography
Quantum Information Theory
Randomness Extraction
Secret Sharing
Secure Multiparty Computation
Oblivious Transfer
Anonymity
Ideal Ciphers
Traitor Tracing
Fingerprinting
Data Hiding and Watermarking
Information Hiding
Private and Reliable Networks

Back To Conferences List

Database Sections