ICITS 2013 Banner

Accepted Papers

ICITS 2013 Accepted Papers, Conference Track


Teng Guo, Feng Liu, Chuankun Wu, Yawei Ren and Weng Wang.
On (k, n) visual cryptography scheme with t essential parties

Kaoru Kurosawa, Hiroyuki Ohta and Kenji Kakuta.
How to Construct Strongly Secure Network Coding Scheme

Paolo D'Arco and Roberto De Prisco.
Secure two-party computation: a visual way

Paolo D'Arco, Roberto De Prisco and Alfredo De Santis.
Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes

Iordanis Kerenidis, Laurière Mathieu and David Xiao.
New lower bounds for privacy in communication protocols

Matthew Mckague and Lana Sheridan.
Insider-proof encryption with applications for quantum key distribution

Yanqing Yao and Zhoujun Li.
Overcoming Weak Expectations via the Entropy and the Expanded Computational Entropy

Maciej Skorski.
Modulus Computational Entropy

Maksym A. Girnyk, Frederic Gabry, Mikko Vehkaperä, Lars K. Rasmussen and Mikael Skoglund.
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis

Ivan Damgård, Jesper Buus Nielsen, Jakob Løvstad Funder and Louis Salvail.
Superposition Attacks on Cryptographic Protocols

Mitsugu Iwamoto and Junji Shikata.
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies

Juan Garay, Clint Givens, Rafail Ostrovsky and Pavel Raykov.
Broadcast (and Round) Efficient Verifiable Secret Sharing

Michał Jastrzębski and Stefan Dziembowski.
Leakage Resilience of the Blom's Key Distribution Scheme

Hadi Ahmadi and Reihaneh Safavi-Naini.
Detection of Algebraic Manipulation in the Presence of Leakage


ICITS 2013 Accepted Papers, Workshop Track


Jedrzej Kaniewski, Marco Tomamichel and Stephanie Wehner.
Security analysis for a relativistic bit commitment experiment

Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski and Stephanie Wehner.
One-Sided Device Independence of BB84 Via Monogamy-of-Entanglement Game

David Sutter, Joseph Merrill Renes and Renato Renner.
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization

Tomoyuki Morimae and Takeshi Koshiba.
Composable security of measuring-Alice blind quantum computation

André Chailloux, Iordanis Kerenidis and Jamie Sikora.
Oblivious transfer, the CHSH game, and quantum encodings

Masahito Hayashi and Shun Watanabe.
Non-Asymptotic Analysis of Privacy Amplification for Markov Chains

Todorka Alexandrova.
A Secret Images Sharing Scheme Using the Two-Variable One-Way Functions Approach with Public Values' Hiding

Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka and Mark M. Wilde.
Quantum enigma machines and the locking capacity of a quantum channel

Tanvirul Islam, Loïck Magnin, Brandon Sorg and Stephanie Wehner.
Reference frame agreement in quantum networks

Saikat Guha, Masahiro Takeoka, Hari Krovi, Mark M. Wilde and Cosmo Lupo.
Secret key agreement over a lossy optical channel with a passive quantum eavesdropper: Capacity bounds and new explicit protocols