ICITS 2013 Banner

Program

Wednesday, November 27
Evening Welcome Reception at Raj Restaurant at Biopolis
( http://www.rajrestaurant.com.sg )
 
Thursday, November 28
08.30 - 09.00 Registration
09.00 - 09.15 Opening Remarks
09.15 - 10.15 Invited Talk 1, Amos Beimel. Multi-Linear Secret Sharing Schemes
10.15 - 10.45 Break
Conference Track, Session 1
10.45 - 11.10 Kaoru Kurosawa, Hiroyuki Ohta and Kenji Kakuta. How to Construct Strongly Secure Network Coding Scheme
11.10 - 11.35 Paolo D'Arco and Roberto De Prisco. Secure two-party computation: a visual way
11.35-12.00 Paolo D'Arco, Roberto De Prisco and Alfredo De Santis. Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes
12.00 - 12.25 Teng Guo, Feng Liu, Chuankun Wu, Yawei Ren and Weng Wang. On (k, n) visual cryptography scheme with t essential parties
12.30 - 14.30 Lunch Break
Workshop Track, Session 1
14.30 - 14.55 Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski and Stephanie Wehner. One-Sided Device Independence of BB84 Via Monogamy-of-Entanglement Game
14.55 - 15.20 Saikat Guha, Masahiro Takeoka, Hari Krovi, Mark M. Wilde and Cosmo Lupo. Secret key agreement over a lossy optical channel with a passive quantum eavesdropper: Capacity bounds and new explicit protocols
15.20 - 15.45 David Sutter, Joseph Merrill Renes and Renato Renner. Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization
15.45 - 16.15 Break
Conference Track, Session 2
16.15 - 17.30 Iordanis Kerenidis, Laurière Mathieu and David Xiao. New lower bounds for privacy in communication protocols
16.40 - 17.05 Maksym A. Girnyk, Frederic Gabry, Mikko Vehkaperä, Lars K. Rasmussen and Mikael Skoglund. On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
17.05 - 17.30 Mitsugu Iwamoto and Junji Shikata. Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
Evening Conference Dinner at Blue Ginger ( www.theblueginger.com )
 
Friday, November 29
Conference Track, Session 3
09.00 - 9.25 Matthew Mckague and Lana Sheridan. Insider-proof encryption with applications for quantum key distribution
09.25 - 09.50 Ivan Damgård, Jesper Buus Nielsen, Jakob Løvstad Funder and Louis Salvail. Superposition Attacks on Cryptographic Protocols
09.50 - 10.15 Yanqing Yao and Zhoujun Li. Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
10.15 - 10.40 Maciej Skorski. Modulus Computational Entropy
10.40 - 11.10 Break
11.10 - 12.10 Invited Talk 2 Marco Tomamichel. Entropic Uncertainty Relations and their Applications in Quantum Cryptography
12.15 - 14.15 Lunch Break
14.15 - 15.15 Invited Talk 3 Gilles Zemor. New results on percolation through topological quantum error correcting codes
15.15 - 15.45 Break
Workshop Track, Session 2
15.45 - 16.10 Tomoyuki Morimae and Takeshi Koshiba. Composable security of measuring-Alice blind quantum computation
16.10 - 16.35 Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka and Mark M. Wilde. Quantum enigma machines and the locking capacity of a quantum channel
16.35 - 17.00

André Chailloux, Iordanis Kerenidis and Jamie Sikora. Oblivious transfer, the CHSH game, and quantum encodings

 
Saturday, November 30
Workshop Track, Session 3
09.00 - 9.25 Masahito Hayashi and Shun Watanabe. Non-Asymptotic Analysis of Privacy Amplification for Markov Chains
09.25 - 09.50 Todorka Alexandrova. A Secret Images Sharing Scheme Using the Two-Variable One-Way Functions Approach with Public Values' Hiding
09.50 - 10.15 Jedrzej Kaniewski, Marco Tomamichel and Stephanie Wehner. Security analysis for a relativistic bit commitment experiment
10.15 - 10.40

Tanvirul Islam, Loïck Magnin, Brandon Sorg and Stephanie Wehner. Reference frame agreement in quantum networks

10.40 - 11.10 Break
Conference Track, Session 4
11.10 - 11.35 Juan Garay, Clint Givens, Rafail Ostrovsky and Pavel Raykov. Broadcast (and Round) Efficient Verifiable Secret Sharing
11.35 - 12.00 Michał Jastrzębski and Stefan Dziembowski. Leakage Resilience of the Blom's Key Distribution Scheme
12.00 - 12.25 Hadi Ahmadi and Reihaneh Safavi-Naini. Detection of Algebraic Manipulation in the Presence of Leakage
 
Conference adjourns