International

Information Theoretic Security: Second International by Alexandre Pinto, André Souto, Armando Matos, Luís Antunes

By Alexandre Pinto, André Souto, Armando Matos, Luís Antunes (auth.), Yvo Desmedt (eds.)

This e-book constitutes the completely refereed post-conference court cases of the second one foreign convention on info Theoretic safeguard, ICITS 2007, held in Madrid, Spain, in may possibly 2007.

The thirteen revised complete papers provided during this quantity have been rigorously reviewed and chosen from 26 submissions. there have been one invited keynote speech and three invited talks to the convention. the subjects coated are authentication, crew cryptography, deepest and trustworthy message transmission, mystery sharing, and purposes of data theory.

Show description

Read Online or Download Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers PDF

Best international books

Language International World Directory Volume 5 Language Centres: Their Roles, Functions and Management

Language centres serve an incredible function within the improvement and implementation of language coverage and in aiding language lecturers. This booklet describes 5 language centres, the Centre for info on Language instructing and examine (London), the eu Centre for contemporary Languages (Graz), the nearby Language Centre (Singapore), the nationwide international Language heart (NFLC, Washington DC), and the Centre for utilized Linguistics and Languages (CALL, Brisbane).

The Routledge International Handbook of Creative Learning (The Routledge International Handbook Series)

The concept that of inventive studying extends a long way past Arts-based studying or the improvement of person creativity. It covers a variety of approaches and projects in the course of the global that proportion universal values, structures and practices geared toward making studying extra artistic. this is applicable at person, lecture room, or entire college point, continuously with the purpose of absolutely realising younger people’s strength.

Fourth IFIP International Conference on Theoretical Computer Science - TCS 2006: IFIP 19th World Computer Congress, TC-1, Foundations of Computer Science, ... in Information and Communication Technology)

This quantity provides complaints from the nineteenth IFIP international laptop Congress in Santiago, Chile. The lawsuits of the area desktop Congress are a made from the collection of 2,000 delegates from greater than 70 nations to debate a myriad of subject matters within the ICT area. Of specific notice, this marks the 1st time global laptop Congress has been held in a Latin American kingdom.

Additional resources for Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers

Sample text

In: Proc. of CRYPTO 1982, pp. 199–204. Prenum Publishing Corporation (1982) 7. : Untraceable electronic cash. In: Goldwasser, S. ) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990) 8. : Unconditionally secure digital signature schemes admitting transferability. In: Okamoto, T. ) ASIACRYPT 2000. LNCS, vol. 1976, pp. 130–142. Springer, Heidelberg (2000) 9. : Security of blind digital signatures. S. ) CRYPTO 1997. LNCS, vol. 1294, pp. 150–164. Springer, Heidelberg (1997) 10. : Unconditionally secure encryption under strong attacks.

Log q and lEs = ntu (3ω +8) log q, where lΣ , lΣ ∗ , lEu and lEs are bit length of signatures for messages, signatures for blinded messages, users’ secret keys and the signer’s secret keys, respectively. 5 Concluding Remarks In this paper, we studied blind signature schemes from the viewpoint of unconditional security setting. Specifically, we newly introduced a model of unconditionally secure blind signatures. Also, we proposed security notions and their formalizations in our model. In addition, we provided a construction method that was provably secure in our strong security notions.

Lemma 1. PF is at most 2 q−2tv +2 . Proof. Without loss of generality it is sufficient to prove PF1 is at most q−2t2v +2 . , Uω } be a set of colluders. , n − 1). We note that the proposed construction consists of tu n independent signing-keys, blinding-keys, unblinding-keys and verification-keys, hence when W tries to produce a fraudulent message-signature pair (m , σ ) with σ = (d(i,t) , r ), obtained messagesignature pairs and pairs of blinded message and its signature are not valuable except for them corresponding to d(i,t) .

Download PDF sample

Rated 4.22 of 5 – based on 32 votes