International Conference on Information Theoretic Security (ICITS 2008)

Venue: Calgary

Location: Calgary, Canada

Event Date/Time: Aug 10, 2008 End Date/Time: Aug 13, 2008
Abstract Submission Date: Mar 23, 2008
Paper Submission Date: Mar 23, 2008
Report as Spam

Description

ICITS 2008: International Conference on Information Theoretic Security
Calgary, Canada, August 10-13, 2008
http://iqis.org/events/icits2008

BACKGROUND

Scientific study of cryptography started with the seminal paper of
Shannon on secrecy systems. Since then, information theoretic
approach has been used to model a range of other security properties
and evaluate performance of systems. This includes key agreement,
multi-party computation, secret sharing and private information
retrieval to name a few. A related area of security is quantum
cryptography that predominantly uses information theory for modeling
and evaluation of security. More recently quantum theoretic
assumptions have been successfully used to enhance classical models.
Information theoretic security provides security without any
computational assumption and will be of increasing importance when
long term security must be guaranteed.

This is the second conference in a series of conferences that is
aimed to bring together the leading researchers in the area of
information and quantum theoretic security. This series of
conferences is a successor to the 2005 IEEE Information Theory
Workshop on Theory and Practice in Information-Theoretic Security
(ITW 2005), Japan, October 16-19, 2005. The first ICITS conference
was held in Madrid, after Eurocrypt 2007.

PROCEEDINGS

Conference proceedings will be published by Springer Verlag in the
Lecture Notes in Computer Science.

TOPICS OF INTEREST

The topics of interest are on work on any aspect of information
theoretical security, this means security based on information
theory. This includes, but is not limited to the following topics:

* Information theoretic analysis of security
* Private and Reliable Networks
* Anonymity
* Public Key Cryptosystems using Codes
* Authentication Codes
* Quantum Cryptography
* Conventional Cryptography using Codes
* Quantum Information Theory
* Fingerprinting
* Randomness extraction
* Ideal Ciphers
* Secret Sharing
* Information Hiding
* Secure Multiparty Computation
* Key Distribution
* Traitor Tracing
* Oblivious Transfer
* Data hiding and Watermarking

NOTES

The focus of the conference is information theoretic security and so
papers on construction of codes and sequences need clear
justification and evaluation of security applications.

VENUE

Calgary is a city of one million inhabitants in the foothills of the
magnificent Canadian Rocky Mountains. In addition to planned
excursions, Calgary is close to Banff National Park and offers many
summertime recreational activities including hiking, whitewater
rafting and kayaking, climbing, caving, mountain-lake scuba diving,
mountain biking, glacier trips, hang gliding, and horseback riding.
August is an excellent month for recreation due to its clement warm
and usually dry weather.

INSTRUCTIONS FOR AUTHORS

The paper must start with a title, an abstract and keywords, but
should be anonymous. It should be followed by a succinct statement
appropriate for a non-specialist reader specifying the subject
addressed, its background, the main achievements, and their
significance to information theoretic security. Technical details
directed to the specialist should then follow. Self citations to
unpublished work should be avoided to maintain the anonymity. A limit
of 12 singlespaced pages of 11pt type (not counting the bibliography
and clearly marked appendices) is placed on all submissions. The
total paper must not exceed 20 pages. Since referees are not required
to read the appendices, the paper should be intelligible without
them. Submissions not meeting these guidelines risk rejection without
consideration of their merits.

SUBMISSION INSTRUCTIONS

Abstracts that have been or will be submitted in parallel to other
conferences and workshops that have proceedings are not eligible for
submission. One of the authors is expected to present the paper. The
submission receipt deadline is March 23, 2008. Instructions on how to
submit electronically will be posted online at
http://iqis.org/events/icits2008.

Venue