International Conference on Information Theoretic Security - ICITS 2008
Calgary, Canada, 10-13 August 2008

Call for Papers (download in PDF)

Scientific study of cryptography started with the seminal paper of Shannon on secrecy systems. Since then, information theoretic approach has been used to model a range of other security properties and evaluate performance of systems. This includes key agreement, multi-party computation, secret sharing and private information retrieval to name a few. A related area of security is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. More recently quantum theoretic assumptions have been successfully used to enhance classical models. Information theoretic security provides security without any computational assumption and will be of increasing importance when long term security must be guaranteed. This is the second conference in a series of conferences that is aimed to bring together the leading researchers in the area of information and quantum theoretic security.

Proceedings: Conference proceedings will be published by Springer Verlag in the Lecture Notes in Computer Science, volume number 5155.

Topics of interest: The topics of interest are on work on any aspect of information theoretical security, this means security based on information theory. This includes, but is not limited to the following topics:
  • Information theoretic analysis of security
  • Private and Reliable Networks
  • Anonymity
  • Public Key Cryptosystems using Codes
  • Authentication Codes
  • Quantum Cryptography
  • Conventional Cryptography using Codes
  • Quantum Information Theory
  • Fingerprinting
  • Randomness extraction
  • Ideal Ciphers
  • Secret Sharing
  • Information Hiding
  • Secure Multiparty Computation
  • Key Distribution
  • Traitor Tracing
  • Oblivious Transfer
  • Data hiding and Watermarking
Note: The focus of the conference is information theoretic security and so papers on construction of codes and sequences need clear justification and evaluation of security applications.

Venue: All sessions will take place in room 121 of the ICT building (map of the conference site) at the University of Calgary. Calgary is a city of one million inhabitants in the foothills of the magnificent Canadian Rocky Mountains. In addition to planned excursions, Calgary is close to Banff National Park and offers many summertime recreational activities including hiking, whitewater rafting and kayaking, climbing, caving, mountain-lake scuba diving, mountain biking, glacier trips, hang gliding, and horseback riding. August is an excellent month for recreation due to its clement warm and usually dry weather.

Instructions for Authors: The paper must start with a title, an abstract and keywords, but should be anonymous. It should be followed by a succinct statement appropriate for a non-specialist reader specifying the subject addressed, its background, the main achievements, and their significance to information theoretic security. Technical details directed to the specialist should then follow. Self citations to unpublished work should be avoided to maintain the anonymity. A limit of 12singlespaced pages of 11pt type (not counting the bibliography and clearly marked appendices) is placed on all submissions. The total paper must not exceed 20 pages. Since referees are not required to read the appendices, the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Submission instructions: Abstracts that have been or will be submitted in parallel to other conferences and workshops that have proceedings are not eligible for submission. One of the authors is expected to present the paper. The submission receipt deadline is March 23, 2008 March 28, 2008. Please follow the 'Submission' link on the left to submit, revise, or withdraw your submission.