Scientific study of cryptography started with the seminal paper of Shannon
on secrecy systems. Since then, information theoretic approach has been used
to model a range of other security properties and evaluate performance of
systems. This includes key agreement, multi-party computation, secret
sharing and private information retrieval to name a few. A related area of
security is quantum cryptography that predominantly uses information theory
for modeling and evaluation of security. More recently quantum theoretic
assumptions have been successfully used to enhance classical models.
Information theoretic security provides security without any computational
assumption and will be of increasing importance when long term security must
be guaranteed. This is the second conference in a series of conferences that
is aimed to bring together the leading researchers in the area of
information and quantum theoretic security.
Proceedings: Conference proceedings will be published by Springer
Verlag in the
Lecture Notes in Computer Science, volume number 5155.
Topics of interest: The topics of interest are on work on any aspect
of information theoretical security, this means security based on
information theory. This includes, but is not limited to the following
topics:
- Information theoretic analysis of security
- Private and Reliable Networks
- Anonymity
- Public Key Cryptosystems using Codes
- Authentication Codes
- Quantum Cryptography
- Conventional Cryptography using Codes
- Quantum Information Theory
- Fingerprinting
- Randomness extraction
- Ideal Ciphers
- Secret Sharing
- Information Hiding
- Secure Multiparty Computation
- Key Distribution
- Traitor Tracing
- Oblivious Transfer
- Data hiding and Watermarking
Note: The focus of the conference is information theoretic security
and so papers on construction of codes and sequences need clear
justification and evaluation of security applications.
Venue:
All sessions will
take place in room 121 of the ICT building
(
map of the conference site)
at the
University of Calgary.
Calgary is a city of one million inhabitants in the foothills
of the magnificent Canadian Rocky Mountains. In addition to planned
excursions, Calgary is close to Banff National Park and offers many
summertime recreational activities including hiking, whitewater rafting and
kayaking, climbing, caving, mountain-lake scuba diving, mountain biking,
glacier trips, hang gliding, and horseback riding. August is an excellent
month for recreation due to its clement warm and usually dry weather.
Instructions for Authors: The paper must start with a title, an
abstract and keywords, but should be anonymous. It should be followed by a
succinct statement appropriate for a non-specialist reader specifying the
subject addressed, its background, the main achievements, and their
significance to information theoretic security. Technical details directed
to the specialist should then follow. Self citations to unpublished work
should be avoided to maintain the anonymity. A limit of 12singlespaced pages
of 11pt type (not counting the bibliography and clearly marked appendices)
is placed on all submissions. The total paper must not exceed 20 pages.
Since referees are not required to read the appendices, the paper should be
intelligible without them. Submissions not meeting these guidelines risk
rejection without consideration of their merits.
Submission instructions: Abstracts that have been or will be
submitted in parallel to other conferences and workshops that have
proceedings are not eligible for submission. One of the authors is expected
to present the paper. The submission receipt deadline is
March 23,
2008 March 28, 2008. Please follow the 'Submission' link on the left to submit,
revise, or withdraw your submission.