International Conference on Information Theoretic Security (ICITS'07)

C

Cristina

*** Apologies for multiple copies ***

C A L L F O R P A P E R S

International Conference on Information Theoretic Security (ICITS)

Madrid, Spain, May 25-29, 2007

http://www.escet.urjc.es/~matemati/maribel/ICITS/ITS07.htm

**Note: Eurocrypt is May 20-24, 2007 in Barcelona, Spain.


BACKGROUND:

For the last years we have plenty of conferences and workshops on
specialized
topics in cryptography. Examples are CHES, FSE, PKC and TCC. The
modern
unclassified research on cryptography started with Shannon's work on
cryptography using information theory. Since then we have seen several
research topics studied requiring information theoretical security,
also
called unconditional security. Examples are anonymity, authenticity,
reliable
and private networks, secure multi-party computation, traitor tracing,
etc. Moreover, we have also seen that coding as well as other aspects
of
information theory have been used in the design of cryptographic
schemes.
Seeing the multitude of topics in cryptography requiring information
theoretical security or using information theory, it is time to have a
regular
conference on this topic. This was first realized by Prof. Imai
(University of
Tokyo, Japan). He organized the 2005 IEEE Information Theory Workshop
on
Theory and Practice in Information-Theoretic Security (ITW 2005,
Japan)
October 16-19, 2005. The goal is to continue this event on a regular
basis.

PROCEEDINGS:

Post-conference proceedings will be published by Springer Verlag in
the
Lecture Notes in Computer Science. Informal pre-proceedings will be
available
at the conference.

TOPICS OF INTEREST:

The topics of interest are on work on any aspect of information
theoretical
security, this means security based on information theory. This
includes, but
is not limited to the following topics:

o Analysis of Security o Private and Reliable Networks
o Anonymity o Public Key Cryptosystems using Codes
o Authentication Codes o Quantum Cryptography
o Conventional Cryptography using Codes o Quantum Information Theory
o Fingerprinting o Randomness
o Ideal Ciphers o Secret Sharing
o Information Hiding o Secure Multiparty Computation
o Key Distribution o Traitor Tracing
o Oblivious Transfer

NOTES:

Papers on coding theory without any relationship with cryptography
will be
rejected. It is not the goal of this conference to become a second one
on
"Coding and Cryptography." Papers using computational complexity
assumptions,
except when using: information theoretic results or quantum arguments,
will
not be accepted.

VENUE:

Madrid is a city with a long history and very good airport
connections. Its
climate end of May is pleasantly warm. Madrid has good connections to
the rest
of the world and the rest of Spain, in particular Barcelona. More
information
on how to reach the venue by airplane or train will be provided later.
Madrid
is very close to Toledo, a small historical city worth visiting.

INSTRUCTIONS FOR AUTHORS:

The paper must start with a title, an abstract and keywords, but
should be
anonymous. It should be followed by a succinct statement appropriate
for a
non-specialist reader specifying the subject addressed, its
background, the
main achievements, and their significance to information theoretic
security.
Technical details directed to the specialist should then follow. Self
citations to unpublished work should be avoided to maintain the
anonymity. A
limit of 12 singlespaced pages of 11pt type (not counting the
bibliography and
clearly marked appendices) is placed on all submissions. The total
paper must
not exceed 20 pages. Since referees are not required to read the
appendices,
the paper should be intelligible without them. Submissions not meeting
these
guidelines risk rejection without consideration of their merits.

SUBMISSION INSTRUCTIONS:

Abstracts that have been or will be submitted in parallel to other
conferences
or workshops that have proceedings are not eligible for submission.
One of
the authors is expected to present the paper. The submission receipt
deadline
is February 23, 2007. Instructions on how to submit electronically
will be
posted soon on the event webpage and http://www.cs.ucl.ac.uk/staff/
Y.Desmedt/ICITS


IMPORTANT DATES:
Submission Deadline: February 23, 2007
Authors Informed: April 9, 2007
Preproceedings versions due: April 27, 2007

PROGRAM COMMITTEE:

Carlo Blundo (University of Salerno, Italy)
Gilles Brassard (University of Montreal, Canada)
Ronald Cramer (CWI, The Netherlands)
Yvo Desmedt, Chair (University College London, UK)
Matthias Fitzi (Aarhus University, Denmark)
Hideki Imai (National Institute of Advanced
Industrial Science and Technology,
Japan)
Kaoru Kurosawa (Ibaraki University, Japan)
Keith Martin (Royal Holloway, UK)
Rei Safavi-Naini (University of Wollongong,
Australia)
Doug Stinson (University of Waterloo, Canada)
Stefan Wolf (ETH, Switzerland)
Moti Yung (RSA & Columbia University, USA)
Yuliang Zheng (University of North Carolina, USA)


GENERAL AND LOCAL CHAIRS:

General Chair: Javier Lopez
Local Co-Chairs: Julio Cesar Hernandez, and Maria Isabel Gonzalez
Vasco


STEERING COMMITTEE:

Carlo Blundo (University of Salerno, Italy)
Gilles Brassard (University of Montreal, Canada)
Ronald Cramer (CWI, The Netherlands)
Yvo Desmedt, Chair (University College London, UK)
Hideki Imai (National Institute of Advanced
Industrial Science and Technology,
Japan)
Kaoru Kurosawa (Ibaraki University, Japan)
Ueli Maurer (ETH, Switzerland)
Rei Safavi-Naini (University of Wollongong,
Australia)
Doug Stinson (University of Waterloo, Canada)
Moti Yung (RSA & Columbia University, USA)
Yuliang Zheng (University of North Carolina, USA)
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top