ICITS 2011  5th International Conference on Information Theoretic Security

Amsterdam, The Netherlands    
May 21 - 24, 2011




The tentative program is as follows.

Saturday, May 21

Location: Cafe Vertigo (directions)
18:00Welcome reception

Sunday, May 22

Location: CWI (directions)
9:30Opening Remarks
Session 1 (Chair: Rei Safavi-Naini)
9:45 Correlation Extractors and Their Applications (Invited Talk) [pdf]
Yuval Ishai
10:35 Characterization of the Relations Between Information-Theoretic Non-Malleability, Secrecy, and Authenticity
Akinori Kawachi, Christopher Portmann, and Keisuke Tanaka
Session 2 (Chair: Rei Safavi-Naini)
11:30 Randomly Encoding Functions: a New Cryptographic Paradigm (Invited Talk)
Benny Applebaum
12:20Lunch (provided) / Steering Commitee meeting
Session 3 (Chair: Jürg Wullschleger)
14:00 Quantum-Resilient Randomness Extraction (Invited Talk)
Renato Renner
14:50 Homogeneous Faults, Colored Edge Graphs, and Cover Free Families
Yongge Wang and Yvo Desmedt
Session 4 (Chair: Jürg Wullschleger)
15:45 On Information Theoretic Security: Mathematical Models and Techniques (Invited Talk)
Imre Csiszár
16:35 Common Randomness and Secret Key Capacities of Two-way Channels
Hadi Ahmadi and Reihaneh Safavi-Naini
17:00End of technical program
Conference Dinner
Location: Tokyo Cafe (directions)
20:30 Conference Dinner

Monday, May 23

Location: Trippenhuis (directions)
Session 5 (Chair: Christian Schaffner)
9:00 LT-Codes and Phase Transitions for Mutual Information (Invited Talk)
Amin Shokrollahi
9:50 Unconditionally Secure Signature Schemes Revisited
Colleen M. Swanson and Douglas R. Stinson
Session 6 (Chair: Christian Schaffner)
10:45 Bell Inequalities: What do we know about them and why should cryptographers care (Invited Talk)
Ronald de Wolf
11:35 Efficient Reductions for Non-Signaling Cryptographic Primitives
Nico Döttling, Daniel Kraschewski, and Jörn Müller-Quade
12:00Lunch (provided)
Session 7 (Chair: TBA)
14:00 Some Notions of Entropy for Cryptography (Invited Talk)
Leonid Reyzin
14:50 The Round Complexity of General VSS
Ashish Choudhury, Kaoru Kurosawa, and Arpita Patra
15:15 Graceful Degradation in Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, and Dominik Raub
Rump Session (Chair: Niek Bouman)
16:10 Rump Session (here for details)
17:00End of technical program

Tuesday, May 24

Location: Trippenhuis (directions)
Session 9 (Chair: Serge Fehr)
9:00 Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk)
Ivan Damgård
9:50 Using Colors to Improve Visual Cryptography for Black and White Images
Roberto De Prisco and Alfredo De Santis
Session 10 (Chair: Serge Fehr)
10:45 Digital Fingerprinting Under and (Somewhat) Beyond the Marking Assumption (Invited Talk)
Alexander Barg
11:35 Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra and C. Pandu Rangan
12:00 Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
Manan Nayak, Shashank Agrawal, and Kannan Srinathan
12:25End of conference