information-theoretic security, from relevant mathematical tools to theoretical modeling to implementation. Papers on all technical aspects of these topics are solicited for submission
8th International Conference on Information-theoretic Security (ICITS)
May 2-5, 2015, USI Lugano, Switzerland
Important Dates:
- Conference Track Submission Deadline: November 21, 2014
- Workshop Track Submission Deadline: December 5, 2014
- Notification of Decision: January 30, 2015
- Conference: May 2-5, 2015
This is the eighth in a series of conferences that aims to bring together the leading researchers in the
areas of information theory, quantum information theory, and cryptography. ICITS covers all aspects of
information-theoretic security, from relevant mathematical tools to theoretical modeling to implementation.
Papers on all technical aspects of these topics are solicited for submission. Areas of interest include,
but are not restricted to:
- Physical layer security
- Multiparty computation
- Codes, lattices, & cryptography
- Authentication codes
- Randomness extraction
- Cryptography from noisy channels
- Wiretap channels
- Bounded-storage models
- Information-theoretic reductions
- Quantum cryptography
- Quantum information theory
- Nonlocality and non signaling
- Key and message rates
- Secret sharing
- Physical models & assumptions
- Network coding security
- Adversarial channel models
- Information-theoretic tools in computational settings
- Implementation challenges
- Biometric security
Two Tracks: Conference and Workshop:
As the goal of ICITS is to bring together researchers on all aspects of information-theoretic security,
it consists of two tracks with different types of contributed presentations:
- Conference Track (with proceedings): Submissions to this track must be original papers that have not previously appeared in published form. Accepted papers will be presented at the conference and will appear in the conference proceedings, which will be published by Springer in the LNCS series.
- Workshop Track (no proceedings): To encourage presentation of work from a variety of fields (especially those where conference publication is unusual or makes journal publication difficult), the committee also solicits "workshop track" papers. Accepted papers will be presented orally at the conference but will not appear in the proceedings. Submissions to this track that have previously appeared (or are currently submitted elsewhere) are acceptable, as long as they first appeared after January 1, 2014. Papers that describe work in progress are also welcome. We note that the same standards of quality will apply to conference and workshop papers.
Instruction for Authors:
- Conference Track: Submissions must not substantially duplicate work published elsewhere or submitted in parallel to a journal or any other conference/workshop that has proceedings. The submission must be anonymous, with no author names, affiliations, or obvious references. The length of the submission must be at most 12 pages excluding bibliography and appendices. The text must be in a single column format, use at least 11- point fonts, and have reasonable margins. The submission should begin with a title and a short abstract. The introduction should summarize the contributions of the paper at a level appropriate for a non-