IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 122, Number 258

Information Security

Workshop Date : 2022-11-18 / Issue Date : 2022-11-11

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2022-30
International Trend of Development on Y-00 Quantum Cryptography -- Cryptologic Perspective --
Shigeo Tsujii (Chuo Univ.), Kentaro Kato (Tamagawa Univ.), Osamu Hirota (Chuo Univ.)
pp. 1 - 8

ISEC2022-31
Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher
Shigeo Tsuii, Osamu Hirota (Chuo Univ.)
pp. 9 - 15

ISEC2022-32
Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT)
pp. 16 - 19

ISEC2022-33
[Invited Talk] Artificiality, Complexity and Feasibility of The Right to Be Forgotten -- Reviewing Meg Leta Jones' Ctrl+Z: The Right to Be Forgotten --
Akiyoshi Kabeya (Toyo Eiwa Univ.)
pp. 20 - 25

ISEC2022-34
[Invited Talk] Quantum Computation and Cryptography
Takashi Yamakawa (NTT)
p. 26

ISEC2022-35
Investigating the Use of Latent Representations in Federated Learning Using Normalizing Flow and Optimal Transport Algorithms
Motonobu Uchikoshi, Takeshi Mori (JRI)
pp. 27 - 31

ISEC2022-36
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.)
pp. 32 - 38

ISEC2022-37
On the difficulty of the 2nd MeDLP
Masaaki Shirase (FUN)
pp. 39 - 46

ISEC2022-38
Development of QR Code with superimposed Kanji font
Naoya Tahara, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.)
pp. 47 - 52

ISEC2022-39
A Study on Document Classification of National Nursing Examination Using BERT
Takao Nishi, Yu Ichifuji (Nagasaki Univ.)
pp. 53 - 58

ISEC2022-40
Secure Computation of Symmetric Functions Using Four Types of Cards
Hayato Shikata, Takaaki Mizuki (Tohoku Univ.)
pp. 59 - 65

ISEC2022-41
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures
Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.)
pp. 66 - 72

ISEC2022-42
Token-Controlled Token Circulation
Ko Fujimura (Otsuma Univ.)
pp. 73 - 78

ISEC2022-43
Efficient workers' behavior segmentation with GP-HSMM
Toshiyuki Hatta, Tsubasa Tomoda, Tetsuya Tamaki, Shotaro Miwa (Mitsubishi Electric Corp.)
pp. 79 - 84

ISEC2022-44
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing
Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.)
pp. 85 - 91

ISEC2022-45
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 92 - 99

ISEC2022-46
Aggregate Entity Authentication with Group Testing
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom)
pp. 100 - 106

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan