Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2009-11-12 13:30 |
Gifu |
Gifu Univ. |
Constructing New Differential Path and Algebraic Cryptanalysis for Full-SHA-1 Makoto Sugita (NTT/AIST), Mitsuru Kawazoe (Osaka Prefecture Univ.), Hideki Imai (AIST/ Chuo Univ.) ISEC2009-51 LOIS2009-40 |
Since the cryptanalysis for SHA-1 was proposed [19], many improvements have been proposed. Recently a new result was pro... [more] |
ISEC2009-51 LOIS2009-40 pp.1-8 |
ISEC, LOIS |
2009-11-12 13:55 |
Gifu |
Gifu Univ. |
A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme Masaki Inamura, Ryu Watanabe, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-52 LOIS2009-41 |
We first propose a hierarchical structured multisignature scheme based on the Gap Diffie-Hellman(GDH) problem. We have e... [more] |
ISEC2009-52 LOIS2009-41 pp.9-14 |
ISEC, LOIS |
2009-11-12 14:20 |
Gifu |
Gifu Univ. |
A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2009-53 LOIS2009-42 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user,and efficient pairing-based sch... [more] |
ISEC2009-53 LOIS2009-42 pp.15-22 |
ISEC, LOIS |
2009-11-12 14:45 |
Gifu |
Gifu Univ. |
A Construction of A New Class of Non-Linear Product-Sum-Type Public-Key Cryptosystem Masao Kasahara (Osaka Gakuin Univ.) ISEC2009-54 LOIS2009-43 |
In this paper we propose a new class of PKC, referred to as K(V)PKC. In K(V)PKC, the ciphertext in a polynomial form is ... [more] |
ISEC2009-54 LOIS2009-43 pp.23-27 |
ISEC, LOIS |
2009-11-12 15:25 |
Gifu |
Gifu Univ. |
A Looking Back Service for Power Consumption Logs in Home Network System Masayuki Fukuda, Hideharu Seto, Hiroyuki Sakamoto, Hiroshi Igaki, Masahide Nakamura (Kobe Univ.) ISEC2009-55 LOIS2009-44 |
Recently, resource monitoring systems to visualize energy consumptions such as electricity and gas for home users, are d... [more] |
ISEC2009-55 LOIS2009-44 pp.29-34 |
ISEC, LOIS |
2009-11-12 15:55 |
Gifu |
Gifu Univ. |
Considering Common Data Model to Mash-up Life Logs Masahide Nakamura, Akira Shimojo, Hiroshi Igaki (Kobe Univ.) ISEC2009-56 LOIS2009-45 |
In order to support the data mash-up of different kinds of
life logs, this paper discusses a common data model and gen... [more] |
ISEC2009-56 LOIS2009-45 pp.35-40 |
ISEC, LOIS |
2009-11-12 16:25 |
Gifu |
Gifu Univ. |
Possibility of the Life Log Service in the House Kazuko Katase (The Inst. for Future Tech.) ISEC2009-57 LOIS2009-46 |
The history of user's real daily life is included as for the life log, and providing with service to contribute to the i... [more] |
ISEC2009-57 LOIS2009-46 pp.41-46 |
ISEC, LOIS |
2009-11-12 16:55 |
Gifu |
Gifu Univ. |
Consciousness Survey of Personal Health Information Management based on the e-P.O.Box Naoko Taira, Joong Sun Lee, Hiroyuki Suzuki, Kouichi Kita, Takashi Obi, Masuyoshi Yachida, Yuuji Homma, Hiroshige Yamamoto, Kazuhisa Uryu, Masahiro Yamaguchi, Nagaaki Ohyama (Tokyo Inst. of Tech) ISEC2009-58 LOIS2009-47 |
The Priority Policy Program 2008 of Japanese government specifies measures of informatization in the medical field, whic... [more] |
ISEC2009-58 LOIS2009-47 pp.47-53 |
ISEC, LOIS |
2009-11-13 09:00 |
Gifu |
Gifu Univ. |
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48 |
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] |
ISEC2009-59 LOIS2009-48 pp.55-60 |
ISEC, LOIS |
2009-11-13 09:25 |
Gifu |
Gifu Univ. |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49 |
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more] |
ISEC2009-60 LOIS2009-49 pp.61-68 |
ISEC, LOIS |
2009-11-13 09:50 |
Gifu |
Gifu Univ. |
Anonymous Query Language Retrieval Hiroshi Yamaguchi, Shigeo Tsujii (Chuo Univ) ISEC2009-61 LOIS2009-50 |
[more] |
ISEC2009-61 LOIS2009-50 pp.69-74 |
ISEC, LOIS |
2009-11-13 10:30 |
Gifu |
Gifu Univ. |
Javas Crypto Satoshi Oda, Gembu Morohashi (NTT Corp.) ISEC2009-62 LOIS2009-51 |
The information security in Web 1.0, represented by SSL/PKI,
is the security for communication channels. As computing
... [more] |
ISEC2009-62 LOIS2009-51 pp.75-80 |
ISEC, LOIS |
2009-11-13 11:00 |
Gifu |
Gifu Univ. |
Modeling and Verification of Serendipitous Recommender System Takayuki Akiyama, Kiyohiro Obara, Masaaki Tanizaki (Hitachi, Ltd.,) ISEC2009-63 LOIS2009-52 |
The recommender systems have the problem that more and more accurate it recommends and the recommended items does not ha... [more] |
ISEC2009-63 LOIS2009-52 pp.81-87 |
ISEC, LOIS |
2009-11-13 11:30 |
Gifu |
Gifu Univ. |
Identifying Purchase Behavior on Web Access Log Hisaharu Ishii, Yusuke Ichikawa, Hiroyuki Sato, Toru Kobayashi (NTT Corp.) ISEC2009-64 LOIS2009-53 |
There are many studies of recommender systems, which provide users with suited items to their preferences. Besides it is... [more] |
ISEC2009-64 LOIS2009-53 pp.89-94 |
ISEC, LOIS |
2009-11-13 13:00 |
Gifu |
Gifu Univ. |
State Recovery of RC4 PRGA by Using Nonzero Bit Differences Mitsuki Ajiro, Atsuko Miyaji (JAIST) ISEC2009-65 LOIS2009-54 |
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$, ... [more] |
ISEC2009-65 LOIS2009-54 pp.95-100 |
ISEC, LOIS |
2009-11-13 13:25 |
Gifu |
Gifu Univ. |
Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST) ISEC2009-66 LOIS2009-55 |
Wireless sensor network (WSN) is a network composed of a lot of
wireless sensors with a little calculation resource. Th... [more] |
ISEC2009-66 LOIS2009-55 pp.101-106 |
ISEC, LOIS |
2009-11-13 13:50 |
Gifu |
Gifu Univ. |
Speeding Up of a Message Falsification Attack on WPA-TKIP Toshihiro Ohigashi (Hiroshima Univ.), Yuki Ozawa, Masakatu Morii (Kobe Univ.) ISEC2009-67 LOIS2009-56 |
[more] |
ISEC2009-67 LOIS2009-56 pp.107-112 |
ISEC, LOIS |
2009-11-13 14:15 |
Gifu |
Gifu Univ. |
Secure Biometric Authentication Using 2-DNF Homomorphic Encryption Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric) ISEC2009-68 LOIS2009-57 |
In this paper, a secure biometric authentication protocol is proposed which can authenticate users using encrypted biome... [more] |
ISEC2009-68 LOIS2009-57 pp.113-120 |
ISEC, LOIS |
2009-11-13 14:55 |
Gifu |
Gifu Univ. |
A Study of the user modeling method for personal life assistance service Koji Ito, Kyoji Iiduka, Takahiko Murayama, Toru Kobayashi (NTT) ISEC2009-69 LOIS2009-58 |
We proposed user modeling method for personal life assistance service by estimating user preference from age, sex, logs... [more] |
ISEC2009-69 LOIS2009-58 pp.121-128 |
ISEC, LOIS |
2009-11-13 15:25 |
Gifu |
Gifu Univ. |
Development of User Recognition System using Lifelogs Hirohisa Tezuka, Yukihiro Nakamura, Manabu Motegi, Shin-ichiro Eitoku, Shunichi Seko, Masaaki Nishino, Shin-yo Muto, Masanobu Abe (NTT Corp.) ISEC2009-70 LOIS2009-59 |
In this paper, we propose a system architecture with disclosure control for aggregating multi-user life logs. The miniat... [more] |
ISEC2009-70 LOIS2009-59 pp.129-133 |