Fri, Nov 18 AM ISEC 1 (On-line Breakout Room 1) Chair: Kazuki Yoneyama (Ibaraki Univ.) 09:00 - 09:50 |
(1) |
09:00-09:25 |
Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher |
Shigeo Tsuii, Osamu Hirota (Chuo Univ.) |
(2) |
09:25-09:50 |
International Trend of Development on Y-00 Quantum Cryptography
-- Cryptologic Perspective -- |
Shigeo Tsujii (Chuo Univ.), Kentaro Kato (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) |
|
09:50-10:00 |
Break ( 10 min. ) |
Fri, Nov 18 AM SITE 1 (On-line Breakout Room 2) Chair: Soichiro Morishita (CyberAgent Inc.) 09:00 - 09:50 |
(3) |
09:00-09:25 |
On the CEN Workshop Agreement (CWA) concerning the trust and trustworthiness of Journalism
-- Introduction and analysis of CWA17493 -- |
Takushi Otani (Kibi International Univ.) |
(4) |
09:25-09:50 |
Analysis of EU Cyber Resilience Act
-- from a Perspective of Cyber Supply Chain Security -- |
Yusuke Tachibana (FIT) |
|
09:50-10:00 |
Break ( 10 min. ) |
Fri, Nov 18 AM SITE Special Session (On-line Main Room) Chair: Takushi Otani(Kibi International Univ) 10:00 - 12:05 |
(5) |
10:00-10:05 |
Opening Remark |
(6) |
10:05-10:30 |
[Invited Talk]
About "Ctrl + Z: Right to be forgotten"(1) |
Hideyuki Fujii (NRI Secure) |
(7) |
10:30-10:55 |
[Invited Talk]
About "Ctrl + Z: Right to be forgotten" (2) |
Naonori Kato (KDDI RI/NFI) |
|
10:55-11:05 |
Break ( 10 min. ) |
(8) |
11:05-11:30 |
[Invited Talk]
Artificiality, Complexity and Feasibility of The Right to Be Forgotten
-- Reviewing Meg Leta Jones' Ctrl+Z: The Right to Be Forgotten -- |
Akiyoshi Kabeya (Toyo Eiwa Univ.) |
(9) |
11:30-12:00 |
Panel Discussion |
(10) |
12:00-12:05 |
Closing Remark |
|
12:05-13:00 |
Break ( 55 min. ) |
Fri, Nov 18 PM Invited Talks (On-line Main Room) Chair: Noboru Kunihiro (Univ. of Tsukuba) / Hiroyuki Toda(Yokohama City Univ) 13:00 - 14:20 |
(11) |
13:00-13:50 |
[Invited Talk]
Quantum Computation and Cryptography |
Takashi Yamakawa (NTT) |
(12) |
13:50-14:20 |
[Invited Talk]
Two-Layered QR Codes and Their Principles
-- Development of Hologram QR Codes -- |
Masakatsu Morii (Kobe University) |
|
14:20-14:30 |
Break ( 10 min. ) |
Fri, Nov 18 PM ISEC 2 (On-line Breakout Room 1) Chair: Toru Nakanishi (Hiroshima Univ.) 14:30 - 15:45 |
(13) |
14:30-14:55 |
Investigating the Use of Latent Representations in Federated Learning Using Normalizing Flow and Optimal Transport Algorithms |
Motonobu Uchikoshi, Takeshi Mori (JRI) |
(14) |
14:55-15:20 |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function |
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) |
(15) |
15:20-15:45 |
On the difficulty of the 2nd MeDLP |
Masaaki Shirase (FUN) |
|
15:45-15:55 |
Break ( 10 min. ) |
Fri, Nov 18 PM LOIS 1 (On-line Breakout Room 2) Chair: Kazuki Fukae(Nagasaki Univ) 14:30 - 15:20 |
(16) |
14:30-14:55 |
Development of QR Code with superimposed Kanji font |
Naoya Tahara, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) |
(17) |
14:55-15:20 |
A Study on Document Classification of National Nursing Examination Using BERT |
Takao Nishi, Yu Ichifuji (Nagasaki Univ.) |
|
15:20-15:55 |
Break ( 35 min. ) |
Fri, Nov 18 PM ISEC 3 (On-line Breakout Room 1) Chair: Keita Emura (NICT) 15:55 - 16:45 |
(18) |
15:55-16:20 |
Secure Computation of Symmetric Functions Using Four Types of Cards |
Hayato Shikata, Takaaki Mizuki (Tohoku Univ.) |
(19) |
16:20-16:45 |
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures |
Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) |
|
16:45-16:55 |
Break ( 10 min. ) |
Fri, Nov 18 PM LOIS 2 (On-line Breakout Room 2) Chair: Manabu Motegi(Takushoku Univ) 15:55 - 16:45 |
(20) |
15:55-16:20 |
Token-Controlled Token Circulation |
Ko Fujimura (Otsuma Univ.) |
(21) |
16:20-16:45 |
Efficient workers' behavior segmentation with GP-HSMM |
Toshiyuki Hatta, Tsubasa Tomoda, Tetsuya Tamaki, Shotaro Miwa (Mitsubishi Electric Corp.) |
|
16:45-16:55 |
Break ( 10 min. ) |
Fri, Nov 18 PM ISEC 4 (On-line Breakout Room 1) Chair: Atsushi Takayasu (Univ. of Tokyo) 16:55 - 18:10 |
(22) |
16:55-17:20 |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing |
Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) |
(23) |
17:20-17:45 |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme |
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) |
(24) |
17:45-18:10 |
Aggregate Entity Authentication with Group Testing |
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) |