Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:20 |
Hokkaido |
Sapporo Convention Center |
Construction of Revocable HIBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 |
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] |
ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 pp.9-16 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:45 |
Hokkaido |
Sapporo Convention Center |
Code-Based Signature Scheme without Trapdoors Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 |
[more] |
ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 pp.17-22 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 11:10 |
Hokkaido |
Sapporo Convention Center |
On the integration of SCF-PEKS and PKE Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.) ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15 |
[more] |
ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15 pp.23-30 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:10 |
Hokkaido |
Sapporo Convention Center |
A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 |
Various sensors are increasing with spread of applications such as automatic operation. Ultrasonic rangefinders have bec... [more] |
ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 pp.55-59 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:35 |
Hokkaido |
Sapporo Convention Center |
A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 |
The ToF depth-image camera is a device capable of simultaneously measuring distances within a certain range and it is be... [more] |
ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 pp.61-68 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:00 |
Hokkaido |
Sapporo Convention Center |
How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU) ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18 |
Stereo vision cameras that instrument distances by the principle of triangulation are used in various fields. Instrument... [more] |
ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18 pp.69-75 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:25 |
Hokkaido |
Sapporo Convention Center |
Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven) ISEC2018-20 SITE2018-12 HWS2018-17 ICSS2018-23 EMM2018-19 |
Fault injection attacks using intentional electromagnetic interference against cryptographic devices have been reported.... [more] |
ISEC2018-20 SITE2018-12 HWS2018-17 ICSS2018-23 EMM2018-19 pp.77-81 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:50 |
Hokkaido |
Sapporo Convention Center |
Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST) ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20 |
A threat of leakage of sound information via electromagnetic field from a smart device having an audio output function h... [more] |
ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20 pp.83-88 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:10 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018) Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21 |
We introduce the paper ``Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model'' by Tsunekazu Sa... [more] |
ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21 p.89 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:40 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018) Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 |
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] |
ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 p.91 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:10 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018) Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23 |
In this invited talk, we introduce the paper, “ Memory Lower Bounds of Reductions Revisited ” by Y. Wang, T. Matsuda, G.... [more] |
ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23 p.93 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:25 |
Hokkaido |
Sapporo Convention Center |
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 |
The aim of this study is to clarify the educational effect of a penetration testing exercise aimed at raising cybersecur... [more] |
ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 pp.131-136 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 |
Recently, Wi-Fi access points have been installed in public places, with increasing demand for Internet access by mobile... [more] |
ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 pp.137-142 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 16:15 |
Hokkaido |
Sapporo Convention Center |
A design of interest-rate recordable cryptocurrency management program Yusuke Kaneko (SMBC/JRI), Shigeyuki Osada (JRI), Shigeyuki Azuchi (HAW), Hitoshi Okada (NII), Shigeichiro Yamasaki (KINDAI Univ.) ISEC2018-27 SITE2018-19 HWS2018-24 ICSS2018-30 EMM2018-26 |
Cryptocurrencies based on blockchain technology keep the deposit’s total amount to meet withdraws’ one for preventing do... [more] |
ISEC2018-27 SITE2018-19 HWS2018-24 ICSS2018-30 EMM2018-26 pp.143-148 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:25 |
Hokkaido |
Sapporo Convention Center |
Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27 |
In this talk, we report that the singular curve point decompression attack of Blömer and Günther, which was originally p... [more] |
ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27 pp.149-153 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
Extended Partial Key Exposure Attacks on RSA Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 |
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] |
ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 pp.155-162 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 16:15 |
Hokkaido |
Sapporo Convention Center |
Secure Multiparty Computation of Ranking Using a Deck of Cards Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 |
(To be available after the conference date) [more] |
ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 pp.163-169 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 16:40 |
Hokkaido |
Sapporo Convention Center |
Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST) ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30 |
[more] |
ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30 pp.171-176 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 09:30 |
Hokkaido |
Sapporo Convention Center |
Some tips for information hiding from the viewpoint of magic trick Naofumi Aoki (Hokkaido Univ.) ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31 |
Besides some industrial applications such as steganography and digital watermarking, the concept of information hiding i... [more] |
ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31 pp.225-227 |