|
Chair |
|
Masahiro Mambo (Kanazawa Univ.) |
Vice Chair |
|
Kazuto Ogawa (NHK), Atsushi Fujioka (Kanagawa Univ.) |
Secretary |
|
Yuichi Komano (Toshiba), Takaaki Mizuki (Tohoku Univ.) |
Assistant |
|
Toshihiro Ohigashi (Tokai Univ.), Yuuji Suga (IIJ), Atsuo Inomata (Tokyo Denki Univ.) |
|
Conference Date |
Fri, Sep 2, 2016 09:45 - 17:00 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, Sep 2 AM 09:45 - 10:35 |
(1) |
09:45-10:10 |
A Note on Secure Execution of Random Bisection Cut ISEC2016-38 |
Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) |
(2) |
10:10-10:35 |
Bundling Proofs of Knowledge and its Application to Signatures ISEC2016-39 |
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Sep 2 AM 10:45 - 11:45 |
(3) |
10:45-11:15 |
[Invited Talk]
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance (from EUROCRYPT 2016) ISEC2016-40 |
Susumu Kiyoshima (NTT) |
(4) |
11:15-11:45 |
[Invited Talk]
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key (from Eurocrypt 2016) ISEC2016-41 |
Ryo Nishimaki (NTT), Daniel Wichs (NEU), Mark Zhandry (Princeton) |
|
11:45-13:00 |
Lunch Break ( 75 min. ) |
Fri, Sep 2 PM 13:00 - 14:15 |
(5) |
13:00-13:25 |
A New Class of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XVII)SE(1)PKC, along with Revisit to K(AII)Scheme and Proposals of K(AII・V)?ΠPKC ISEC2016-42 |
Masao Kasahara (21CICRC) |
(6) |
13:25-13:50 |
An Homomorphic Encryption based on some kind of Indeterminate Equations ISEC2016-43 |
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) |
(7) |
13:50-14:15 |
ISEC2016-44 |
|
|
14:15-14:25 |
Break ( 10 min. ) |
Fri, Sep 2 PM 14:25 - 15:15 |
(8) |
14:25-14:50 |
Tamper Resistant Software utilizing Data Memory ISEC2016-45 |
Kazuomi Oishi (SIST) |
(9) |
14:50-15:15 |
Implementation of security evaluation function on a Development Environment of Cryptography using GUI ISEC2016-46 |
Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) |
|
15:15-15:30 |
Break ( 15 min. ) |
Fri, Sep 2 PM 15:30 - 17:00 |
(10) |
15:30-16:00 |
[Invited Talk]
Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016) ISEC2016-47 |
Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.) |
(11) |
16:00-16:30 |
[Invited Talk]
Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters ISEC2016-48 |
Shota Yamada (AIST) |
(12) |
16:30-17:00 |
[Invited Talk]
On the Influence of Message Length in PMAC's Security Bounds (from Eurocrypt 2016) ISEC2016-49 |
Kan Yasuda (NTT) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
Last modified: 2016-09-15 07:45:04
|