|
Chair |
|
Masahiro Mambo (Kanazawa Univ.) |
Vice Chair |
|
Kazuto Ogawa (NHK), Atsushi Fujioka (Kanagawa Univ.) |
Secretary |
|
Yuichi Komano (Toshiba), Takaaki Mizuki (Tohoku Univ.) |
Assistant |
|
Toshihiro Ohigashi (Tokai Univ.), Yuuji Suga (IIJ), Atsuo Inomata (Tokyo Denki Univ.) |
|
Conference Date |
Fri, May 12, 2017 10:00 - 17:30 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, May 12 10:00 - 11:15 |
(1) |
10:00-10:25 |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- ISEC2017-1 |
Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) |
(2) |
10:25-10:50 |
Fully Secure Oblivious Keyword Search ISEC2017-2 |
Kaoru Kurosawa, Yuuki Nemoto (Ibaraki Univ.) |
(3) |
10:50-11:15 |
A Note on the Numbers of Cards Required to Make Copied Commitments ISEC2017-3 |
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) |
|
11:15-11:30 |
Break ( 15 min. ) |
Fri, May 12 11:30 - 12:30 |
(4) |
11:30-12:00 |
[Invited Talk]
Size-Hiding Computation for Multiple Parties
-- from ASIACRYPT 2016 -- ISEC2017-4 |
Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Koji Nuida (AIST/PRESTO), Takashi Nishide (Univ. of Tsukuba), Goichiro Hanaoka (AIST), Eiji Okamoto (Univ. of Tsukuba) |
(5) |
12:00-12:30 |
[Invited Talk]
How to circumvent the two-ciphertext lower bound for linear gabling schemes
-- from ASIACRYPT 2016 -- ISEC2017-5 |
Ryo Kikuchi (NTT) |
|
12:30-14:00 |
Lunch Break ( 90 min. ) |
Fri, May 12 14:00 - 15:40 |
(6) |
14:00-14:25 |
Experiences of Data Preprocessing Approach for Network Security Event Analytics ISEC2017-6 |
Masayoshi Mizutani (IBM, Japan) |
(7) |
14:25-14:50 |
Edge-side Threat Detection and Reaction Framework for Multiple IoT Use Models ISEC2017-7 |
Takuya Mishina, Naoto Sato, Fumiko Satoh (IBM) |
(8) |
14:50-15:15 |
SandVeil: A Tool for Improving Sandbox Resilience to Evasion ISEC2017-8 |
Rui Tanabe, Atsushi Yahata, Kou Ishii, Akira Yokoyama, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(9) |
15:15-15:40 |
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability ISEC2017-9 |
Keita Emura (NICT) |
|
15:40-16:00 |
Break ( 20 min. ) |
Fri, May 12 16:00 - 17:30 |
(10) |
16:00-16:30 |
[Invited Talk]
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
-- from ASIACRYPT 2016 -- ISEC2017-10 |
Keita Xagawa (NTT) |
(11) |
16:30-17:00 |
[Invited Talk]
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ISEC2017-11 |
Shuichi Katsumata (Univ. of Tokyo), Shota Yamada (AIST) |
(12) |
17:00-17:30 |
[Invited Talk]
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones ISEC2017-12 |
Yuyu Wang (Tokyo Tech/AIST), Zongyang Zhang (Beihang University), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
Last modified: 2017-05-08 13:42:09
|