Fri, Sep 2 AM 09:45 - 10:35 |
(1) |
09:45-10:10 |
A Note on Secure Execution of Random Bisection Cut |
Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) |
(2) |
10:10-10:35 |
Bundling Proofs of Knowledge and its Application to Signatures |
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Sep 2 AM 10:45 - 11:45 |
(3) |
10:45-11:15 |
[Invited Talk]
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance (from EUROCRYPT 2016) |
Susumu Kiyoshima (NTT) |
(4) |
11:15-11:45 |
[Invited Talk]
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key (from Eurocrypt 2016) |
Ryo Nishimaki (NTT), Daniel Wichs (NEU), Mark Zhandry (Princeton) |
|
11:45-13:00 |
Lunch Break ( 75 min. ) |
Fri, Sep 2 PM 13:00 - 14:15 |
(5) |
13:00-13:25 |
A New Class of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XVII)SE(1)PKC, along with Revisit to K(AII)Scheme and Proposals of K(AII・V)?ΠPKC |
Masao Kasahara (21CICRC) |
(6) |
13:25-13:50 |
An Homomorphic Encryption based on some kind of Indeterminate Equations |
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) |
(7) |
13:50-14:15 |
|
|
|
14:15-14:25 |
Break ( 10 min. ) |
Fri, Sep 2 PM 14:25 - 15:15 |
(8) |
14:25-14:50 |
Tamper Resistant Software utilizing Data Memory |
Kazuomi Oishi (SIST) |
(9) |
14:50-15:15 |
Implementation of security evaluation function on a Development Environment of Cryptography using GUI |
Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) |
|
15:15-15:30 |
Break ( 15 min. ) |
Fri, Sep 2 PM 15:30 - 17:00 |
(10) |
15:30-16:00 |
[Invited Talk]
Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016) |
Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.) |
(11) |
16:00-16:30 |
[Invited Talk]
Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters |
Shota Yamada (AIST) |
(12) |
16:30-17:00 |
[Invited Talk]
On the Influence of Message Length in PMAC's Security Bounds (from Eurocrypt 2016) |
Kan Yasuda (NTT) |