Fri, Nov 6 AM 09:15 - 10:15 |
(1) |
09:15-10:15 |
|
|
10:15-10:30 |
Break ( 15 min. ) |
Fri, Nov 6 AM 10:30 - 12:10 |
(1) |
10:30-10:55 |
Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation |
Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) |
(2) |
10:55-11:20 |
Information theoretical evaluation for visual secret sharing |
Le Thanh Thai Binh, Hidema Tanaka (NDA) |
(3) |
11:20-11:45 |
Speeding Up a Revocable Group Signature Scheme for Crowdsensing |
Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) |
(4) |
11:45-12:10 |
Encodings and Numbers of Ciphertexts in Garbled Circuits on Three-valued Logic |
Shunsuke Hayashi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
|
12:10-13:10 |
Break ( 60 min. ) |
Fri, Nov 6 PM 13:10 - 14:00 |
(5) |
13:10-13:35 |
Easiness of document identification in information disclosure request |
Masami Honda (Kanto Gakuin Univ.) |
(6) |
13:35-14:00 |
Report on the International Policy Trends in Data Protection
-- A Study on controller and processor in Europe 1 -- |
Naonori Kato (KDDI Research/RIKEN AIP), Masatomo Suzuki (Niigata Univ./RIKEN AIP), Yosuke Murakami (KDDI Research) |
|
14:00-14:15 |
Break ( 15 min. ) |
Fri, Nov 6 PM 14:15 - 15:30 |
(7) |
14:15-14:40 |
Lifestyle authentication using the correlation between activity and GPS logs (1) |
Akira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi (UTokyo) |
(8) |
14:40-15:05 |
Considering the variation of the noise-addition amount in local differential privacy with user trajectory adjacency |
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) |
(9) |
15:05-15:30 |
Quadratic Residues-Based Private Authentication for RFID Systems |
Jian Song, Kazuya Sakai (TMU) |
|
15:30-15:45 |
Break ( 15 min. ) |
Fri, Nov 6 PM 15:45 - 16:45 |
(10) |
15:45-16:45 |
[Invited Talk]
Information Ethics in a Business Setting |
Kiyoshi Murata (Meiji Univ.) |