Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Considerations on Differential Privacy Mechanisms in MNIST Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.) ICSS2023-79 |
In recent years, data utilization technologies, including machine learning, have been steadily advancing. One means of p... [more] |
ICSS2023-79 pp.71-78 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Improved signature-embedding techniques against backdoor attacks on DNN models Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87 |
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] |
ICSS2023-87 pp.129-136 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94 |
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] |
ICSS2023-94 pp.180-187 |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Post-Quantum Digital Signature Schemes Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 |
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] |
IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 pp.87-93 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
On Privacy Mechanism to Discreat Data fit for Machine Learning Tomoshi Yagishita, Atsuko Miyaji (OU) IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77 |
In recent years, while the use of personal data has become increasingly active, the importance of privacy protection has... [more] |
IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77 pp.127-134 |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration on Definition Field for Efficient Ring-LWE Problem Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 |
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] |
IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 pp.158-165 |
RCC, ISEC, IT, WBS |
2024-03-13 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82 |
[more] |
IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82 pp.166-173 |
RCC, ISEC, IT, WBS |
2024-03-14 10:20 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration of BKZ by reordering lattice basis vectors Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89 |
[more] |
IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89 pp.212-219 |
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Key-Value Commitments with batch update and verification Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 |
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] |
IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 pp.241-248 |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU) IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108 |
[more] |
IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108 pp.317-323 |
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
ICSS |
2023-11-16 16:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Redefinition of pair-PNB and application to ChaCha differential linear analysis Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58 |
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] |
ICSS2023-58 pp.49-56 |
ICSS |
2023-11-16 16:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Improved Secret Key Transport mechanism using CSIDH Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59 |
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more] |
ICSS2023-59 pp.57-63 |
ICSS |
2023-11-17 10:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Chameleon Hash Function with Forward-Security Pengxuan Wei, Atsuko Miyaji (Osaka Univ.), Yangguang Tian (University Of Surrey) ICSS2023-61 |
Chameleon Hash Function (CH) is a hash function with a public and secret key pair. CH is collision-resistant for users w... [more] |
ICSS2023-61 pp.70-76 |
LOIS, SITE, ISEC |
2023-11-09 14:20 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Improving Triple Sieve Algorithm on Ideal Lattice Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) ISEC2023-59 SITE2023-53 LOIS2023-17 |
[more] |
ISEC2023-59 SITE2023-53 LOIS2023-17 pp.33-40 |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Anslysis of binary elliptic curve GLS254 Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 |
In now days, light weight system like Iot(Internet of Things) and FPGA have attracted many researchers and have applied... [more] |
IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 pp.33-40 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 |
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] |
IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 pp.49-53 |
RCC, ISEC, IT, WBS |
2023-03-14 10:55 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU) IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73 |
[more] |
IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73 pp.54-60 |
RCC, ISEC, IT, WBS |
2023-03-14 14:55 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Forward-Secure for Claimable/Repudiable Ring Signature Scheme Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ) IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 |
web3.0 is a network of independent users directly connected to each other in a decentralized manner using the characteri... [more] |
IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 pp.155-162 |