Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
An Identity Management System using Group Signatures with Message-Dependent Opening Yuto Imura, Keita Emura (Kanazawa Univ.) IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 |
Isshiki et al. (ACM DRM 2006) proposed a privacy-preserving ID management system using group signatures (Isshiki system)... [more] |
IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 pp.267-272 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Encrypted data sharing system based on IBE secure against the KGC Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 |
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] |
IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 pp.273-278 |
ICSS |
2023-11-17 10:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center Shuntaro Ema (Tokai Univ.), Keita Emura (Kanazawa Univ.), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-60 |
[more] |
ICSS2023-60 pp.64-69 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 |
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] |
ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 pp.52-59 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
ISEC |
2021-05-19 13:25 |
Online |
Online |
Secure Chat and Storage Systems based on Searchable Encryption: Implementation and Evaluation Keita Emura, Sachiko Kanamori, Ryo Nojima (NICT), Yohei Watanabe (UEC/NICT) ISEC2021-5 |
(To be available after the conference date) [more] |
ISEC2021-5 pp.19-24 |
ISEC |
2020-05-20 15:30 |
Online |
Online |
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11 |
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] |
ISEC2020-11 pp.47-54 |
ISEC |
2019-05-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10 |
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] |
ISEC2019-10 p.47 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 11:10 |
Hokkaido |
Sapporo Convention Center |
On the integration of SCF-PEKS and PKE Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.) ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15 |
[more] |
ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15 pp.23-30 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 16:40 |
Hokkaido |
Sapporo Convention Center |
Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST) ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30 |
[more] |
ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30 pp.171-176 |
ISEC, COMP |
2017-12-21 15:25 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33 |
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] |
ISEC2017-79 COMP2017-33 pp.43-50 |
ISEC |
2017-05-12 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability Keita Emura (NICT) ISEC2017-9 |
[more] |
ISEC2017-9 pp.51-57 |
ICSS |
2010-11-05 13:00 |
Hiroshima |
Hiroshima City University |
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-47 |
There are many cryptographic schemes with anonymity, such as group signatures.
As one important property, anonymous us... [more] |
ICSS2010-47 pp.17-22 |
ICSS |
2010-11-05 13:25 |
Hiroshima |
Hiroshima City University |
A Timed-Release Proxy Re-Encryption Scheme and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48 |
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] |
ICSS2010-48 pp.23-28 |
ISEC |
2008-05-16 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics Keita Emura, Atsuko Miyaji (JAIST) ISEC2008-10 |
Recently,
many cryptographic schemes based on user's attributes are proposed, e.g., Attribute-Based Group Signature (A... [more] |
ISEC2008-10 pp.61-68 |
IT, ISEC, WBS |
2007-03-16 13:00 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Share selectable secret sharing scheme on inefficiency concentrated for particular user Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST) |
On Shamir threshold scheme, a participant's share is randomly given.\
The usability can be improved if share is select... [more] |
IT2006-114 ISEC2006-169 WBS2006-111 pp.173-178 |
IT, ISEC, WBS |
2007-03-16 13:25 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Group Signature with Efficient Revocation Nao Nomura, Atsuko Miyaji, Keita Emura (JAIST) |
Previous group signature schemes with revocation have computational cost of signing and verification depends on revoked ... [more] |
IT2006-115 ISEC2006-170 WBS2006-112 pp.179-184 |