IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
14:15
Osaka Osaka Univ. (Suita Campus) An Identity Management System using Group Signatures with Message-Dependent Opening
Yuto Imura, Keita Emura (Kanazawa Univ.) IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100
Isshiki et al. (ACM DRM 2006) proposed a privacy-preserving ID management system using group signatures (Isshiki system)... [more] IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100
pp.267-272
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
pp.273-278
ICSS 2023-11-17
10:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center
Shuntaro Ema (Tokai Univ.), Keita Emura (Kanazawa Univ.), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-60
 [more] ICSS2023-60
pp.64-69
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:20
Hokkaido Hokkaido Jichiro Kaikan A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search
Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22
pp.52-59
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
16:40
Online Online Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
pp.131-138
ISEC 2021-05-19
13:25
Online Online Secure Chat and Storage Systems based on Searchable Encryption: Implementation and Evaluation
Keita Emura, Sachiko Kanamori, Ryo Nojima (NICT), Yohei Watanabe (UEC/NICT) ISEC2021-5
(To be available after the conference date) [more] ISEC2021-5
pp.19-24
ISEC 2020-05-20
15:30
Online Online An Anonymous Trust-Marking Scheme on NEM Blockchain Systems
Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] ISEC2020-11
pp.47-54
ISEC 2019-05-17
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018)
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] ISEC2019-10
p.47
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
11:10
Hokkaido Sapporo Convention Center On the integration of SCF-PEKS and PKE
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.) ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15
 [more] ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15
pp.23-30
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:40
Hokkaido Sapporo Convention Center Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption
Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST) ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30
 [more] ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30
pp.171-176
ISEC, COMP 2017-12-21
15:25
Kochi Eikokuji Campus, Kochi University of Technology Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] ISEC2017-79 COMP2017-33
pp.43-50
ISEC 2017-05-12
15:15
Tokyo Kikai-Shinko-Kaikan Bldg. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability
Keita Emura (NICT) ISEC2017-9
 [more] ISEC2017-9
pp.51-57
ICSS 2010-11-05
13:00
Hiroshima Hiroshima City University An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-47
There are many cryptographic schemes with anonymity, such as group signatures.
As one important property, anonymous us... [more]
ICSS2010-47
pp.17-22
ICSS 2010-11-05
13:25
Hiroshima Hiroshima City University A Timed-Release Proxy Re-Encryption Scheme and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] ICSS2010-48
pp.23-28
ISEC 2008-05-16
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics
Keita Emura, Atsuko Miyaji (JAIST) ISEC2008-10
Recently,
many cryptographic schemes based on user's attributes are proposed, e.g., Attribute-Based Group Signature (A... [more]
ISEC2008-10
pp.61-68
IT, ISEC, WBS 2007-03-16
13:00
Gunma Gunma Univ. (Kiryu Campus) Share selectable secret sharing scheme on inefficiency concentrated for particular user
Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST)
On Shamir threshold scheme, a participant's share is randomly given.\
The usability can be improved if share is select... [more]
IT2006-114 ISEC2006-169 WBS2006-111
pp.173-178
IT, ISEC, WBS 2007-03-16
13:25
Gunma Gunma Univ. (Kiryu Campus) Group Signature with Efficient Revocation
Nao Nomura, Atsuko Miyaji, Keita Emura (JAIST)
Previous group signature schemes with revocation have computational cost of signing and verification depends on revoked ... [more] IT2006-115 ISEC2006-170 WBS2006-112
pp.179-184
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan