Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:00 |
Iwate |
Iwate Prefectural University |
The Direction of Japan's CMVP II Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa) |
As Japan now has her own e-government recommended cipher list, is seeking the possibilities to have her own Cryptographi... [more] |
ISEC2005-29 SITE2005-27 pp.147-153 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:25 |
Iwate |
Iwate Prefectural University |
On the Standardization of Information Security
-- Report on the Vienna Meeting in April, 2005 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT) |
[more] |
ISEC2005-30 SITE2005-28 pp.155-164 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:00 |
Iwate |
Iwate Prefectural University |
Construction of Oblivious Signatures Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(To be available after the conference date) [more] |
ISEC2005-31 SITE2005-29 pp.165-171 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:25 |
Iwate |
Iwate Prefectural University |
Partially Blind Signatures with Traceability Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT) |
Until now, it is not sufficiently discussed about how to construct a provably secure ``partially blind signature with tr... [more] |
ISEC2005-32 SITE2005-30 pp.173-178 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:50 |
Iwate |
Iwate Prefectural University |
Proposal on Sumi coating method which can change the coating parts to protect against insider attacks Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ) |
Digital signatures do not allow any alteration of a document. However, for some signed documents ”appropriate” alteratio... [more] |
ISEC2005-33 SITE2005-31 pp.179-186 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:15 |
Iwate |
Iwate Prefectural University |
Exact t-out-of-n Signer-Ambiguous Signature Eiichiro Fujisaki, Koutarou Suzuki (NTT) |
[more] |
ISEC2005-34 SITE2005-32 pp.187-194 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:40 |
Iwate |
Iwate Prefectural University |
An (N,K) Threshold Signature Scheme with Public Keys of Small Size Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.) |
[more] |
ISEC2005-35 SITE2005-33 pp.195-200 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:05 |
Iwate |
Iwate Prefectural University |
Meta Ring Signature Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU) |
In this paper, we propose a new concept ``Meta Ring Signature''.
Suppose that a signature text work as a public key,
... [more] |
ISEC2005-36 SITE2005-34 pp.201-204 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:45 |
Iwate |
Iwate Prefectural University |
An Information Hiding System for Word 2003 XML Documents Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo) |
We are considering an information hiding technique for the following
situation: 1) The original writer applies the digi... [more] |
ISEC2005-37 SITE2005-35 pp.205-212 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:10 |
Iwate |
Iwate Prefectural University |
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-38 SITE2005-36 pp.213-220 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:35 |
Iwate |
Iwate Prefectural University |
A Text hiding by Visual Secret Sharing with Picture Images Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.) |
The information in a digital document can flow out easily by copy & paste, print out, etc. "Text Secret Sharing Scheme U... [more] |
ISEC2005-39 SITE2005-37 pp.221-228 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:00 |
Iwate |
Iwate Prefectural University |
Implementation and Evaluation of Memory Protection Methods for Multitask OSes
-- CMS for Resource-poor Platforms and Tampering Detection -- Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo) |
The authors have been proposing a method, called Cryptographic Memory System (CMS), to protect the data stored in the ad... [more] |
ISEC2005-40 SITE2005-38 pp.229-234 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:25 |
Iwate |
Iwate Prefectural University |
A description model for data access control in Salvia operating system Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.) |
[more] |
ISEC2005-41 SITE2005-39 pp.235-242 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:50 |
Iwate |
Iwate Prefectural University |
A Case Study of Gordon-Loeb Model on Optimal Security Investiments Kimio Kuramitsu (Yokohama National Univ.) |
Gordon and Loeb (2002) presented an economic model of characterizing an optimal investment in information security. The ... [more] |
ISEC2005-42 SITE2005-40 pp.243-248 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications) |
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] |
ISEC2005-43 pp.1-8 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:55 |
Iwate |
Iwate Prefectural University |
Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme -- Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Sc... [more] |
ISEC2005-44 pp.9-16 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:20 |
Iwate |
Iwate Prefectural University |
Efficient N-Party Password-based Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo) |
In this paper, we propose an efficient N-party
password-authenticated key exchange (so-called {\sf N-PAKE})
protocol a... [more] |
ISEC2005-45 pp.17-23 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST) |
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] |
ISEC2005-46 pp.25-32 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:10 |
Iwate |
Iwate Prefectural University |
On a secure circuit evaluation protocol using ElGamal encryption Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT) |
[more] |
ISEC2005-47 pp.33-40 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:35 |
Iwate |
Iwate Prefectural University |
An efficiently-verifiable zero-knowledge argument for proofs of knowledge Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT) |
[more] |
ISEC2005-48 pp.41-45 |