Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
Development of a certificate path cache method for Certificate Validation Service Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.) |
Recently, many certification authorities (CAs) have been built as the base of an electronic commerce and an electronic a... [more] |
ISEC2005-49 pp.47-52 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:55 |
Iwate |
Iwate Prefectural University |
A Status Detection of Secure Communication in Secure Service Platform Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi) |
SSP (Secure Service Platform) is a platform that mediate secure communication. The secure communication using SSP needs ... [more] |
ISEC2005-50 pp.53-58 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:20 |
Iwate |
Iwate Prefectural University |
Development of Combined Authentication System Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi) |
[more] |
ISEC2005-51 pp.59-65 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT) |
[more] |
ISEC2005-52 pp.67-72 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:10 |
Iwate |
Iwate Prefectural University |
On Shared Attribute Certification Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.) |
[more] |
ISEC2005-53 pp.73-80 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:00 |
Iwate |
Iwate Prefectural University |
Critical cryptoanalysis for Y-00 Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco) |
[more] |
ISEC2005-54 pp.81-87 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:25 |
Iwate |
Iwate Prefectural University |
Cheater Identifiable Quantum Secret Sharing Schemes Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST) |
In this paper, we show that there exists a cheater identifiable
$(k, n)$ threshold secret sharing scheme for a quantum ... [more] |
ISEC2005-55 pp.89-92 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:50 |
Iwate |
Iwate Prefectural University |
Improvement of the Security against Photon Number Splitting Attacks Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing) |
Since it is difficult for practical optical devices to output a single-photon pulse, a weak laser pulse is often substit... [more] |
ISEC2005-56 pp.93-99 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:15 |
Iwate |
Iwate Prefectural University |
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.) |
Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based P... [more] |
ISEC2005-57 pp.101-107 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:40 |
Iwate |
Iwate Prefectural University |
Improved Collision Attack on MD4 with Probability Almost 1 Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC) |
In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang et. al..
Wang et. al. claimed that collision messeage... [more] |
ISEC2005-58 pp.109-116 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:20 |
Iwate |
Iwate Prefectural University |
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-59 pp.117-122 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:45 |
Iwate |
Iwate Prefectural University |
How to send a return receipt on anonymous channel ? Shinji Yamanaka (TOSHIBA) |
Proof of delivery (or return receipt) is a certificate of reception on network transaction from message sender to messag... [more] |
ISEC2005-60 pp.123-128 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:10 |
Iwate |
Iwate Prefectural University |
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.) |
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more] |
ISEC2005-61 pp.129-136 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:35 |
Iwate |
Iwate Prefectural University |
A note on cryptographic schemes using collision-resistant functions based on factoring Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.) |
A many-to-one function is called collision-resistant if it is infeasible to find two distinct inputs which correspond to... [more] |
ISEC2005-62 pp.137-142 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:00 |
Iwate |
Iwate Prefectural University |
Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment Takeshi Nasako, Yasuyuki Murakami (OECU) |
The low-density attack(LDA) is an effective attack to the knapsack cryptosystems when the density is low.
We proposed t... [more] |
ISEC2005-63 pp.143-147 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:25 |
Iwate |
Iwate Prefectural University |
Improving the security of S boxes in DES using Genetic Algorithm Atsushi Koyama, Yasuyuki Murakami (OECU) |
As for the Feistel cipher, it is known that the security of DES depends on the strength of S-box. DES is broken with the... [more] |
ISEC2005-64 pp.149-154 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:00 |
Iwate |
Iwate Prefectural University |
Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
To use results of watermark detection, a detection error probability is
required to be low enough.
We have derived ... [more] |
ISEC2005-65 pp.155-160 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:25 |
Iwate |
Iwate Prefectural University |
A Secure Reversible Watermark Using Predictive Coding Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing) |
The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, t... [more] |
ISEC2005-66 pp.161-166 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:50 |
Iwate |
Iwate Prefectural University |
An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ) |
A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to... [more] |
ISEC2005-67 pp.167-173 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:15 |
Iwate |
Iwate Prefectural University |
Robust watermarking scheme for copied, rotated and clipped documents Kurato Maeno, Masayuki Suto (Oki) |
With the recent enactment of Privacy Protection Law in Japan, there has been an increasing interest in technologies for ... [more] |
ISEC2005-68 pp.175-182 |