Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2016-03-10 15:05 |
Tokyo |
The University of Electro-Communications |
Improved Key Rate of the Semi-Quantum Key Distribution Protocol Kento Yamada, Ryutaroh Matumoto (Tokyo Tech) IT2015-121 ISEC2015-80 WBS2015-104 |
The semi-quantum key distribution protocol(SQKD) is known as a secret key sharing method with information-theoretic secu... [more] |
IT2015-121 ISEC2015-80 WBS2015-104 pp.125-130 |
IT, ISEC, WBS |
2016-03-10 15:30 |
Tokyo |
The University of Electro-Communications |
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105 |
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more] |
IT2015-122 ISEC2015-81 WBS2015-105 pp.131-136 |
IT, ISEC, WBS |
2016-03-10 15:55 |
Tokyo |
The University of Electro-Communications |
Fundamental Properties on a Secret-key Cryptosystem with Guessing Secrecy for Plaintexts and Keys Shota Kamiya, Hiroki Koga (Tsukuba Unv.) IT2015-123 ISEC2015-82 WBS2015-106 |
In this paper we consider a secret-key cryptosystem with a wiretapper who tries to guess the plaintext corresponding to ... [more] |
IT2015-123 ISEC2015-82 WBS2015-106 pp.137-142 |
IT, ISEC, WBS |
2016-03-10 16:20 |
Tokyo |
The University of Electro-Communications |
Evaluation of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack Hiroki Koga, Kaoru Itabashi (Univ. Tsukuba) IT2015-124 ISEC2015-83 WBS2015-107 |
[more] |
IT2015-124 ISEC2015-83 WBS2015-107 pp.143-148 |
IT, ISEC, WBS |
2016-03-10 16:55 |
Tokyo |
The University of Electro-Communications |
[Invited Talk]
Security of quantum cryptography and the hash function Toyohiro Tsurumaru (Mitsubishi Electric) IT2015-125 ISEC2015-84 WBS2015-108 |
[more] |
IT2015-125 ISEC2015-84 WBS2015-108 p.149 |
IT, ISEC, WBS |
2016-03-11 10:00 |
Tokyo |
The University of Electro-Communications |
studies on evaluating system for q-ary linear block codes based on q-input r-output symmetric channels Tomohiro Fujikawa, Yamaguchi Kazuhiko (UEC) IT2015-126 ISEC2015-85 WBS2015-109 |
Kawashima and Yamaguchi proposed method to compute error probabilities of soft decision decoding for q-ary linear block ... [more] |
IT2015-126 ISEC2015-85 WBS2015-109 pp.151-156 |
IT, ISEC, WBS |
2016-03-11 10:25 |
Tokyo |
The University of Electro-Communications |
Performance Analysis of Spatially-Coupled MacKay-Neal Codes on Channels with Memory Takuya Okazaki, Kenta Kasai (Tokyo Tech) IT2015-127 ISEC2015-86 WBS2015-110 |
Obata et al. proved some spatially-coupled MacKay-Neal (SC-MN) codes achieve the capacitiy of the binary erasure channel... [more] |
IT2015-127 ISEC2015-86 WBS2015-110 pp.157-162 |
IT, ISEC, WBS |
2016-03-11 10:50 |
Tokyo |
The University of Electro-Communications |
An improvement of sum-product decoding of LDPC codes by a local search method Yuki Kawauchi, Hiroshi Enoki, Kohtaro Watanabe, Seiji Kataoka (NDA) IT2015-128 ISEC2015-87 WBS2015-111 |
[more] |
IT2015-128 ISEC2015-87 WBS2015-111 pp.163-168 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Construction of WOM codes for multilevel flash memories based of integer programming Yoju Fujino, Tadashi Wadayama (NIT) IT2015-129 ISEC2015-88 WBS2015-112 |
In this paper,
we proposed a construction of non-binary WOM (Write-Once-Memory) codes
for multilevel ($q$-level) fla... [more] |
IT2015-129 ISEC2015-88 WBS2015-112 pp.169-174 |
IT, ISEC, WBS |
2016-03-11 11:40 |
Tokyo |
The University of Electro-Communications |
Asymptotics Zero Error Capacity on Nearest Neighbor Error Channels with Multilevel Alphabet Takafumi Nakano, Tadashi Wadayama (NIT) IT2015-130 ISEC2015-89 WBS2015-113 |
This paper evaluates the zero error capacity of Nearest Neighbor Error channels with multilevel alphabet (NNE channels).... [more] |
IT2015-130 ISEC2015-89 WBS2015-113 pp.175-180 |
IT, ISEC, WBS |
2016-03-11 10:00 |
Tokyo |
The University of Electro-Communications |
Reconsideration of Fail-Stop Signature Schemes and Their UC-Security Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114 |
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] |
IT2015-131 ISEC2015-90 WBS2015-114 pp.181-188 |
IT, ISEC, WBS |
2016-03-11 10:25 |
Tokyo |
The University of Electro-Communications |
Expressive Attribute-Based Encryption with Fast Decryption Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115 |
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] |
IT2015-132 ISEC2015-91 WBS2015-115 pp.189-195 |
IT, ISEC, WBS |
2016-03-11 10:50 |
Tokyo |
The University of Electro-Communications |
Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116 |
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] |
IT2015-133 ISEC2015-92 WBS2015-116 pp.197-204 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
IT, ISEC, WBS |
2016-03-11 11:40 |
Tokyo |
The University of Electro-Communications |
k-Anonymization Techinque for Encrypted Data Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118 |
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] |
IT2015-135 ISEC2015-94 WBS2015-118 pp.211-217 |
IT, ISEC, WBS |
2016-03-11 13:05 |
Tokyo |
The University of Electro-Communications |
[Invited Talk]
A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119 |
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] |
IT2015-136 ISEC2015-95 WBS2015-119 p.219 |
IT, ISEC, WBS |
2016-03-11 14:05 |
Tokyo |
The University of Electro-Communications |
[Invited Talk]
Refined Analysis of Optimum Coding Rate for Channels with States Hideki Yagi (Univ. of Electro-Communications) IT2015-137 ISEC2015-96 WBS2015-120 |
There has been a recent trend of studies which analyze the fundamental limit of achievable coding rates by allowing some... [more] |
IT2015-137 ISEC2015-96 WBS2015-120 pp.221-228 |