Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2021-03-04 15:20 |
Online |
Online |
A Consideration on Evolving Secret Sharing Schemes using Linear Codes Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.) IT2020-132 ISEC2020-62 WBS2020-51 |
Shamir's $(k, n)$ threshold scheme is realized by linear codes on a finite field. This scheme requires that an upper bou... [more] |
IT2020-132 ISEC2020-62 WBS2020-51 pp.123-127 |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech) IT2020-133 ISEC2020-63 WBS2020-52 |
In this paper, we consider the private information retrieval using multiple databases with multiple messages in the case... [more] |
IT2020-133 ISEC2020-63 WBS2020-52 pp.128-133 |
WBS, IT, ISEC |
2021-03-04 16:25 |
Online |
Online |
[Invited Talk]
Management of Multiple Wireless Access for IOWN in the 6G era Yasushi Takatori (NTT) IT2020-134 ISEC2020-64 WBS2020-53 |
Future networks are expected to provide high-speed, large-capacity communications that exceed the limits of conventional... [more] |
IT2020-134 ISEC2020-64 WBS2020-53 pp.134-138 |
WBS, IT, ISEC |
2021-03-04 14:55 |
Online |
Online |
A Physical Zero-knowledge Proof for Cryptarithmetic Using Dihedral Cards Raimu Isuzugawa (Tohoku Univ.), Daiki Miyahara, Takaaki Mizuki (Tohoku Univ./AIST), Hideaki Sone (Tohoku Univ.) IT2020-135 ISEC2020-65 WBS2020-54 |
(To be available after the conference date) [more] |
IT2020-135 ISEC2020-65 WBS2020-54 pp.139-145 |
WBS, IT, ISEC |
2021-03-04 15:20 |
Online |
Online |
On Some Principles of Security Analysis for Physical-Ciphered Communication Systems Kentaro Kato (Tamagawa Univ.) IT2020-136 ISEC2020-66 WBS2020-55 |
This paper discusses the way to the security analysis of physical-ciphered communication systems that actively utilize o... [more] |
IT2020-136 ISEC2020-66 WBS2020-55 pp.146-151 |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
A Real-Time Bluetooth Protocol Fuzzing System Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU) IT2020-137 ISEC2020-67 WBS2020-56 |
In recent years, with the practical use and spread of Bluetooth IoT (Internet of Things) devices, there are concerns abo... [more] |
IT2020-137 ISEC2020-67 WBS2020-56 pp.152-159 |
WBS, IT, ISEC |
2021-03-05 09:25 |
Online |
Online |
Blind Estimation of Carrier Frequency Offset and Symbol Time Offset using WFrFT Toshifumi Kojima, Kouji Ohuchi (Shizuoka Univ.) IT2020-138 ISEC2020-68 WBS2020-57 |
In this paper, we present a blind estimation method to detect carrier frequency offset (CFO) and symbol time offset (STO... [more] |
IT2020-138 ISEC2020-68 WBS2020-57 pp.160-165 |
WBS, IT, ISEC |
2021-03-05 09:50 |
Online |
Online |
Performance Evaluation of VN-CSK Type Parallel Indoor Optical Wireless Communication Using RGB-LED with Different Color Power Koki Taruishi, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) IT2020-139 ISEC2020-69 WBS2020-58 |
In indoor lighting optical communication, it is desired to realize three functions: the lighting function, the positioni... [more] |
IT2020-139 ISEC2020-69 WBS2020-58 pp.166-170 |
WBS, IT, ISEC |
2021-03-05 10:15 |
Online |
Online |
Indoor Long Distance High Speed Imaging MIMO System With Linear Transmitting Element Array Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya University) IT2020-140 ISEC2020-70 WBS2020-59 |
Multiple-input-multiple-output optical wireless communication (MIMO-OWC) system is considered as a potential candidate t... [more] |
IT2020-140 ISEC2020-70 WBS2020-59 pp.171-175 |
WBS, IT, ISEC |
2021-03-05 10:55 |
Online |
Online |
Vehicle Speed and Driving Distance Estimation using Millimeter-wave Radar Keiji Jimi, Takeki Ogitsu (Gunma Univ.) IT2020-141 ISEC2020-71 WBS2020-60 |
In the autonomous vehicle technology, the stable localization is required for safety driving. GNSS, LIDAR and Image sens... [more] |
IT2020-141 ISEC2020-71 WBS2020-60 pp.176-180 |
WBS, IT, ISEC |
2021-03-05 11:20 |
Online |
Online |
Improving of Interference Reduction Scheme Using Replica Signals for FMCW Radar Fumiya Tako, Kohei Ohno (Meiji Univ.) IT2020-142 ISEC2020-72 WBS2020-61 |
[more] |
IT2020-142 ISEC2020-72 WBS2020-61 pp.181-186 |
WBS, IT, ISEC |
2021-03-05 09:00 |
Online |
Online |
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62 |
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] |
IT2020-143 ISEC2020-73 WBS2020-62 pp.187-194 |
WBS, IT, ISEC |
2021-03-05 09:25 |
Online |
Online |
Construction of non-malleable codes based on graph theory Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.) IT2020-144 ISEC2020-74 WBS2020-63 |
Non-malleable codes protect communications against adversarial tampering of data, which can be seen as a relaxation of e... [more] |
IT2020-144 ISEC2020-74 WBS2020-63 pp.195-200 |
WBS, IT, ISEC |
2021-03-05 09:50 |
Online |
Online |
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech) IT2020-145 ISEC2020-75 WBS2020-64 |
[more] |
IT2020-145 ISEC2020-75 WBS2020-64 pp.201-207 |
WBS, IT, ISEC |
2021-03-05 10:15 |
Online |
Online |
A Proposal for Causal Inference with Subjective Evaluation Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.) IT2020-146 ISEC2020-76 WBS2020-65 |
Machine learning techniques such as deep learning are often used for identification and personal matching in information... [more] |
IT2020-146 ISEC2020-76 WBS2020-65 pp.208-212 |
WBS, IT, ISEC |
2021-03-05 10:55 |
Online |
Online |
Digital Signatures with Wildcards Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66 |
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] |
IT2020-147 ISEC2020-77 WBS2020-66 pp.213-218 |
WBS, IT, ISEC |
2021-03-05 11:20 |
Online |
Online |
Non-interactive multiparty computation adapt to dynamic participants Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67 |
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] |
IT2020-148 ISEC2020-78 WBS2020-67 pp.219-224 |
WBS, IT, ISEC |
2021-03-05 11:45 |
Online |
Online |
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction Hiroaki Anada (Univ. of Nagasaki) IT2020-149 ISEC2020-79 WBS2020-68 |
We propose an anonymous credential scheme and its generic construction, where there are independent decentralized multi-... [more] |
IT2020-149 ISEC2020-79 WBS2020-68 pp.225-231 |
WBS, IT, ISEC |
2021-03-05 12:10 |
Online |
Online |
Fast Multiparty Threshold ECDSA With Robustness Wang zhaobo, Atsuko Miyaji (Osaka Univ.) IT2020-150 ISEC2020-80 WBS2020-69 |
[more] |
IT2020-150 ISEC2020-80 WBS2020-69 pp.232-238 |
WBS, IT, ISEC |
2021-03-05 14:20 |
Online |
Online |
Improvement of Cicalese-Gargano-Vaccaro Algorithm for the Minimum-Entropy Couplings Problem Kohei Sakatani, Ken-ichi Iwata (Univ. of Fukui), Hiroshi Fujisaki (Kanazawa Univ.) IT2020-151 ISEC2020-81 WBS2020-70 |
Minimum-Entropy coupling is a problem of finding a joint probability distribution of minimum entropy from the set of joi... [more] |
IT2020-151 ISEC2020-81 WBS2020-70 pp.239-244 |