Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure Identity-Based Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
EE |
2024-03-11 11:05 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Steering of the economy for a country to prosper with power electronics as a key infrastructure Daisuke Arai, Yu Yonezawa, Jun Imaoka, Masayoshi Yamamoto (Nagoya Univ.) EE2023-62 |
The first day of the year 2024 began with the “Noto Peninsula Earthquake”. This earthquake destroyed or damaged infrastr... [more] |
EE2023-62 pp.32-37 |
LOIS, SITE, ISEC |
2023-11-10 11:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24 |
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] |
ISEC2023-66 SITE2023-60 LOIS2023-24 pp.78-85 |
IT |
2023-08-04 11:00 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
The Outer Bounds for the General Secret-Private Key Capacity Region for Three Terminals Gustavo Oliveira, Shun Watanabe (TUAT) IT2023-24 |
We consider the general model for secret key generation between three terminals in which they are required to generate o... [more] |
IT2023-24 pp.56-61 |
ISEC |
2023-05-17 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Equivalent Secret Key-Recovery Attack on Knapsack Public Key Cryptosystem Ryuichi Sakai, Yasuyuki Murakami (OECU) ISEC2023-9 |
Shamir proposed an attack on Merkle-Hellman’s knapsack public key cryptosystem. This attack uses integer programming to ... [more] |
ISEC2023-9 pp.49-53 |
IN, RCS, NV (Joint) |
2022-05-26 11:50 |
Kanagawa |
Keio University (Hiyoshi Campus) (Primary: On-site, Secondary: Online) |
Application of Darwinian Neurodynamics Model for Dynamic TDD Resource Allocation Lu Chen, Masayuki Murata (Osaka Univ.) IN2022-3 |
Following the launch of 5G mobile network services, private 5G networks are getting started to be available, and have a ... [more] |
IN2022-3 pp.13-18 |
IT, ISEC, RCC, WBS |
2022-03-11 16:00 |
Online |
Online |
Analyzing Average Bit Length of Private Keys Obtained by the Improved Key Set Protocol Takeshi Undo, Koichi Koizumi, Ohtsuki Masanobu (Fukushima KOSEN) IT2021-130 ISEC2021-95 WBS2021-98 RCC2021-105 |
(To be available after the conference date) [more] |
IT2021-130 ISEC2021-95 WBS2021-98 RCC2021-105 pp.275-280 |
RCS, SR, SRW (Joint) |
2021-03-03 16:20 |
Online |
Online |
[Invited Lecture]
NICT's R&D Activities on the Future Terrestrial Wireless Communication Systems toward B5G/6G
-- Integrated Communication Systems That Harmonize Requirements with Environments -- Fumihide Kojima, Takeshi Matsumura (NICT) RCS2020-220 SR2020-67 SRW2020-58 |
NICT is promoting radio and development activities on enhanced radio access technologies, expanded radio systems deploym... [more] |
RCS2020-220 SR2020-67 SRW2020-58 pp.82-87(RCS), pp.23-28(SR), pp.23-28(SRW) |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 13:45 |
Kochi |
Kochi University of Technology |
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application -- Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 |
Considering the current situation, where personal verification with digital authentication is becoming important in the ... [more] |
ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 pp.341-346 |
ISEC |
2018-09-07 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal of Commercial Use of Social Number with Special Device Kento Iijima, Ryuya Uda (Tokyo Univ. of Tech.) ISEC2018-52 |
In recent years, the use of private numbers has been considered due to the appearance of the My Number system, but a pra... [more] |
ISEC2018-52 pp.15-22 |
ISEC |
2017-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42 |
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] |
ISEC2017-42 pp.7-14 |
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
ICSS2015-62 pp.89-94 |
IN |
2015-10-15 15:20 |
Osaka |
Osaka University |
A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
IN2015-55 pp.13-18 |
SITE, IPSJ-CE |
2011-12-17 15:15 |
Shimane |
|
On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy
-- Part 1 -- Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28 |
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] |
SITE2011-28 pp.19-24 |
SWIM |
2009-09-11 15:40 |
Tokyo |
|
Trends and Directions of OSS-based Private Cloud Computing
-- Intalio Cloud as Enterprise Cloud Platform -- Tomoaki Sawada (Intalio) SWIM2009-8 |
With the emergence of cloud computing, there occurred new trends to import the same computing platform within the firewa... [more] |
SWIM2009-8 pp.17-22 |
AP, SAT (Joint) |
2009-07-08 15:40 |
Hokkaido |
Otaru city, Hokkaido |
Improvement of Tolerance for Eavesdropping in Wireless Key Agreement Scheme using ESPAR Antenna based on Interference Transmission Masahiro Onishi, Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-54 |
As a countermeasure scheme against an eavesdropper in wireless communications, a key agreement scheme using an ESPAR ant... [more] |
AP2009-54 pp.59-64 |
ISEC |
2008-09-12 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Estimating RSA Private-Keys Generated in Security Chips Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71 |
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] |
ISEC2008-71 pp.55-62 |
AP |
2007-09-06 09:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An analysis on estimation characteristics of propagation channel Keisuke Inoue, Toshihiro Tango, Hisato Iwai, Hideichi Sasaoka (Doushisha Univ.) AP2007-74 |
In multipath fading environments, it is generally difficult to estimate received signal characteristics at a certain dis... [more] |
AP2007-74 pp.1-6 |
AP |
2007-01-25 10:50 |
Fukui |
Fukui Univ. |
Evaluation of channel characteristics estimation accuracy based on received signals at different locations by computer simulations. Keisuke Inoue, Toshihiro Tango, Hisato Iwai, Hideichi Sasaoka (Doushisha Univ.) AP2006-112 |
In multipath fading environments, it is generally difficult to estimate received signal characteristics at a certain dis... [more] |
AP2006-112 pp.13-18 |