Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2018-03-08 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99 |
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] |
IT2017-118 ISEC2017-106 WBS2017-99 pp.81-88 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65 |
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] |
ICSS2013-65 pp.19-24 |
LOIS |
2014-03-08 15:30 |
Okinawa |
|
Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77 |
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] |
LOIS2013-77 pp.137-141 |
ICSS |
2013-03-25 11:35 |
Kanagawa |
Yokohama National University |
Partially Doubly-Encrypted ID-based Encryption and its Security Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60 |
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] |
ICSS2012-60 pp.19-24 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:30 |
Hokkaido |
|
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data -- Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 |
[more] |
ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 pp.175-179 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 13:25 |
Aomori |
Hirosaki University |
Attribute-based encryption with arbitrary number of authorities Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] |
ISEC2010-30 SITE2010-26 ICSS2010-36 pp.153-158 |
ISEC |
2007-12-19 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IBE to PKE Proxy Re-Encryption Takeo Mizuno, Hiroshi Doi (IISEC) ISEC2007-124 |
A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice’s public key into the diffe... [more] |
ISEC2007-124 pp.85-92 |
ISEC, LOIS |
2006-11-16 16:35 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
A Note of Information Disclosure Method for the Internet Research Services Hirohisa Ogawa, Hiroshi Doi (IISEC) |
[more] |
ISEC2006-93 OIS2006-51 pp.31-36 |