Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIS, IPSJ-AVM |
2021-06-24 13:45 |
Online |
Online |
Privacy-Preserving Secure Computation of Gaussian Process Regression
-- Find patterns and rules from encrypted data -- Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) SIS2021-8 |
In this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfo... [more] |
SIS2021-8 pp.43-48 |
EMM, IT |
2021-05-20 16:10 |
Online |
Online |
[Invited Talk]
Secure Computation of Sparse Modeling
-- Edge AI with Lightweight and Small Amounts of Data -- Takayuki Nakachi (Univ. of the Ryukyus) IT2021-6 EMM2021-6 |
With the advent of the big data, IoT, AI era, all digital contents continue to increase. Sparse modeling is drawing atte... [more] |
IT2021-6 EMM2021-6 pp.31-36 |
ISEC |
2021-05-19 10:00 |
Online |
Online |
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1 |
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] |
ISEC2021-1 pp.1-8 |
ISEC |
2021-05-19 11:05 |
Online |
Online |
[Invited Talk]
Six-Card Finite-Runtime XOR Protocol with Only Random Cut (from APKC 2020) Kodai Toyoda (Tohoku Univ.), Daiki Miyahara (Tohoku Univ./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2021-3 |
In this invited talk, we introduce the paper ``Six-Card Finite-Runtime XOR Protocol with Only Random Cut'' by Kodai Toyo... [more] |
ISEC2021-3 p.17 |
ISEC |
2021-05-19 15:00 |
Online |
Online |
[Invited Talk]
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020) Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8 |
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] |
ISEC2021-8 p.33 |
IN, ICTSSL, NWS |
2020-10-22 15:25 |
Online |
Online |
[Invited Talk]
Secure Data Utilization using Multi-Party Computation Takao Takenouchi (Digital Garage) IN2020-32 |
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] |
IN2020-32 pp.12-17 |
IT |
2020-09-04 11:35 |
Online |
Online |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
AP, SANE, SAT (Joint) |
2020-07-15 15:05 |
Online |
Online |
Numerical investigation on the application of polar codes to free-space quantum key distribution Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5 |
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] |
SAT2020-5 pp.13-18 |
ISEC, IT, WBS |
2020-03-11 12:10 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Construction Method of Garbled Circuits for ZDD Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2019-114 ISEC2019-110 WBS2019-63 |
Kruger et al proposed a new method to construct Garbled Circuits for BDD, which gives a compression expression of logic... [more] |
IT2019-114 ISEC2019-110 WBS2019-63 pp.167-170 |
SP, EA, SIP |
2020-03-02 15:10 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
A Pattern Recognition Method Using Secure Sparse Representations in L0 Norm Minimization Takayuki Nakachi, Yitu Wang (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EA2019-130 SIP2019-132 SP2019-79 |
In this paper, we propose a privacy-preserving pattern recognition method using encrypted sparse representations in L0 n... [more] |
EA2019-130 SIP2019-132 SP2019-79 pp.169-174 |
IN |
2020-01-23 16:40 |
Aichi |
WINC AICHI |
[Invited Talk]
Protecting Security and Creating Security Shinichi Hirata (NTT) IN2019-71 |
NTT Secure Platform Laboratories is engaged in research and development on digital security that will be required for th... [more] |
IN2019-71 pp.37-40 |
ITE-BCT, SIS |
2019-10-25 11:10 |
Fukui |
Fukui International Activities Plaza |
Image Compression in Encryption-then-Compression System Using Secure Sparse Representations Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21 |
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] |
SIS2019-21 pp.77-82 |
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] |
2019-09-19 15:10 |
Niigata |
Tokimeito, Niigata University |
Secure sparse representations in L0 norm minimization Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2019-11 IE2019-24 EMM2019-68 |
In this paper, we propose a method to estimate secure sparse representations in L0 norm minimization, and evaluate the e... [more] |
LOIS2019-11 IE2019-24 EMM2019-68 pp.25-30 |
CPSY, DC, IPSJ-ARC [detail] |
2019-07-26 17:00 |
Hokkaido |
Kitami Civic Hall |
Secure Distributed Computing using Blockchain Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37 |
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] |
CPSY2019-37 DC2019-37 pp.223-227 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 10:40 |
Osaka |
I-Site Nanba(Osaka) |
[Poster Presentation]
A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 |
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] |
RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI) |
ISEC |
2019-05-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10 |
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] |
ISEC2019-10 p.47 |
ISEC |
2019-05-17 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018) Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11 |
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] |
ISEC2019-11 p.49 |
EMM |
2019-03-14 11:30 |
Okinawa |
TBD |
Image Patch Modeling using Secure Computation of Sparse Dictionary Learning Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-115 |
With the advent of the big data era, digital content continues to increase.
Sparse coding is attracting attention as an... [more] |
EMM2018-115 pp.129-134 |
IT, ISEC, WBS |
2019-03-08 10:15 |
Tokyo |
University of Electro-Communications |
Secure Comparisonl based on Quasi-Cyclic Code Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) IT2018-104 ISEC2018-110 WBS2018-105 |
If practical quantum computers are realized, it is known that most of cryptosystems based on number theory will be broke... [more] |
IT2018-104 ISEC2018-110 WBS2018-105 pp.175-180 |
SIS |
2019-03-06 15:10 |
Tokyo |
Tokyo Univ. Science, Katsushika Campus |
Secure Computation of Sparse Dictionary Learning Takayuki Nakachi, Yukihiro Bandoh (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-43 |
With the advent of the big data era, all digital contents continue to increase. Sparse modeling is drawing attention as ... [more] |
SIS2018-43 pp.35-40 |