IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 171 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIS, IPSJ-AVM 2021-06-24
13:45
Online Online Privacy-Preserving Secure Computation of Gaussian Process Regression -- Find patterns and rules from encrypted data --
Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) SIS2021-8
In this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfo... [more] SIS2021-8
pp.43-48
EMM, IT 2021-05-20
16:10
Online Online [Invited Talk] Secure Computation of Sparse Modeling -- Edge AI with Lightweight and Small Amounts of Data --
Takayuki Nakachi (Univ. of the Ryukyus) IT2021-6 EMM2021-6
With the advent of the big data, IoT, AI era, all digital contents continue to increase. Sparse modeling is drawing atte... [more] IT2021-6 EMM2021-6
pp.31-36
ISEC 2021-05-19
10:00
Online Online Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] ISEC2021-1
pp.1-8
ISEC 2021-05-19
11:05
Online Online [Invited Talk] Six-Card Finite-Runtime XOR Protocol with Only Random Cut (from APKC 2020)
Kodai Toyoda (Tohoku Univ.), Daiki Miyahara (Tohoku Univ./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2021-3
In this invited talk, we introduce the paper ``Six-Card Finite-Runtime XOR Protocol with Only Random Cut'' by Kodai Toyo... [more] ISEC2021-3
p.17
ISEC 2021-05-19
15:00
Online Online [Invited Talk] Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020)
Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] ISEC2021-8
p.33
IN, ICTSSL, NWS 2020-10-22
15:25
Online Online [Invited Talk] Secure Data Utilization using Multi-Party Computation
Takao Takenouchi (Digital Garage) IN2020-32
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] IN2020-32
pp.12-17
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
AP, SANE, SAT
(Joint)
2020-07-15
15:05
Online Online Numerical investigation on the application of polar codes to free-space quantum key distribution
Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] SAT2020-5
pp.13-18
ISEC, IT, WBS 2020-03-11
12:10
Hyogo University of Hyogo
(Cancelled but technical report was issued)
A Construction Method of Garbled Circuits for ZDD
Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2019-114 ISEC2019-110 WBS2019-63
Kruger et al proposed a new method to construct Garbled Circuits for BDD, which gives a compression expression of logic... [more] IT2019-114 ISEC2019-110 WBS2019-63
pp.167-170
SP, EA, SIP 2020-03-02
15:10
Okinawa Okinawa Industry Support Center
(Cancelled but technical report was issued)
A Pattern Recognition Method Using Secure Sparse Representations in L0 Norm Minimization
Takayuki Nakachi, Yitu Wang (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EA2019-130 SIP2019-132 SP2019-79
In this paper, we propose a privacy-preserving pattern recognition method using encrypted sparse representations in L0 n... [more] EA2019-130 SIP2019-132 SP2019-79
pp.169-174
IN 2020-01-23
16:40
Aichi WINC AICHI [Invited Talk] Protecting Security and Creating Security
Shinichi Hirata (NTT) IN2019-71
NTT Secure Platform Laboratories is engaged in research and development on digital security that will be required for th... [more] IN2019-71
pp.37-40
ITE-BCT, SIS 2019-10-25
11:10
Fukui Fukui International Activities Plaza Image Compression in Encryption-then-Compression System Using Secure Sparse Representations
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] SIS2019-21
pp.77-82
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] 2019-09-19
15:10
Niigata Tokimeito, Niigata University Secure sparse representations in L0 norm minimization
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2019-11 IE2019-24 EMM2019-68
In this paper, we propose a method to estimate secure sparse representations in L0 norm minimization, and evaluate the e... [more] LOIS2019-11 IE2019-24 EMM2019-68
pp.25-30
CPSY, DC, IPSJ-ARC [detail] 2019-07-26
17:00
Hokkaido Kitami Civic Hall Secure Distributed Computing using Blockchain
Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] CPSY2019-37 DC2019-37
pp.223-227
SeMI, RCS, NS, SR, RCC
(Joint)
2019-07-11
10:40
Osaka I-Site Nanba(Osaka) [Poster Presentation] A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks
Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40
pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI)
ISEC 2019-05-17
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018)
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] ISEC2019-10
p.47
ISEC 2019-05-17
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018)
Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] ISEC2019-11
p.49
EMM 2019-03-14
11:30
Okinawa TBD Image Patch Modeling using Secure Computation of Sparse Dictionary Learning
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-115
With the advent of the big data era, digital content continues to increase.
Sparse coding is attracting attention as an... [more]
EMM2018-115
pp.129-134
IT, ISEC, WBS 2019-03-08
10:15
Tokyo University of Electro-Communications Secure Comparisonl based on Quasi-Cyclic Code
Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) IT2018-104 ISEC2018-110 WBS2018-105
If practical quantum computers are realized, it is known that most of cryptosystems based on number theory will be broke... [more] IT2018-104 ISEC2018-110 WBS2018-105
pp.175-180
SIS 2019-03-06
15:10
Tokyo Tokyo Univ. Science, Katsushika Campus Secure Computation of Sparse Dictionary Learning
Takayuki Nakachi, Yukihiro Bandoh (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-43
With the advent of the big data era, all digital contents continue to increase. Sparse modeling is drawing attention as ... [more] SIS2018-43
pp.35-40
 Results 21 - 40 of 171 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan