Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 |
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] |
ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 pp.52-59 |
IT |
2017-09-08 13:00 |
Yamaguchi |
Centcore Yamaguchi Hotel |
[Invited Talk]
Broadcast Encryption with Information Theoretic Security
-- Classical Results and Recent Progress -- Yohei Watanabe (UEC) IT2017-44 |
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] |
IT2017-44 pp.31-36 |
SANE |
2016-11-24 14:50 |
Overseas |
National Taipei University of Technology (NTUT) |
[Poster Presentation]
Flight Safety Enhancements for Air Traffic Control System Tao-Cho Chen (T.C. Chen), Ta-Ming Shih (T. M. Shih), Yan-Hong Lin (Y.H. Lin) SANE2016-80 |
To meet future demand for air transport growth, break the traditional ground navigation aids facilities limitations and ... [more] |
SANE2016-80 pp.149-153 |
IA, ICSS |
2013-06-20 15:00 |
Niigata |
Ao-re Nagaoka |
Vulnerability of RC4 in SSL/TLS Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4 |
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] |
IA2013-4 ICSS2013-4 pp.19-24 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 13:50 |
Aomori |
Hirosaki University |
An Efficient Broadcast Encryption with Personalized Messages Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2010-31 SITE2010-27 ICSS2010-37 |
In broadcasting services, a broadcaster may transmit not only a roadcast content but also a personalized message for eac... [more] |
ISEC2010-31 SITE2010-27 ICSS2010-37 pp.159-166 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Traitor Tracing from ID based Broadcast Encryption Ryuichi Sakai (OECU) ISEC2008-48 |
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more] |
ISEC2008-48 pp.95-100 |
ICM |
2008-05-08 14:35 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Evaluation of Live Video Streaming System with Broadcast Encryption over IP Multicast Yoshitaka Morimura, Tetsutaro Uehara, Shuhui Hou, Michihiko Minoh (Kyoto Univ.) ICM2008-6 |
We constructed a live video streaming system over IP Multicast, which uses SRTP and delivers the decryption key with bro... [more] |
ICM2008-6 pp.29-34 |
MoNA, ITE-BCT, ITE-CE |
2007-09-20 14:40 |
Ehime |
Ehime Univ. |
* Mutsumi Shimoda (HITACHI) MoMuC2007-44 |
During from 2004 to 2006, The PC, which can record TV programs of terrestrial digital broadcasting, was developed and a ... [more] |
MoMuC2007-44 pp.7-10 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Group Key Based Revocation Schemes with Shorter Message Header Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) ISEC2007-36 SITE2007-30 |
[more] |
ISEC2007-36 SITE2007-30 pp.139-143 |
IT, ISEC, WBS |
2007-03-16 09:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Key Update by Broadcast Encryption for Wireless Sensor Networks Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI) |
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] |
IT2006-96 ISEC2006-151 WBS2006-93 pp.65-70 |
ISEC |
2006-09-13 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC) |
We propose a black-box traitor revocable broadcast encryption
scheme. This is a variant of a broadcast encryption schem... [more] |
ISEC2006-80 pp.61-68 |
ISEC |
2004-09-17 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of Subset Difference Method Using One-way Function Mai Nakagawa (Chiva Univ) |
(To be available after the conference date) [more] |
ISEC2004-72 pp.33-38 |