IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2024-05-15
15:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023)
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6
Identity-based matchmaking encryption (IB-ME) is a generalization of identity-based encryption (IBE), in which both the ... [more] ISEC2024-6
p.22
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
pp.273-278
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure Identity-Based Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:40
Hokkaido Hokkaido Jichiro Kaikan Hierarchical Identity-based Matchmaking Encryption
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23
pp.60-67
RCC, ISEC, IT, WBS 2023-03-14
16:10
Yamaguchi
(Primary: On-site, Secondary: Online)
Identity-based Matchmaking Encryption Secure against the KGC
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93
pp.179-186
SIS 2023-03-02
14:10
Chiba Chiba Institute of Technology
(Primary: On-site, Secondary: Online)
Timeout ciphers based on ID-based cryptography
Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] SIS2022-45
pp.27-32
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
15:50
Online Online Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure
Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35
pp.118-123
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
16:40
Online Online Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
pp.131-138
SITE, ISEC, LOIS 2021-11-12
13:50
Online Online Security notions of decryption-controllable identity-based encryption
Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] ISEC2021-43 SITE2021-37 LOIS2021-26
pp.13-17
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:20
Hokkaido Sapporo Convention Center Construction of Revocable HIBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
pp.9-16
WBS, IT, ISEC 2018-03-09
09:00
Tokyo Katsusika Campas, Tokyo University of Science A Note on Security Notions of Anonymity in Identity-Based Encryption -- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] IT2017-139 ISEC2017-127 WBS2017-120
pp.213-218
IA, SITE, IPSJ-IOT [detail] 2018-03-05
14:30
Tochigi Kinugawa Onsen Hotel Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture
Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] SITE2017-65 IA2017-76
pp.91-96
ISEC, COMP 2017-12-22
10:40
Kochi Eikokuji Campus, Kochi University of Technology A Note on Security Notions of Anonymity in Identity-Based Encryption -- Relationship between LOR security and SW security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] ISEC2017-85 COMP2017-39
pp.89-94
LOIS, ISEC, SITE 2017-11-10
16:10
Kyoto   Revocable Hierarchical Identity-Based Encryption based on LWE Assumption
Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST) ISEC2017-71 SITE2017-53 LOIS2017-48
Revocable hierarchical identity-based encryption~(RHIBE) is an advanced form of standard identity-based encryption. RHIB... [more] ISEC2017-71 SITE2017-53 LOIS2017-48
pp.129-136
ISEC 2017-05-12
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Shuichi Katsumata (Univ. of Tokyo), Shota Yamada (AIST) ISEC2017-11
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing prope... [more] ISEC2017-11
p.61
ISEC 2016-09-02
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada (AIST) ISEC2016-48
In this paper, we present two new adaptively secure identity-based encryption schemes from lattices. The size of the pub... [more] ISEC2016-48
p.59
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] ICSS2014-91
pp.169-174
ICSS, IA 2014-06-06
11:20
Hyogo Takikawa Memorial Hall, Kobe University Ransomware: Threat Analysis and Countermeasures
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] IA2014-7 ICSS2014-7
pp.33-38
ICSS, IPSJ-SPT 2014-03-27
16:10
Okinawa Meio Univiersity Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices
Tomoko Kazama, Akira Kanaoka (Toho Univ.) ICSS2013-69
Current OpenFlow specification apply TLS to establish mutual authentication between a controller and a switch, as option... [more] ICSS2013-69
pp.43-48
LOIS 2014-03-08
15:30
Okinawa   Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] LOIS2013-77
pp.137-141
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan