Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2024-05-15 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6 |
Identity-based matchmaking encryption (IB-ME) is a generalization of identity-based encryption (IBE), in which both the ... [more] |
ISEC2024-6 p.22 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Encrypted data sharing system based on IBE secure against the KGC Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 |
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] |
IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 pp.273-278 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure Identity-Based Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Hierarchical Identity-based Matchmaking Encryption Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 |
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] |
ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 pp.60-67 |
RCC, ISEC, IT, WBS |
2023-03-14 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Identity-based Matchmaking Encryption Secure against the KGC Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 |
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] |
IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 pp.179-186 |
SIS |
2023-03-02 14:10 |
Chiba |
Chiba Institute of Technology (Primary: On-site, Secondary: Online) |
Timeout ciphers based on ID-based cryptography Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45 |
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] |
SIS2022-45 pp.27-32 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:20 |
Hokkaido |
Sapporo Convention Center |
Construction of Revocable HIBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 |
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] |
ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 pp.9-16 |
WBS, IT, ISEC |
2018-03-09 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120 |
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] |
IT2017-139 ISEC2017-127 WBS2017-120 pp.213-218 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 14:30 |
Tochigi |
Kinugawa Onsen Hotel |
Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76 |
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] |
SITE2017-65 IA2017-76 pp.91-96 |
ISEC, COMP |
2017-12-22 10:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39 |
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] |
ISEC2017-85 COMP2017-39 pp.89-94 |
LOIS, ISEC, SITE |
2017-11-10 16:10 |
Kyoto |
|
Revocable Hierarchical Identity-Based Encryption based on LWE Assumption Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST) ISEC2017-71 SITE2017-53 LOIS2017-48 |
Revocable hierarchical identity-based encryption~(RHIBE) is an advanced form of standard identity-based encryption. RHIB... [more] |
ISEC2017-71 SITE2017-53 LOIS2017-48 pp.129-136 |
ISEC |
2017-05-12 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Shuichi Katsumata (Univ. of Tokyo), Shota Yamada (AIST) ISEC2017-11 |
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing prope... [more] |
ISEC2017-11 p.61 |
ISEC |
2016-09-02 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters Shota Yamada (AIST) ISEC2016-48 |
In this paper, we present two new adaptively secure identity-based encryption schemes from lattices. The size of the pub... [more] |
ISEC2016-48 p.59 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
ICSS, IA |
2014-06-06 11:20 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Ransomware: Threat Analysis and Countermeasures Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7 |
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] |
IA2014-7 ICSS2014-7 pp.33-38 |
ICSS, IPSJ-SPT |
2014-03-27 16:10 |
Okinawa |
Meio Univiersity |
Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices Tomoko Kazama, Akira Kanaoka (Toho Univ.) ICSS2013-69 |
Current OpenFlow specification apply TLS to establish mutual authentication between a controller and a switch, as option... [more] |
ICSS2013-69 pp.43-48 |
LOIS |
2014-03-08 15:30 |
Okinawa |
|
Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77 |
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] |
LOIS2013-77 pp.137-141 |