IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2019-05-17
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions(from SCN 2018)
Keisuke Hara, Fuyuki Kitagawa (TokyoTech), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (TokyoTech) ISEC2019-1
 [more] ISEC2019-1
p.1
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:10
Hokkaido Sapporo Convention Center [Invited Talk] Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018)
Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23
In this invited talk, we introduce the paper, “ Memory Lower Bounds of Reductions Revisited ” by Y. Wang, T. Matsuda, G.... [more] ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23
p.93
ISEC 2017-05-12
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Size-Hiding Computation for Multiple Parties -- from ASIACRYPT 2016 --
Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Koji Nuida (AIST/PRESTO), Takashi Nishide (Univ. of Tsukuba), Goichiro Hanaoka (AIST), Eiji Okamoto (Univ. of Tsukuba) ISEC2017-4
 [more] ISEC2017-4
p.23
ISEC 2017-05-12
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
Yuyu Wang (Tokyo Tech/AIST), Zongyang Zhang (Beihang University), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2017-12
In this paper, we bridge the gap between structure-preserving signatures (SPSs) and fully structure-preserving signature... [more] ISEC2017-12
p.63
COMP, ISEC 2016-12-22
12:30
Hiroshima Hiroshima University [Invited Talk] Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) ISEC2016-83 COMP2016-44
 [more] ISEC2016-83 COMP2016-44
p.73
ISEC 2016-09-02
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
pp.27-34
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
14:30
Yamaguchi   Algebraic Surface Cryptosystems using Polynomial Approximate GCD
Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43
Since the original proposal in 2004, several attacks have been reported against algebraic surface cryptosystems. This re... [more] ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43
pp.217-222
ISEC 2016-05-19
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] ISEC2016-3
p.13
ISEC 2014-12-19
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa (Univ. of Tokyo), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (Univ. of Tokyo) ISEC2014-73
 [more] ISEC2014-73
p.21
IT, ISEC, WBS 2013-03-08
16:00
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme
Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST) IT2012-107 ISEC2012-125 WBS2012-93
In proxy re-encryption (PRE) schemes, the proxy re-encrypts a ciphertext $C$ for Alice into $C'$ which Bob can decrypt.... [more] IT2012-107 ISEC2012-125 WBS2012-93
pp.285-291
ISEC 2012-12-12
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL) ISEC2012-79
In this invited talk, we introduce the lecture with the same title presented at the 32nd International Cryptology Confer... [more] ISEC2012-79
p.43
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
13:50
Aomori Hirosaki University An Efficient Broadcast Encryption with Personalized Messages
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2010-31 SITE2010-27 ICSS2010-37
In broadcasting services, a broadcaster may transmit not only a roadcast content but also a personalized message for eac... [more] ISEC2010-31 SITE2010-27 ICSS2010-37
pp.159-166
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
16:10
Aomori Hirosaki University DLP with Auxiliary Input and the Security of Cryptographic Protocols
Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,) ISEC2010-35 SITE2010-31 ICSS2010-41
The security of publick-key cryptographic protocols are reduced to the infeasibility of underlying mathematical problems... [more] ISEC2010-35 SITE2010-31 ICSS2010-41
pp.189-194
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:35
Akita Akita University Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more]
ISEC2009-30 SITE2009-22 ICSS2009-44
pp.161-168
ISEC, SITE, IPSJ-CSEC 2007-07-20
15:20
Hokkaido Future University-Hakodate Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2007-65
In the bidirectional broadcasting service via networks, provider authentication is necessary for secure transmission of ... [more] ISEC2007-65
pp.133-139
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University Relations Among Notions of Security for Identity Based Encryption Schemes
Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST)
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] ISEC2005-46
pp.25-32
IT 2005-05-27
13:30
Overseas Univ. of Hawaii A Remark On GEM
Rui Zhang, Goichiro Hanaoka, Hideki Imai (Univ. of Tokyo)
 [more] IT2005-28
pp.35-40
ISEC 2004-09-17
15:40
Tokyo Kikai-Shinko-Kaikan Bldg. Trade-off Traitor Tracing
Goichiro Hanaoka (U. of Tokyo), Kazuto Ogawa, Arisa Fujii, Go Ohtake, Keigo Majima, Kimiyuki Oyamada (NHK), Hideki Imai (U. of Tokyo)
 [more] ISEC2004-73
pp.39-46
ISEC 2004-09-17
17:20
Tokyo Kikai-Shinko-Kaikan Bldg. ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives
Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.)
 [more] ISEC2004-77
pp.69-76
ISEC, IPSJ-CSEC 2004-07-20
14:45
Tokushima Tokushima Univ. A Secure Traitor Tracing Scheme against Key Exposure
Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK)
Copyright protection is a major issue in distributing content on the Internet. One well-known method of protecting copyr... [more] ISEC2004-35
pp.151-158
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan