IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, RCC, WBS 2022-03-10
09:40
Online Online Construction GKW Transformation for Arithmetic Circuits
Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63
pp.31-37
IT, ISEC, RCC, WBS 2022-03-10
10:05
Online Online Towards Group Signature Scheme with Equality Test for Signers
Kyoya Anzai, Hiroaki Anada (Univ. Nagasaki) IT2021-89 ISEC2021-54 WBS2021-57 RCC2021-64
In this technical report, we discuss a group signature scheme with equality test for signers. This scheme has a func... [more] IT2021-89 ISEC2021-54 WBS2021-57 RCC2021-64
pp.38-41
WBS, IT, ISEC 2021-03-05
11:45
Online Online A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction
Hiroaki Anada (Univ. of Nagasaki) IT2020-149 ISEC2020-79 WBS2020-68
We propose an anonymous credential scheme and its generic construction, where there are independent decentralized multi-... [more] IT2020-149 ISEC2020-79 WBS2020-68
pp.225-231
ISEC 2020-05-20
14:40
Online Online Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions -- Serial Concatenation and Parallel Concatenation --
Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.) ISEC2020-9
In Bitcoin, the computational problem which miners should solve is
an equation described in the term of a hash functio... [more]
ISEC2020-9
pp.33-40
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:35
Kochi Kochi University of Technology A Method for Key-Updatable Symmetric Searchable Encryption
Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki) ISEC2019-54 SITE2019-48 BioX2019-46 HWS2019-49 ICSS2019-52 EMM2019-57
 [more] ISEC2019-54 SITE2019-48 BioX2019-46 HWS2019-49 ICSS2019-52 EMM2019-57
pp.353-356
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
15:00
Kochi Kochi University of Technology Participation Report of the 9th BIU Winter School on Cryptography
Hiroaki Anada (Univ. Nagasaki) ISEC2019-55 SITE2019-49 BioX2019-47 HWS2019-50 ICSS2019-53 EMM2019-58
In this technical report, ``The 9th BIU Winter School on Cryptography'' is introduced, which the author participated in.... [more] ISEC2019-55 SITE2019-49 BioX2019-47 HWS2019-50 ICSS2019-53 EMM2019-58
pp.357-361
IT, ISEC, WBS 2019-03-08
16:10
Tokyo University of Electro-Communications Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more]
IT2018-114 ISEC2018-120 WBS2018-115
pp.243-248
ISEC 2018-09-07
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. On AND/OR Composition of the ZKBoo Protocols
Hiroaki Anada (U. Nagasaki) ISEC2018-53
The ZKBoo protocol, which was presented at USENIX Security '16, is a kind of sigma-protocol. Since the presentation it i... [more] ISEC2018-53
pp.23-24
LOIS, ISEC, SITE 2017-11-09
16:30
Kyoto   Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation
Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) ISEC2017-59 SITE2017-41 LOIS2017-36
In a setting that a single user is given plural credentials on her attributes and related secret keys, an authentication... [more] ISEC2017-59 SITE2017-41 LOIS2017-36
pp.63-70
ISEC 2017-05-12
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Key-Updatable Searchable Encryption -- Applying Proxy Re-Encryption with Keyword Search --
Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more]
ISEC2017-1
pp.1-6
ISEC, WBS, IT 2017-03-10
11:45
Tokyo TOKAI University Diagonally Witness-Indistinguishable Proof Systems
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) IT2016-121 ISEC2016-111 WBS2016-97
We propose a witness-indistinguishable proof system which is a kind of parallel composition of witness-indistinguishable... [more] IT2016-121 ISEC2016-111 WBS2016-97
pp.145-148
ISEC 2016-09-02
10:10
Tokyo Kikai-Shinko-Kaikan Bldg. Bundling Proofs of Knowledge and its Application to Signatures
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) ISEC2016-39
(To be available after the conference date) [more] ISEC2016-39
pp.9-14
LOIS, ISEC, SITE 2015-11-07
10:55
Kanagawa Kanagawa Univ. Extension of NTRU Using Group Ring and Its Application
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46
 [more] ISEC2015-52 SITE2015-39 LOIS2015-46
pp.103-109
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
IA, ICSS 2015-06-12
11:30
Fukuoka Kyushu Institute of Technology Univ. A Report on International Conference NDSS2015
Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] IA2015-12 ICSS2015-12
pp.63-68
IT, ISEC, WBS 2010-03-04
11:15
Nagano Nagano-Engineering Campus, Shinshu University A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] IT2009-76 ISEC2009-84 WBS2009-55
pp.31-38
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan