IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
pp.81-88
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] ICSS2014-91
pp.169-174
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] ICSS2014-92
pp.175-179
ICSS, IPSJ-SPT 2014-03-27
14:20
Okinawa Meio Univiersity General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] ICSS2013-65
pp.19-24
LOIS 2014-03-08
15:30
Okinawa   Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] LOIS2013-77
pp.137-141
ICSS 2013-03-25
11:35
Kanagawa Yokohama National University Partially Doubly-Encrypted ID-based Encryption and its Security
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] ICSS2012-60
pp.19-24
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
13:30
Hokkaido   Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems -- For Overcoming Contradiction of Protection and Utilization of Personal Data --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
 [more] ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
pp.175-179
RCS, AN, SR, USN
(Joint)
2011-10-26
11:05
Tokyo Sophia Univ. Laboratory experiments of USRP/UHD wireless terminal for multi-uesr MIMO systems
Hiroshi Doi, Hidekazu Murata, Susumu Yoshida, Koji Yamamoto (Kyoto Univ.), Daisuke Umehara (Kyoto Inst. of Tech.), Satoshi Denno (Okayama Univ.), Masahiro Morikura (Kyoto Univ.) RCS2011-145 SR2011-45 AN2011-23 USN2011-25
In a multi-user MIMO system which can increase the spectral efficiency in wireless communications,
MIMO precoding can r... [more]
RCS2011-145 SR2011-45 AN2011-23 USN2011-25
pp.31-35(RCS), pp.13-17(SR), pp.13-17(AN), pp.13-17(USN)
ISEC, IT, WBS 2011-03-03
10:50
Osaka Osaka University Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] IT2010-70 ISEC2010-74 WBS2010-49
pp.15-22
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] IT2010-71 ISEC2010-75 WBS2010-50
pp.23-30
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
13:25
Aomori Hirosaki University Attribute-based encryption with arbitrary number of authorities
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] ISEC2010-30 SITE2010-26 ICSS2010-36
pp.153-158
ISEC 2007-12-19
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. A Study of IBE to PKE Proxy Re-Encryption
Takeo Mizuno, Hiroshi Doi (IISEC) ISEC2007-124
A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice’s public key into the diffe... [more] ISEC2007-124
pp.85-92
ISEC, LOIS 2006-11-16
16:35
Chiba Univ. of Tokyo(Kashiwa Campus) A Note of Information Disclosure Method for the Internet Research Services
Hirohisa Ogawa, Hiroshi Doi (IISEC)
 [more] ISEC2006-93 OIS2006-51
pp.31-36
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan