Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, ISEC, IT, RCC |
2025-03-06 10:15 |
Osaka |
Nakanoshima Center, Osaka University (Osaka) |
Construction of Short Identity-Based Signature from Codes Ryoma Kinjo, Shingo Sato, Junji Shikata (Yokohama National Univ.) |
(To be available after the conference date) [more] |
|
WBS, ISEC, IT, RCC |
2025-03-06 12:40 |
Osaka |
Nakanoshima Center, Osaka University (Osaka) |
Proposal and Evaluation of a Deep Learning Model for Lattice Problems Keita Yamakawa, Junji Shikata (YNU) |
(To be available after the conference date) [more] |
|
ISEC |
2024-05-15 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6 |
Identity-based matchmaking encryption (IB-ME) is a generalization of identity-based encryption (IBE), in which both the ... [more] |
ISEC2024-6 p.22 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Proxy Re-Encryption Based on LPN Problem Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:40 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
Hierarchical Identity-based Matchmaking Encryption Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 |
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] |
ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 pp.60-67 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:20 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
An Identity-based Signature Scheme with Tight Security Reduction Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 |
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] |
ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 pp.97-104 |
RCC, ISEC, IT, WBS |
2023-03-14 13:00 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Multi-Authority Attribute Based Signatures from Lattice Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86 |
We construct Multi-Authority Attribute-Based Signatures (MA-ABS) based on lattices. Our scheme is the first scheme that ... [more] |
IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86 pp.127-134 |
RCC, ISEC, IT, WBS |
2023-03-14 15:20 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Attribute-based encryption with keyword search Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 |
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] |
IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 pp.163-170 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] |
IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 pp.171-178 |
RCC, ISEC, IT, WBS |
2023-03-14 16:10 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Identity-based Matchmaking Encryption Secure against the KGC Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 |
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] |
IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 pp.179-186 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Implementation and Evaluation for Remote-Control Security System of IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67 |
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] |
ICSS2022-67 pp.115-120 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2022-68 pp.121-126 |
ISEC, SITE, LOIS |
2022-11-18 17:20 |
Online |
Online (Online) |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29 |
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] |
ISEC2022-45 SITE2022-49 LOIS2022-29 pp.92-99 |
ISEC, SITE, LOIS |
2022-11-18 17:45 |
Online |
Online (Online) |
Aggregate Entity Authentication with Group Testing Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30 |
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] |
ISEC2022-46 SITE2022-50 LOIS2022-30 pp.100-106 |
IT, ISEC, RCC, WBS |
2022-03-10 12:00 |
Online |
Online (Online) |
Bit-Labeling Optimization of BICM Systems for the Gaussian Wiretap Channel Toshiki Matsumine, Hideki Ochiai, junji shikata (Yokohama National Univ.) IT2021-98 ISEC2021-63 WBS2021-66 RCC2021-73 |
[more] |
IT2021-98 ISEC2021-63 WBS2021-66 RCC2021-73 pp.95-100 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online (Online) |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online (Online) |
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47 |
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] |
IT2020-128 ISEC2020-58 WBS2020-47 pp.104-109 |