IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 47  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2024-05-15
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023)
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
11:35
Osaka Osaka Univ. (Suita Campus) Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
pp.52-59
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
ICSS 2023-11-16
13:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2023-51
pp.1-6
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:40
Hokkaido Hokkaido Jichiro Kaikan Hierarchical Identity-based Matchmaking Encryption
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23
pp.60-67
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
17:20
Hokkaido Hokkaido Jichiro Kaikan An Identity-based Signature Scheme with Tight Security Reduction
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29
pp.97-104
RCC, ISEC, IT, WBS 2023-03-14
13:00
Yamaguchi
(Primary: On-site, Secondary: Online)
Multi-Authority Attribute Based Signatures from Lattice
Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86
We construct Multi-Authority Attribute-Based Signatures (MA-ABS) based on lattices. Our scheme is the first scheme that ... [more] IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86
pp.127-134
RCC, ISEC, IT, WBS 2023-03-14
15:20
Yamaguchi
(Primary: On-site, Secondary: Online)
Attribute-based encryption with keyword search
Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91
pp.163-170
RCC, ISEC, IT, WBS 2023-03-14
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Claimable Designated Verifier Signature
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
pp.171-178
RCC, ISEC, IT, WBS 2023-03-14
16:10
Yamaguchi
(Primary: On-site, Secondary: Online)
Identity-based Matchmaking Encryption Secure against the KGC
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93
pp.179-186
ICSS, IPSJ-SPT 2023-03-13
16:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Implementation and Evaluation for Remote-Control Security System of IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] ICSS2022-67
pp.115-120
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2022-68
pp.121-126
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] ISEC2022-45 SITE2022-49 LOIS2022-29
pp.92-99
ISEC, SITE, LOIS 2022-11-18
17:45
Online Online Aggregate Entity Authentication with Group Testing
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] ISEC2022-46 SITE2022-50 LOIS2022-30
pp.100-106
IT, ISEC, RCC, WBS 2022-03-10
12:00
Online Online Bit-Labeling Optimization of BICM Systems for the Gaussian Wiretap Channel
Toshiki Matsumine, Hideki Ochiai, junji shikata (Yokohama National Univ.) IT2021-98 ISEC2021-63 WBS2021-66 RCC2021-73
 [more] IT2021-98 ISEC2021-63 WBS2021-66 RCC2021-73
pp.95-100
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] IT2020-128 ISEC2020-58 WBS2020-47
pp.104-109
WBS, IT, ISEC 2021-03-05
09:00
Online Online Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] IT2020-143 ISEC2020-73 WBS2020-62
pp.187-194
WBS, IT, ISEC 2021-03-05
10:55
Online Online Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] IT2020-147 ISEC2020-77 WBS2020-66
pp.213-218
 Results 1 - 20 of 47  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan