Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, LOIS, ISEC |
2024-11-14 14:00 |
Fukuoka |
(Fukuoka) |
Design of an Educational Data Management System on Blockchain Utilizing Signatures with Limited Verifiers Yudai Hata, Kouichi Sakurai (Kyushu Univ.) ISEC2024-69 SITE2024-66 LOIS2024-33 |
At SCIS2023, a system was proposed for handling sensitive information, such as educational data, on blockchain. However,... [more] |
ISEC2024-69 SITE2024-66 LOIS2024-33 pp.43-49 |
COMP, IPSJ-AL |
2024-09-05 16:00 |
Hiroshima |
Hiroshima Institute of Technology (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
Zero-Knowledge Proof Protocol Using Cards for Stained-Glass Puzzles Soya Yoshizuka (QU), Chuzo Iwamoto (HU), Kouichi Sakurai (QU) COMP2024-11 |
[more] |
COMP2024-11 pp.8-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:05 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Framing Fraud in Secret Sharing Scheme and its Countermeasure
-- Current status and challenging issues -- Kouichi Sakurai (Kyushu Univ.) ISEC2024-31 SITE2024-28 BioX2024-41 HWS2024-31 ICSS2024-35 EMM2024-37 |
[more] |
ISEC2024-31 SITE2024-28 BioX2024-41 HWS2024-31 ICSS2024-35 EMM2024-37 pp.155-157 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Research Directions in Formal Verification of Transport Layer Security Protocols Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR) IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103 |
The TLS protocol is used to secure communications between web servers and clients, and is essential for security: it all... [more] |
IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103 pp.287-293 |
RCC, ISEC, IT, WBS |
2023-03-15 14:15 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token Kouichi Sakurai (Kyushu Univ.) IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127 |
[more] |
IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127 pp.393-397 |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Kochi, Online) (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
SITE, ISEC, LOIS |
2021-11-12 14:25 |
Online |
Online (Online) |
A theory of designing two factor authentications: Google’s FIDO/U2F as an example Kouichi Sakurai (Kyushu Univ.) ISEC2021-44 SITE2021-38 LOIS2021-27 |
[more] |
ISEC2021-44 SITE2021-38 LOIS2021-27 pp.18-19 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:25 |
Online |
Online (Online) |
Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function Kei Ikebe, Kouichi Sakurai (Kyushu Univ.) ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41 |
Cryptocurrencies are searching for solutions to difficult-to-calculate problems called mining when conducting transactio... [more] |
ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41 pp.161-166 |
WBS, IT, ISEC |
2021-03-05 09:25 |
Online |
Online (Online) |
Construction of non-malleable codes based on graph theory Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.) IT2020-144 ISEC2020-74 WBS2020-63 |
Non-malleable codes protect communications against adversarial tampering of data, which can be seen as a relaxation of e... [more] |
IT2020-144 ISEC2020-74 WBS2020-63 pp.195-200 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online (Online) |
Consideration on the mechanism of identifying and tracking Bitcoin users Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44 |
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] |
ICSS2020-44 pp.108-113 |
IT |
2020-12-03 11:40 |
Online |
Online (Online) |
Introduction on Information Theory and Its Applications at Tel Aviv University
-- Class of "Codes and Sequences" for Graduate Students -- Kouichi Sakurai, YuJie GU (Kyushu Univ.) IT2020-51 |
[more] |
IT2020-51 pp.146-147 |
ISEC |
2020-05-20 14:40 |
Online |
Online (Online) |
Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions
-- Serial Concatenation and Parallel Concatenation -- Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.) ISEC2020-9 |
In Bitcoin, the computational problem which miners should solve is
an equation described in the term of a hash functio... [more] |
ISEC2020-9 pp.33-40 |
COMP, IPSJ-AL |
2020-05-09 09:30 |
Online |
Online (Online) |
On Power and limitation of adversarial example attacks Kouichi Sakurai (Kyushu Univ.) COMP2020-5 |
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] |
COMP2020-5 pp.33-36 |
ISEC, SITE, LOIS |
2019-11-02 10:00 |
Osaka |
Osaka Univ. (Osaka) |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35 |
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more] |
ISEC2019-76 SITE2019-70 LOIS2019-35 pp.93-98 |
IT, ISEC, WBS |
2019-03-08 12:05 |
Tokyo |
University of Electro-Communications (Tokyo) |
Secret Sharing on Evolving Multi-level Access Structure Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122 |
[more] |
IT2018-121 ISEC2018-127 WBS2018-122 pp.281-284 |
SITE, ISEC, LOIS |
2018-11-03 12:00 |
Fukuoka |
(Fukuoka) |
Computationally-independent pair of one-way functions in presence of leakage Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.) ISEC2018-66 SITE2018-44 LOIS2018-26 |
[more] |
ISEC2018-66 SITE2018-44 LOIS2018-26 pp.13-18 |
SITE, ISEC, LOIS |
2018-11-03 12:30 |
Fukuoka |
(Fukuoka) |
Secret sharing of color images: An algebraic approach Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.) ISEC2018-67 SITE2018-45 LOIS2018-27 |
[more] |
ISEC2018-67 SITE2018-45 LOIS2018-27 pp.19-24 |
EMM, IT |
2017-05-23 11:55 |
Yamagata |
Yamagata University(Yonezawa Campus) (Yamagata) |
Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12 |
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] |
IT2017-12 EMM2017-12 pp.67-72 |
ICSS, IPSJ-SPT |
2017-03-13 14:50 |
Nagasaki |
University of Nagasaki (Nagasaki) |
A Brief Review on Anomaly Detection and its Applications to Cybersecurity Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) ICSS2016-50 |
[more] |
ICSS2016-50 pp.37-42 |
ICSS, IPSJ-SPT |
2017-03-14 12:20 |
Nagasaki |
University of Nagasaki (Nagasaki) |
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69 |
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] |
ICSS2016-69 pp.177-182 |