Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-15 14:15 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token Kouichi Sakurai (Kyushu Univ.) IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127 |
[more] |
IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127 pp.393-397 |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
SITE, ISEC, LOIS |
2021-11-12 14:25 |
Online |
Online |
A theory of designing two factor authentications: Google’s FIDO/U2F as an example Kouichi Sakurai (Kyushu Univ.) ISEC2021-44 SITE2021-38 LOIS2021-27 |
[more] |
ISEC2021-44 SITE2021-38 LOIS2021-27 pp.18-19 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:25 |
Online |
Online |
Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function Kei Ikebe, Kouichi Sakurai (Kyushu Univ.) ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41 |
Cryptocurrencies are searching for solutions to difficult-to-calculate problems called mining when conducting transactio... [more] |
ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41 pp.161-166 |
WBS, IT, ISEC |
2021-03-05 09:25 |
Online |
Online |
Construction of non-malleable codes based on graph theory Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.) IT2020-144 ISEC2020-74 WBS2020-63 |
Non-malleable codes protect communications against adversarial tampering of data, which can be seen as a relaxation of e... [more] |
IT2020-144 ISEC2020-74 WBS2020-63 pp.195-200 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Consideration on the mechanism of identifying and tracking Bitcoin users Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44 |
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] |
ICSS2020-44 pp.108-113 |
IT |
2020-12-03 11:40 |
Online |
Online |
Introduction on Information Theory and Its Applications at Tel Aviv University
-- Class of "Codes and Sequences" for Graduate Students -- Kouichi Sakurai, YuJie GU (Kyushu Univ.) IT2020-51 |
[more] |
IT2020-51 pp.146-147 |
ISEC |
2020-05-20 14:40 |
Online |
Online |
Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions
-- Serial Concatenation and Parallel Concatenation -- Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.) ISEC2020-9 |
In Bitcoin, the computational problem which miners should solve is
an equation described in the term of a hash functio... [more] |
ISEC2020-9 pp.33-40 |
COMP, IPSJ-AL |
2020-05-09 09:30 |
Online |
Online |
On Power and limitation of adversarial example attacks Kouichi Sakurai (Kyushu Univ.) COMP2020-5 |
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] |
COMP2020-5 pp.33-36 |
ISEC, SITE, LOIS |
2019-11-02 10:00 |
Osaka |
Osaka Univ. |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35 |
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more] |
ISEC2019-76 SITE2019-70 LOIS2019-35 pp.93-98 |
IT, ISEC, WBS |
2019-03-08 12:05 |
Tokyo |
University of Electro-Communications |
Secret Sharing on Evolving Multi-level Access Structure Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122 |
[more] |
IT2018-121 ISEC2018-127 WBS2018-122 pp.281-284 |
SITE, ISEC, LOIS |
2018-11-03 12:00 |
Fukuoka |
|
Computationally-independent pair of one-way functions in presence of leakage Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.) ISEC2018-66 SITE2018-44 LOIS2018-26 |
[more] |
ISEC2018-66 SITE2018-44 LOIS2018-26 pp.13-18 |
SITE, ISEC, LOIS |
2018-11-03 12:30 |
Fukuoka |
|
Secret sharing of color images: An algebraic approach Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.) ISEC2018-67 SITE2018-45 LOIS2018-27 |
[more] |
ISEC2018-67 SITE2018-45 LOIS2018-27 pp.19-24 |
EMM, IT |
2017-05-23 11:55 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12 |
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] |
IT2017-12 EMM2017-12 pp.67-72 |
ICSS, IPSJ-SPT |
2017-03-13 14:50 |
Nagasaki |
University of Nagasaki |
A Brief Review on Anomaly Detection and its Applications to Cybersecurity Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) ICSS2016-50 |
[more] |
ICSS2016-50 pp.37-42 |
ICSS, IPSJ-SPT |
2017-03-14 12:20 |
Nagasaki |
University of Nagasaki |
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69 |
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] |
ICSS2016-69 pp.177-182 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 11:10 |
Yamaguchi |
|
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] |
ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 pp.137-143 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Current Status and Issues of the Application of AI Technology for Digital Forensics Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.) |
[more] |
|
LOIS, ISEC, SITE |
2015-11-07 10:55 |
Kanagawa |
Kanagawa Univ. |
Extension of NTRU Using Group Ring and Its Application Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46 |
[more] |
ISEC2015-52 SITE2015-39 LOIS2015-46 pp.103-109 |