Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] |
IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 pp.97-102 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 10:55 |
Online |
Online |
Hybrid Multiplicative Secret Sharing Maki Yoshida (NICT) ISEC2021-32 SITE2021-26 BioX2021-33 HWS2021-32 ICSS2021-37 EMM2021-37 |
[more] |
ISEC2021-32 SITE2021-26 BioX2021-33 HWS2021-32 ICSS2021-37 EMM2021-37 pp.136-140 |
EMM, IT |
2015-05-22 11:05 |
Kyoto |
Kyoto International Community House |
[Invited Talk]
Trade-off between resiliency and efficiency of cryptographic protocols
-- The case of information theoretical security -- Maki Yoshida (NICT) IT2015-13 EMM2015-13 |
[more] |
IT2015-13 EMM2015-13 pp.69-74 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
Relations of Compression Ratio and the Most Suitable Parameter of Additive Watermarking under the IHC Criteria Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2014-91 |
In this paper, we show relations of the compression ratio and the optimum parameter, which maximizes the performance of ... [more] |
EMM2014-91 pp.85-90 |
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] |
2014-09-18 16:55 |
Kochi |
|
Performance Evaluation of Additive Watermarking under the Highest Image Quality Category of the IHC Watermark Competition Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) LOIS2014-23 IE2014-36 EMM2014-53 |
In this paper, we show that the additive watermarking scheme satisfies the evaluation criteria ver.3 developed by IEICE-... [more] |
LOIS2014-23 IE2014-36 EMM2014-53 pp.53-58 |
EMM |
2014-03-08 10:30 |
Ishikawa |
JAIST |
Performance Evaluation of Additive Watermarking under the IHC Criteria Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2013-113 |
In this paper, the performance of additive watermarking scheme is evaluated on the criteria developed by the IEICE-ISS I... [more] |
EMM2013-113 pp.81-86 |
EMM |
2013-01-30 14:10 |
Miyagi |
Tohoku Univ. |
Theoretical Performance Analysis of Hybrid Additive-Multiplicative Watermarking Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) EMM2012-104 |
An important issue of robust watermarking for image is to achieve a better tradeoff between the quality of watermarked i... [more] |
EMM2012-104 pp.77-82 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 10:55 |
Hokkaido |
|
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 |
[more] |
ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 pp.9-16 |
ISEC, LOIS |
2011-11-15 14:15 |
Osaka |
Osaka Electro-Communication University |
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-57 LOIS2011-51 |
A protocol is said to be EUC secure if it can be securely
composed with arbitrary protocols which use the same setup. ... [more] |
ISEC2011-57 LOIS2011-51 pp.155-162 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 13:55 |
Shizuoka |
Shizuoka University |
Recovery of Tampered Pixels for Statistical Fragile Watermarking Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.) ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9 |
[more] |
ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9 pp.7-12 |
ISEC |
2011-05-13 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Impossibility of $d$-Multiplicative Non-perfect Secret Sharing Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-5 |
[more] |
ISEC2011-5 pp.31-36 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Symbolic Criterion for EUC Secure Authentication against Static Adversary Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) IT2010-129 ISEC2010-133 WBS2010-108 |
EUC secure protocol maintains its security even when it is composed and shares public information with arbitrary protoco... [more] |
IT2010-129 ISEC2010-133 WBS2010-108 pp.403-410 |
ISEC, LOIS |
2010-11-17 16:55 |
Ibaraki |
Tsukuba Univ. |
Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) ISEC2010-58 LOIS2010-37 |
The computational hardness of number-theoretic problems used in
cryptography is generally proved in a generic model of ... [more] |
ISEC2010-58 LOIS2010-37 pp.57-64 |
ISEC, LOIS |
2007-11-21 14:45 |
Hyogo |
Kobe University |
Anonymous Fingerprinting for Predelivery of Contents Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64 |
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] |
ISEC2007-92 OIS2007-64 pp.23-30 |
IT |
2006-05-24 15:55 |
Nara |
Nara-ken new public hall |
Authenticated Key Encapsulation Using Signatures Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
[more] |
IT2006-11 pp.23-28 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:10 |
Iwate |
Iwate Prefectural University |
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.) |
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more] |
ISEC2005-61 pp.129-136 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:00 |
Iwate |
Iwate Prefectural University |
Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
To use results of watermark detection, a detection error probability is
required to be low enough.
We have derived ... [more] |
ISEC2005-65 pp.155-160 |
IT |
2005-05-27 13:50 |
Overseas |
Univ. of Hawaii |
A Time-Limited Key Management Scheme Based on a One-Way Permutatin Tree Maki Yoshida (Osaka Univ.), Yuichi Kaji (NAIST), Toru Fujiwara (Osaka Univ.) |
[more] |
IT2005-29 pp.41-46 |
ISEC |
2004-12-17 13:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Time-Capsule Encryption Maki Yoshida (Osaka Univ.), Shigeo Mitsunari (u10 Networks), Toru Fujiwara (Osaka Univ.) |
We have designed a new timed-release encryption, called time-capsule encryption, and implemented it. In our scheme, a ti... [more] |
ISEC2004-98 pp.1-5 |
ISEC, LOIS |
2004-11-09 09:50 |
Osaka |
Osaka Univ. |
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] |
ISEC2004-87 OIS2004-54 pp.15-22 |