Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, LOIS |
2022-11-18 16:20 |
Online |
Online |
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25 |
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] |
ISEC2022-41 SITE2022-45 LOIS2022-25 pp.66-72 |
ISEC, SITE, LOIS |
2022-11-18 16:55 |
Online |
Online |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28 |
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] |
ISEC2022-44 SITE2022-48 LOIS2022-28 pp.85-91 |
SITE, ISEC, LOIS |
2021-11-12 13:00 |
Online |
Online |
A Revocable Anonymous Reputation System for Crowd Sensing Haruki Kobayashi, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2021-41 SITE2021-35 LOIS2021-24 |
In crowdsensing, since the data gathered by the server includes user's GPS locations and moving paths, the anonymity of ... [more] |
ISEC2021-41 SITE2021-35 LOIS2021-24 pp.1-6 |
SITE, ISEC, LOIS |
2021-11-12 13:25 |
Online |
Online |
Zero-Knowledge Proof of Isolation in Graph with Strong Secrecy Tomoki Murakami, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2021-42 SITE2021-36 LOIS2021-25 |
Network systems can be represented using graphs. What is important for a tenant is that his system is well connected (co... [more] |
ISEC2021-42 SITE2021-36 LOIS2021-25 pp.7-12 |
LOIS, ISEC, SITE |
2020-11-06 11:20 |
Online |
Online |
Speeding Up a Revocable Group Signature Scheme for Crowdsensing Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) ISEC2020-34 SITE2020-31 LOIS2020-14 |
In crowdsensing, many users carrying mobile terminals send environmental data and congestion status to the server togeth... [more] |
ISEC2020-34 SITE2020-31 LOIS2020-14 pp.13-18 |
ISEC, SITE, LOIS |
2019-11-01 13:35 |
Osaka |
Osaka Univ. |
Efficiency Improvement in Pairing-based Zero-Knowledge Proof of Graph Information Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) ISEC2019-67 SITE2019-61 LOIS2019-26 |
[more] |
ISEC2019-67 SITE2019-61 LOIS2019-26 pp.33-39 |
ISEC, SITE, LOIS |
2019-11-01 14:25 |
Osaka |
Osaka Univ. |
Implementation of Authentication Process in Crowdsensing Using a Revocable Group Signature Scheme Satoshi Namiki, Toru Nakanishi (Hiroshima Univ.) ISEC2019-69 SITE2019-63 LOIS2019-28 |
[more] |
ISEC2019-69 SITE2019-63 LOIS2019-28 pp.49-54 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) ISEC2019-22 SITE2019-16 BioX2019-14 HWS2019-17 ICSS2019-20 EMM2019-25 |
In crowdsensing, many users carrying mobile terminals send environmental data and congestion status to the server togeth... [more] |
ISEC2019-22 SITE2019-16 BioX2019-14 HWS2019-17 ICSS2019-20 EMM2019-25 pp.107-112 |
SITE, ISEC, LOIS |
2018-11-04 14:40 |
Fukuoka |
|
Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute Ryo Okishima, Toru Nakanishi (Hiroshima Univ.) ISEC2018-78 SITE2018-56 LOIS2018-38 |
In recent years, electronic identification (eID) has become widespread, and this eID is used to access buildings and appl... [more] |
ISEC2018-78 SITE2018-56 LOIS2018-38 pp.79-85 |
SITE, ISEC, LOIS |
2018-11-04 15:10 |
Fukuoka |
|
Pairing-based Zero-Knowledge Proof of Graph Information Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) ISEC2018-79 SITE2018-57 LOIS2018-39 |
A network provider needs to consider a method that can disclose correct information to the system user without disclosin... [more] |
ISEC2018-79 SITE2018-57 LOIS2018-39 pp.87-93 |
ISEC, COMP |
2017-12-21 15:50 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Security and Enhancement of a Searchable Public-key Encryption Secure against Keyword Guessing Attack Takanori Saito, Toru Nakanishi (Hiroshima Univ) ISEC2017-80 COMP2017-34 |
[more] |
ISEC2017-80 COMP2017-34 pp.51-57 |
ISEC, COMP |
2017-12-21 16:15 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Blacklistable Anonymous Credential System with Reputation Using Accumulator Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35 |
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] |
ISEC2017-81 COMP2017-35 pp.59-65 |
ISEC, COMP |
2017-12-22 09:50 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Reputation System with Confidentiality to Administrator Using Linear Homomorophic Signatures Daiki Uenoyama, Toru nakanishi (Hiroshima Univ.) ISEC2017-83 COMP2017-37 |
[more] |
ISEC2017-83 COMP2017-37 pp.75-81 |
LOIS, ISEC, SITE |
2017-11-10 14:40 |
Kyoto |
|
Accelerating Revocable Group Signature with Compact Revocation List Using Vector Commitments Yasuyuki Seita, Shahidatul Sadiah, Toru Nakanishi (Hiroshima Univ.) ISEC2017-68 SITE2017-50 LOIS2017-45 |
[more] |
ISEC2017-68 SITE2017-50 LOIS2017-45 pp.107-113 |
LOIS, ISEC, SITE |
2017-11-10 15:40 |
Kyoto |
|
An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.) ISEC2017-70 SITE2017-52 LOIS2017-47 |
Recently, services using IoT have been widespread. The IoT system is a bidirectional communication model between the dev... [more] |
ISEC2017-70 SITE2017-52 LOIS2017-47 pp.123-128 |
COMP, ISEC |
2016-12-21 09:30 |
Hiroshima |
Hiroshima University |
Improvements of Blacklistable Anonymous Credential System Using Accumulator Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2016-70 COMP2016-31 |
In current ID-based user authentication schemes, privacy issues may occur, since users’ behavior histories are collected... [more] |
ISEC2016-70 COMP2016-31 pp.1-7 |
ICD |
2016-04-15 10:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A 90nm Embedded 1T-MONOS Flash Macro for Automotive Applications with 0.07mJ/8kB Rewrite Energy and Endurance Over 100M Cycles Under Tj of 175°C Satoru Nakanishi, Hidenori Mitani, Ken Matsubara, Hiroshi Yoshida, Takashi Kono, Yasuhiko Taito, Takashi Ito, Takashi Kurafuji, Kenji Noguchi, Hideto Hidaka, Tadaaki Yamauchi (Renesas) ICD2016-15 |
A first-ever 90nm embedded 1T-MONOS Flash macro is presented to realize automotive reliability and simple process integr... [more] |
ICD2016-15 pp.77-81 |
PRMU, CNR |
2016-02-22 10:30 |
Fukuoka |
|
Moving object detection for data measured in outdoor environments using depth and photometric consistency. Atsushi Takabe, Hikari Takehara, Norihiko Kawai, Tomokazu Sato (NAIST), Satoru Nakanishi, Takashi Machida (TOYOTA Central R&D Labs.,Ink), Naokazu Yokoya (NAIST) PRMU2015-151 CNR2015-52 |
[more] |
PRMU2015-151 CNR2015-52 pp.103-108 |
LOIS, ISEC, SITE |
2015-11-06 16:45 |
Kanagawa |
Kanagawa Univ. |
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2015-47 SITE2015-34 LOIS2015-41 |
In current ID-based user authentication schemes, privacy issues may occur, since users' behavior histories are collected... [more] |
ISEC2015-47 SITE2015-34 LOIS2015-41 pp.75-80 |
ISEC |
2014-09-05 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System Shahidatul Sadiah (Okayama Univ.), Toru Nakanishi (Hiroshima Univ.), Nobuo Funabiki (Okayama Univ.) ISEC2014-50 |
An anonymous credential system on attributes allows a user to convince a service provider anonymously that he/she owns t... [more] |
ISEC2014-50 pp.21-26 |