IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 64  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
pp.87-93
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
pp.91-96
RCC, ISEC, IT, WBS 2023-03-14
09:00
Yamaguchi
(Primary: On-site, Secondary: Online)
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication -- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication --
Masaaki Shirase (FUN) IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69
The 2nd-Me scalar multiple $P_{n,Z}^{II}$ can be defined
for points $P,Z in E(F_p)$ of an elliptic curve over a finite... [more]
IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69
pp.25-32
RCC, ISEC, IT, WBS 2023-03-14
11:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields
Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75
Debris-Alazard, Sendrier, and Tillich proposed SURF in 2017, which is an efficient code-based signature scheme. However,... [more] IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75
pp.68-73
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] ISEC2022-45 SITE2022-49 LOIS2022-29
pp.92-99
IT, ISEC, RCC, WBS 2022-03-10
10:30
Online Online Threshold Signature Scheme Suitable for a Short Message
Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65
pp.42-49
ICSS, IPSJ-SPT 2022-03-08
11:20
Online Online A Method for Content Rights Succession and Editing Control Extended to Multi-dimensional Mesh Structures
Shinjiro Izumi (TUS), Masaki Inamura (Hiroshima City Univ.), Keiichi Iwamura (TUS) ICSS2021-71
In recent years, the CGM media, which is created and distributed by consumers themselves, has become popular, such as Yo... [more] ICSS2021-71
pp.72-77
WBS, IT, ISEC 2021-03-05
10:55
Online Online Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] IT2020-147 ISEC2020-77 WBS2020-66
pp.213-218
HWS, VLD [detail] 2021-03-04
14:15
Online Online Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips
Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] VLD2020-85 HWS2020-60
pp.97-101
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
16:10
Online Online Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation
Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
pp.53-60
ISEC, IT, WBS 2020-03-10
15:35
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Improved Threshold Signature with Anonymity
Takuya Inomoto, Atsuko Miyaji (Osaka Univ.) IT2019-97 ISEC2019-93 WBS2019-46
Today, we can exchange information at remote locations via the Internet. It is very important to distinguish whether or ... [more] IT2019-97 ISEC2019-93 WBS2019-46
pp.51-58
EMM 2020-03-05
14:25
Okinawa
(Cancelled but technical report was issued)
[Poster Presentation] Proposal of BSS-based video watermarking method using similarity between frames
Akane Yokota, Masaki Kawamura (Yamaguchi Univ.) EMM2019-105
Movies are composed of sequential still images, and similarity between consecutive frames is very high. 
In this work, w... [more] EMM2019-105
pp.19-24
HWS, VLD 2019-03-02
10:25
Okinawa Okinawa Ken Seinen Kaikan ASIC Chip Implementation and Evaluation of Elliptic Curve Digital Signature Algorithm
Sosuke Sato, Hiroki Yoshida, Kazuki Monta (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2018-138 HWS2018-101
We have designed and fabricated application specific semiconductor integrated circuit (ASIC) chips that embody the gener... [more] VLD2018-138 HWS2018-101
pp.267-269
ISEC 2018-05-16
10:00
Tokyo Ookayama Campus, Tokyo Institute of Technology Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature
Masaaki Shirase (FUN) ISEC2018-1
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] ISEC2018-1
pp.1-8
LOIS, IPSJ-SPT, IPSJ-CN 2016-05-12
13:30
Tokyo   A study on utilizing the Public Certification Service for Individuals in the qualification of medical insurance
Kenichi Fukuda, Takashi Obi, Kazuyuki Nagata, Hiroyuki Suzuki, Naoko Taira, Nagaaki Ohyama (Tokyo Tech) LOIS2016-1
With the introduction of the Social Security and Tax Number System, the Public Certification Service for Individuals(JPK... [more] LOIS2016-1
pp.1-6
IT, ISEC, WBS 2016-03-11
10:00
Tokyo The University of Electro-Communications Reconsideration of Fail-Stop Signature Schemes and Their UC-Security
Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] IT2015-131 ISEC2015-90 WBS2015-114
pp.181-188
EMM 2016-03-02
15:40
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] Copyright Protection Scheme to Realize Edit Control between Two or More contents
Tatsuya Fujimoto, Keiichi Iwamura (TUS) EMM2015-84
We propose a new copyright protection technology suitable for editable contents, in contrast the conventional copyright ... [more] EMM2015-84
pp.45-50
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
LOIS 2015-03-06
11:10
Okinawa   A study on the possibility of utilizing the Public Certification Service for Individuals in the field of finance or credit settlement.
Kazushige Fujita, Takashi Obi, Masuyoshi Yachida, Joong Sun Lee, Naoko Taira, Makoto Oku, Eikazu Niwano, Satoshi Noritake, Kenichi Fukuda, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Tech) LOIS2014-84
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] LOIS2014-84
pp.135-140
 Results 1 - 20 of 64  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan