IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2023-05-17
11:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Card-Based Single-Shuffle Protocols for Secure Multiple-Input AND and XOR Computations (from APKC 2022)
Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda (Tohoku Univ), Daiki Miyahara (UEC), Takaaki Mizuki (Tohoku Univ) ISEC2023-6
In this invited talk, we introduce the paper ``Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR... [more] ISEC2023-6
p.34
QIT
(2nd)
2022-12-09
18:15
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Secure multi-party quantum computation based on triorthogonal quantum error-correcting codes
Petr Mishchenko, Keita Xagawa (NTT)
Secure multi-party quantum computation (MPQC) protocol is a versatile tool that enables error-free distributed quantum c... [more]
ISEC 2022-05-18
15:10
Online Online [Invited Talk] A Card-Minimal Three-Input AND Protocol Using Two Shuffles (from COCOON 2021)
Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki (Tohoku Univ.), Daiki Miyahara (UEC/AIST), Takaaki Mizuki (Tohoku Univ./AIST) ISEC2022-4
In this invited talk, we introduce the paper ``A Card-Minimal Three-Input AND Protocol Using Two Shuffles'' by Raimu Isu... [more] ISEC2022-4
p.19
QIT
(2nd)
2021-11-30
17:00
Online Online Secure multi-party quantum computation based on triply-even quantum error-correcting codes
Mishchenko Petr, Xagawa Keita (NTT)
In this talk we suggest secure multi-party quantum computation based on triply-even Chalderbank-Shor-Steane (CSS) quantu... [more]
ISEC 2021-05-19
10:00
Online Online Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] ISEC2021-1
pp.1-8
ISEC 2021-05-19
11:05
Online Online [Invited Talk] Six-Card Finite-Runtime XOR Protocol with Only Random Cut (from APKC 2020)
Kodai Toyoda (Tohoku Univ.), Daiki Miyahara (Tohoku Univ./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2021-3
In this invited talk, we introduce the paper ``Six-Card Finite-Runtime XOR Protocol with Only Random Cut'' by Kodai Toyo... [more] ISEC2021-3
p.17
WBS, IT, ISEC 2021-03-05
11:20
Online Online Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] IT2020-148 ISEC2020-78 WBS2020-67
pp.219-224
IN, ICTSSL, NWS 2020-10-22
15:25
Online Online [Invited Talk] Secure Data Utilization using Multi-Party Computation
Takao Takenouchi (Digital Garage) IN2020-32
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] IN2020-32
pp.12-17
ISEC 2019-05-17
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018)
Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] ISEC2019-11
p.49
IT, ISEC, WBS 2019-03-08
14:45
Tokyo University of Electro-Communications A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more]
IT2018-111 ISEC2018-117 WBS2018-112
pp.223-228
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:15
Hokkaido Sapporo Convention Center Secure Multiparty Computation of Ranking Using a Deck of Cards
Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
(To be available after the conference date) [more] ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
pp.163-169
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] IT2017-124 ISEC2017-112 WBS2017-105
pp.121-128
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more]
IT2017-125 ISEC2017-113 WBS2017-106
pp.129-135
ISEC 2017-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] ISEC2017-42
pp.7-14
ISEC 2017-09-04
12:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-43
(To be available after the conference date) [more] ISEC2017-43
pp.15-22
ISEC 2017-05-12
10:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Note on the Numbers of Cards Required to Make Copied Commitments
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] ISEC2017-3
pp.15-22
ISEC 2016-09-02
09:45
Tokyo Kikai-Shinko-Kaikan Bldg. A Note on Secure Execution of Random Bisection Cut
Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2016-38
Using a deck of cards, we can realize a secure computation. Especially, since a random bisection cut was devised in 2009... [more] ISEC2016-38
pp.1-7
ISEC 2015-09-04
14:30
Tokyo Kikai-Shinko-Kaikan Bldg. A Scalable Multiparty Private Set Intersection
Shohei Nishida, Atsuko Miyaji (JAIST) ISEC2015-31
Both scalability and exibility become critical criteria for privacy preserving protocols in the age of Big Data. Private... [more] ISEC2015-31
pp.43-48
ISEC 2014-12-19
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Susumu Kiyoshima (NTT) ISEC2014-74
We talk about our paper that appeared in CRYPTO 2014.In that paper, we present a round-efficient black-box construction ... [more] ISEC2014-74
p.23
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:30
Hokkaido San-Refure Hakodate Privacy Preserving Conditional Disclosure II
Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13
In SCIS2012, we proposed a privacy preserving and utilization scheme, called the privacy preserving conditional disclosu... [more] ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13
pp.25-30
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan