Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIS |
2023-03-02 14:10 |
Chiba |
Chiba Institute of Technology (Primary: On-site, Secondary: Online) |
Timeout ciphers based on ID-based cryptography Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45 |
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] |
SIS2022-45 pp.27-32 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
VLD, HWS [detail] |
2022-03-07 11:00 |
Online |
Online |
Attribute-based Encryption Acceleration by Pairing Engine Hardware on FPGA Anawin Opasatian, Makoto Ikeda (EEIS, The University of Tokyo) VLD2021-80 HWS2021-57 |
Attribute-based Encryption (ABE) can provide fine grain access control which is suitable for a shared file system such a... [more] |
VLD2021-80 HWS2021-57 pp.25-30 |
HWS, ICD [detail] |
2021-10-19 13:55 |
Online |
Online |
Attribute-based Encryption for File Encryption Application Anawin Opasatian, Makoto Ikeda (The University of Tokyo) HWS2021-47 ICD2021-21 |
Attribute-based Encryption (ABE) allows fine grain access control in the system. In this work, we look into practical us... [more] |
HWS2021-47 ICD2021-21 pp.32-37 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
HWS, ICD [detail] |
2019-11-01 13:25 |
Osaka |
DNP Namba SS Bld. |
An Implementation of Tate and Ate Pairing of Embedding Degree 14 Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS2019-58 ICD2019-19 |
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more] |
HWS2019-58 ICD2019-19 pp.7-12 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:50 |
Kochi |
Kochi University of Technology |
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 |
Expectations for "Advanced Cryptography" are increasing in order to enhance the security of cyber physical systems and c... [more] |
ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 pp.157-162 |
IT, ISEC, WBS |
2019-03-07 10:55 |
Tokyo |
University of Electro-Communications |
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-78 ISEC2018-84 WBS2018-79 |
In recent years, pairing encryption has attracted attention as an encryption method to realize high-performance encrypti... [more] |
IT2018-78 ISEC2018-84 WBS2018-79 pp.21-26 |
SITE, ISEC, LOIS |
2018-11-04 15:10 |
Fukuoka |
|
Pairing-based Zero-Knowledge Proof of Graph Information Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) ISEC2018-79 SITE2018-57 LOIS2018-39 |
A network provider needs to consider a method that can disclose correct information to the system user without disclosin... [more] |
ISEC2018-79 SITE2018-57 LOIS2018-39 pp.87-93 |
HWS, ICD |
2018-10-29 14:30 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42 |
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] |
HWS2018-50 ICD2018-42 pp.19-24 |
HWS, ICD |
2018-10-29 16:25 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Impact of Instruction Replacing Laser Fault Attack on Implementation of Pairing Computation on ARM Processor Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2018-54 ICD2018-46 |
Many studies on fault attack against many software were performed under the assumption that an attacker could skip an in... [more] |
HWS2018-54 ICD2018-46 pp.41-46 |
HWS |
2018-04-13 13:55 |
Fukuoka |
|
Energy Evaluation of FPGA Pairing Implementation with Pipeline Modular Multiplier Yusuke Nagahama, Daisuke Fujimoto, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2018-5 |
Energy consumption and latency are important features of dedicated hardware bilinear pairing calculators. However publi... [more] |
HWS2018-5 pp.23-28 |
IT, ISEC, WBS |
2016-03-10 14:30 |
Tokyo |
The University of Electro-Communications |
A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) IT2015-116 ISEC2015-75 WBS2015-99 |
Bilinear Pairing is a major tool to realize advanced cryptographic functionality such as searchable encryption, aggregat... [more] |
IT2015-116 ISEC2015-75 WBS2015-99 pp.95-100 |
IT |
2014-12-09 16:35 |
Toyama |
Unazuki New Otani Hotel |
[Invited Talk]
Pairing-based cryptography with elliptic curve and vector decomposition problem Yasuyuki Nogami (Okayama Univ.) IT2014-53 |
As non--symmetric public key cryptographies defined over finite field, especially extension field, elliptic curve crypto... [more] |
IT2014-53 pp.19-24 |
ICSS |
2013-03-25 11:10 |
Kanagawa |
Yokohama National University |
Design and Implementation of Application Framework for Pairing-based Cryptography Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59 |
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] |
ICSS2012-59 pp.13-18 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
An ID-Based 2-Functional Proxy Cryptosystem Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143 |
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] |
IT2008-130 ISEC2008-188 WBS2008-143 pp.563-568 |
ISEC |
2004-12-17 13:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Time-Capsule Encryption Maki Yoshida (Osaka Univ.), Shigeo Mitsunari (u10 Networks), Toru Fujiwara (Osaka Univ.) |
We have designed a new timed-release encryption, called time-capsule encryption, and implemented it. In our scheme, a ti... [more] |
ISEC2004-98 pp.1-5 |