IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIS 2023-03-02
14:10
Chiba Chiba Institute of Technology
(Primary: On-site, Secondary: Online)
Timeout ciphers based on ID-based cryptography
Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] SIS2022-45
pp.27-32
HWS, ICD 2022-10-25
15:15
Shiga
(Primary: On-site, Secondary: Online)
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve
Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] HWS2022-39 ICD2022-31
pp.52-57
VLD, HWS [detail] 2022-03-07
11:00
Online Online Attribute-based Encryption Acceleration by Pairing Engine Hardware on FPGA
Anawin Opasatian, Makoto Ikeda (EEIS, The University of Tokyo) VLD2021-80 HWS2021-57
Attribute-based Encryption (ABE) can provide fine grain access control which is suitable for a shared file system such a... [more] VLD2021-80 HWS2021-57
pp.25-30
HWS, ICD [detail] 2021-10-19
13:55
Online Online Attribute-based Encryption for File Encryption Application
Anawin Opasatian, Makoto Ikeda (The University of Tokyo) HWS2021-47 ICD2021-21
Attribute-based Encryption (ABE) allows fine grain access control in the system. In this work, we look into practical us... [more] HWS2021-47 ICD2021-21
pp.32-37
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
13:55
Online Online Memory-saving implementation of BLS12-381 Pairing-based cryptography
Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16
pp.8-13
HWS, ICD [detail] 2019-11-01
13:25
Osaka DNP Namba SS Bld. An Implementation of Tate and Ate Pairing of Embedding Degree 14
Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS2019-58 ICD2019-19
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more]
HWS2019-58 ICD2019-19
pp.7-12
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:50
Kochi Kochi University of Technology An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33
Expectations for "Advanced Cryptography" are increasing in order to enhance the security of cyber physical systems and c... [more] ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33
pp.157-162
IT, ISEC, WBS 2019-03-07
10:55
Tokyo University of Electro-Communications An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-78 ISEC2018-84 WBS2018-79
In recent years, pairing encryption has attracted attention as an encryption method to realize high-performance encrypti... [more] IT2018-78 ISEC2018-84 WBS2018-79
pp.21-26
SITE, ISEC, LOIS 2018-11-04
15:10
Fukuoka   Pairing-based Zero-Knowledge Proof of Graph Information
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) ISEC2018-79 SITE2018-57 LOIS2018-39
A network provider needs to consider a method that can disclose correct information to the system user without disclosin... [more] ISEC2018-79 SITE2018-57 LOIS2018-39
pp.87-93
HWS, ICD 2018-10-29
14:30
Osaka Kobe Univ. Umeda Intelligent Laboratory An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] HWS2018-50 ICD2018-42
pp.19-24
HWS, ICD 2018-10-29
16:25
Osaka Kobe Univ. Umeda Intelligent Laboratory Impact of Instruction Replacing Laser Fault Attack on Implementation of Pairing Computation on ARM Processor
Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2018-54 ICD2018-46
Many studies on fault attack against many software were performed under the assumption that an attacker could skip an in... [more] HWS2018-54 ICD2018-46
pp.41-46
HWS 2018-04-13
13:55
Fukuoka   Energy Evaluation of FPGA Pairing Implementation with Pipeline Modular Multiplier
Yusuke Nagahama, Daisuke Fujimoto, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2018-5
Energy consumption and latency are important features of dedicated hardware bilinear pairing calculators. However publi... [more] HWS2018-5
pp.23-28
IT, ISEC, WBS 2016-03-10
14:30
Tokyo The University of Electro-Communications A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers
Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) IT2015-116 ISEC2015-75 WBS2015-99
Bilinear Pairing is a major tool to realize advanced cryptographic functionality such as searchable encryption, aggregat... [more] IT2015-116 ISEC2015-75 WBS2015-99
pp.95-100
IT 2014-12-09
16:35
Toyama Unazuki New Otani Hotel [Invited Talk] Pairing-based cryptography with elliptic curve and vector decomposition problem
Yasuyuki Nogami (Okayama Univ.) IT2014-53
As non--symmetric public key cryptographies defined over finite field, especially extension field, elliptic curve crypto... [more] IT2014-53
pp.19-24
ICSS 2013-03-25
11:10
Kanagawa Yokohama National University Design and Implementation of Application Framework for Pairing-based Cryptography
Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] ICSS2012-59
pp.13-18
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. An ID-Based 2-Functional Proxy Cryptosystem
Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] IT2008-130 ISEC2008-188 WBS2008-143
pp.563-568
ISEC 2004-12-17
13:10
Tokyo Kikai-Shinko-Kaikan Bldg. Time-Capsule Encryption
Maki Yoshida (Osaka Univ.), Shigeo Mitsunari (u10 Networks), Toru Fujiwara (Osaka Univ.)
We have designed a new timed-release encryption, called time-capsule encryption, and implemented it. In our scheme, a ti... [more] ISEC2004-98
pp.1-5
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan