Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 |
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] |
ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 pp.45-51 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online (Online) |
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81 |
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] |
ICSS2021-81 pp.135-140 |
ISEC |
2021-05-19 15:00 |
Online |
Online (Online) |
[Invited Talk]
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020) Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8 |
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] |
ISEC2021-8 p.33 |
AP, SANE, SAT (Joint) |
2020-07-15 15:05 |
Online |
Online (Online) |
Numerical investigation on the application of polar codes to free-space quantum key distribution Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5 |
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] |
SAT2020-5 pp.13-18 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 10:40 |
Osaka |
I-Site Nanba(Osaka) (Osaka) |
[Poster Presentation]
A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 |
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] |
RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI) |
CPSY, DC, IPSJ-ARC (Joint) [detail] |
2018-07-30 18:30 |
Kumamoto |
Kumamoto City International Center (Kumamoto) |
DC2018-18 |
Wireless sensor networks (hereinafter, referred to as WSNs) are susceptible to eavesdrop, since a sensor node utilizes w... [more] |
DC2018-18 pp.27-32 |
IT |
2016-07-28 12:05 |
Fukuoka |
Seminar House, Fukuoka Univ. (Fukuoka) |
Polar coding for bidirectional broadcast channel with non-binary output alphabets Akinori Inaba, Hideki Yagi (Univ. of Electro-Comm.) IT2016-24 |
The bidirectional broadcast channel:(BBC), one of the many-to-many communication channels, has a bidirectional relaying ... [more] |
IT2016-24 pp.19-24 |
AP |
2015-05-21 14:00 |
Nara |
Naraken Shakai Fukushi Sougou Center (Kashihara City) (Nara) |
[Tutorial Lecture]
Information Security at Physical Layer Based on Radio Propagation Characteristics Hideichi Sasaoka (Doshisha Univ.) AP2015-21 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
AP2015-21 pp.13-18 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity (Okinawa) |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
NS, IN (Joint) |
2015-03-02 09:30 |
Okinawa |
Okinawa Convention Center (Okinawa) |
A Multipath Routing Method for Secure Dispersed Data Transfer Method to Consider Varying Node Density in Ad Hoc Networks Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) NS2014-177 |
In ad hoc networks utilizing wireless multi-hop communication functions, two or more nodes can communicate with each oth... [more] |
NS2014-177 pp.7-12 |
NS, IN (Joint) |
2014-03-07 08:50 |
Miyazaki |
Miyazaki Seagia (Miyazaki) |
A method for effective routing protocol deployment in Quantum Key Distribution network systems Yoshimichi Tanizawa, Ririka Takahashi, Alexander R. Dixon (Toshiba) IN2013-159 |
Quantum Key Distribution (QKD) is a technique to share encryption keys between two adjacent nodes in an unconditionally ... [more] |
IN2013-159 pp.95-99 |
LOIS |
2013-03-07 14:50 |
Okinawa |
(Okinawa) |
Improved Algorithms for Computing Relational Algebra Operators for Secure Function Evaluation Koki Hamada, Dai Ikarashi, Koji Chida (NTT) LOIS2012-82 |
We propose algorithms that efficiently computes relational algebra operations over secure function evaluation. Relationa... [more] |
LOIS2012-82 pp.77-82 |
NS, IN (Joint) |
2013-03-07 10:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel (Okinawa) |
On multipath routing method to reduce the number of bottleneck nodes for secure dispersed data transfer in ad hoc networks Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) IN2012-162 |
Ad hoc networks are autonomous distributed networks without the fixed communication infrastructures such as base station... [more] |
IN2012-162 pp.47-52 |
EMM |
2013-01-30 13:30 |
Miyagi |
Tohoku Univ. (Miyagi) |
Speech Encryption Method Using Speech Segments for Speech Synthesis Minoru Kohata (Chiba Institute of Tech.) EMM2012-103 |
The risk of speech tapping by decryption attack has increased as a result of the increasing availability ofimmense compu... [more] |
EMM2012-103 pp.71-76 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 14:45 |
Hokkaido |
(Hokkaido) |
A Batch Mapping Algorithm for Secure Function Evaluation Koki Hamada, Dai Ikarashi, Koji Chida (NTT) ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 |
We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function ev... [more] |
ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 pp.195-199 |
EMM |
2012-03-16 10:00 |
Osaka |
(Osaka) |
Secure Speech Coding Method Using Speech Synthesis Minoru Kohata (Chiba Insutitute of Tech.) EMM2011-66 |
Several analog speech encryption methods were proposed so far. Nowadays, most of speech encryptionsystems employs digita... [more] |
EMM2011-66 pp.13-18 |
NLP |
2011-12-15 13:50 |
Aomori |
Iwaki Hall AB, Hirosaki Univ. (Aomori) |
Applicability of Augmented Lorenz Equations to Chaos-Based Secure Communications Kenichiro Cho, Takaya Miyano (Ritsumeikan Univ.) NLP2011-119 |
We have developed a chaotic gas turbine which simulates the dynamical behavior of turbulent Rayleigh-Bénard conve... [more] |
NLP2011-119 pp.13-18 |
RCS |
2011-06-23 11:50 |
Okinawa |
Ryukyu Univ. (Okinawa) |
Personal modulation Eiji Okamoto (Nagoya Inst. Tech.) RCS2011-43 |
In this paper, we propose a use of the modulation as a personal identification in wireless communications. In multi-hop ... [more] |
RCS2011-43 pp.49-54 |
RCS |
2011-04-21 16:05 |
Kanagawa |
Keio University (Kanagawa) |
[Invited Talk]
Information Security in Wireless Communication at Physical Layer Based on Radio Propagation Hideichi Sasaoka (Doshisha Univ.) RCS2011-10 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
RCS2011-10 pp.53-58 |
ISEC, IT, WBS |
2011-03-03 13:00 |
Osaka |
Osaka University (Osaka) |
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
IT2010-72 ISEC2010-76 WBS2010-51 pp.31-36 |