IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 62  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS, ICD 2024-02-29
16:20
Okinawa
(Primary: On-site, Secondary: Online)
[Memorial Lecture] Logic Locking over TFHE for Securing User Data and Algorithms
Kohei Suemitsu, Kotaro Matsuoka, Takashi Sato, Masanori Hashimoto (Kyoto Univ.) VLD2023-118 HWS2023-78 ICD2023-107
This paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input u... [more] VLD2023-118 HWS2023-78 ICD2023-107
p.100
LOIS, SITE, ISEC 2023-11-09
12:40
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] ISEC2023-55 SITE2023-49 LOIS2023-13
pp.2-9
PN 2023-08-29
15:40
Hokkaido
(Primary: On-site, Secondary: Online)
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis
Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] PN2023-24
pp.40-46
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:00
Hokkaido Hokkaido Jichiro Kaikan Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
pp.45-51
ISEC 2023-05-17
11:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Card-Based Single-Shuffle Protocols for Secure Multiple-Input AND and XOR Computations (from APKC 2022)
Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda (Tohoku Univ), Daiki Miyahara (UEC), Takaaki Mizuki (Tohoku Univ) ISEC2023-6
In this invited talk, we introduce the paper ``Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR... [more] ISEC2023-6
p.34
QIT
(2nd)
2022-12-09
18:15
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Secure multi-party quantum computation based on triorthogonal quantum error-correcting codes
Petr Mishchenko, Keita Xagawa (NTT)
Secure multi-party quantum computation (MPQC) protocol is a versatile tool that enables error-free distributed quantum c... [more]
HWS, ICD 2022-10-25
14:50
Shiga
(Primary: On-site, Secondary: Online)
Design and Prototype Evaluation of Stochastic Encrypted Computing Hardware
Yuki Tamura, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2022-38 ICD2022-30
This paper describes the design and evaluation of Homomorphic Encryption for
Stochastic Computing (HESC) hardware.HESC ... [more]
HWS2022-38 ICD2022-30
pp.46-51
ISEC 2022-05-18
15:10
Online Online [Invited Talk] A Card-Minimal Three-Input AND Protocol Using Two Shuffles (from COCOON 2021)
Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki (Tohoku Univ.), Daiki Miyahara (UEC/AIST), Takaaki Mizuki (Tohoku Univ./AIST) ISEC2022-4
In this invited talk, we introduce the paper ``A Card-Minimal Three-Input AND Protocol Using Two Shuffles'' by Raimu Isu... [more] ISEC2022-4
p.19
VLD, HWS [detail] 2022-03-07
11:50
Online Online An efficient scheme of homomorphic encryption for stochastic computing and its performance evaluation
Ryusuke Koseki, Rei Ueno, Akira Ito, Naofumi Homma (Tohoku Univ.) VLD2021-82 HWS2021-59
This paper describes how to improve the efficiency of Homomorphic Encryption for Stochastic Computing (HESC) and its per... [more] VLD2021-82 HWS2021-59
pp.37-42
EMM 2022-03-08
11:50
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
RUT Computation of Gaussian Process Regression for Encrypting Input and Output Signals
Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) EMM2021-115
n this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfor... [more] EMM2021-115
pp.124-129
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] ICSS2021-81
pp.135-140
QIT
(2nd)
2021-11-30
17:00
Online Online Secure multi-party quantum computation based on triply-even quantum error-correcting codes
Mishchenko Petr, Xagawa Keita (NTT)
In this talk we suggest secure multi-party quantum computation based on triply-even Chalderbank-Shor-Steane (CSS) quantu... [more]
SIS, IPSJ-AVM 2021-06-24
13:45
Online Online Privacy-Preserving Secure Computation of Gaussian Process Regression -- Find patterns and rules from encrypted data --
Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) SIS2021-8
In this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfo... [more] SIS2021-8
pp.43-48
EMM, IT 2021-05-20
16:10
Online Online [Invited Talk] Secure Computation of Sparse Modeling -- Edge AI with Lightweight and Small Amounts of Data --
Takayuki Nakachi (Univ. of the Ryukyus) IT2021-6 EMM2021-6
With the advent of the big data, IoT, AI era, all digital contents continue to increase. Sparse modeling is drawing atte... [more] IT2021-6 EMM2021-6
pp.31-36
ISEC 2021-05-19
10:00
Online Online Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] ISEC2021-1
pp.1-8
ISEC 2021-05-19
11:05
Online Online [Invited Talk] Six-Card Finite-Runtime XOR Protocol with Only Random Cut (from APKC 2020)
Kodai Toyoda (Tohoku Univ.), Daiki Miyahara (Tohoku Univ./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2021-3
In this invited talk, we introduce the paper ``Six-Card Finite-Runtime XOR Protocol with Only Random Cut'' by Kodai Toyo... [more] ISEC2021-3
p.17
ISEC 2021-05-19
15:00
Online Online [Invited Talk] Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020)
Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] ISEC2021-8
p.33
IN, ICTSSL, NWS 2020-10-22
15:25
Online Online [Invited Talk] Secure Data Utilization using Multi-Party Computation
Takao Takenouchi (Digital Garage) IN2020-32
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] IN2020-32
pp.12-17
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
ISEC, IT, WBS 2020-03-11
12:10
Hyogo University of Hyogo
(Cancelled but technical report was issued)
A Construction Method of Garbled Circuits for ZDD
Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2019-114 ISEC2019-110 WBS2019-63
Kruger et al proposed a new method to construct Garbled Circuits for BDD, which gives a compression expression of logic... [more] IT2019-114 ISEC2019-110 WBS2019-63
pp.167-170
 Results 1 - 20 of 62  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan