Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 13:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Multi-Authority Attribute Based Signatures from Lattice Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86 |
We construct Multi-Authority Attribute-Based Signatures (MA-ABS) based on lattices. Our scheme is the first scheme that ... [more] |
IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86 pp.127-134 |
RCC, ISEC, IT, WBS |
2023-03-14 15:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Attribute-based encryption with keyword search Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 |
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] |
IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 pp.163-170 |
VLD, HWS [detail] |
2022-03-07 11:00 |
Online |
Online |
Attribute-based Encryption Acceleration by Pairing Engine Hardware on FPGA Anawin Opasatian, Makoto Ikeda (EEIS, The University of Tokyo) VLD2021-80 HWS2021-57 |
Attribute-based Encryption (ABE) can provide fine grain access control which is suitable for a shared file system such a... [more] |
VLD2021-80 HWS2021-57 pp.25-30 |
HWS, ICD [detail] |
2021-10-19 13:55 |
Online |
Online |
Attribute-based Encryption for File Encryption Application Anawin Opasatian, Makoto Ikeda (The University of Tokyo) HWS2021-47 ICD2021-21 |
Attribute-based Encryption (ABE) allows fine grain access control in the system. In this work, we look into practical us... [more] |
HWS2021-47 ICD2021-21 pp.32-37 |
WBS, IT, ISEC |
2021-03-05 11:45 |
Online |
Online |
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction Hiroaki Anada (Univ. of Nagasaki) IT2020-149 ISEC2020-79 WBS2020-68 |
We propose an anonymous credential scheme and its generic construction, where there are independent decentralized multi-... [more] |
IT2020-149 ISEC2020-79 WBS2020-68 pp.225-231 |
NS, IN (Joint) |
2020-03-06 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
IOTA-Based Access Control Framework for the Internet of Things Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230 |
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] |
NS2019-230 pp.295-300 |
ICSS, IPSJ-SPT |
2020-03-03 11:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ICSS2019-103 |
In recent years, online shopping is getting more and more popular and has been used by many users all over the world. On... [more] |
ICSS2019-103 pp.301-306 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-07 10:50 |
Tokushima |
Grand XIV Naruto |
Development of a Cloud Application Sharing Platform with Authorization Mechanism using CP-ABE Yoshinori Kamori, Kaori Maeda (Hiroshima City Univ.), Tohru Kondo, Reiji Aibara (Hiroshima Univ.) SITE2018-69 IA2018-61 |
In recent years, collaborative work using cloud applications has become common. In that case, the user experience degrad... [more] |
SITE2018-69 IA2018-61 pp.15-21 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
Implementation and Evaluation of Fingerprinting System for Preventing Internal Leakage of Sensitive Data Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EA2018-70 EMM2018-70 |
Due to the development of electrical system in organizations such as companies, the sensitive data should be managed sec... [more] |
EA2018-70 EMM2018-70 pp.43-48 |
NS, IN (Joint) |
2018-03-02 10:00 |
Miyazaki |
Phoenix Seagaia Resort |
A Study on Secure Emergency Message Delivery in NDN Networks Kai Ryu, Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2017-205 |
Emergency communication such as 119 calls cannot be provided if congestion occurs in telephone networks due to a disaste... [more] |
NS2017-205 pp.215-220 |
LOIS, ISEC, SITE |
2017-11-10 15:40 |
Kyoto |
|
An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.) ISEC2017-70 SITE2017-52 LOIS2017-47 |
Recently, services using IoT have been widespread. The IoT system is a bidirectional communication model between the dev... [more] |
ISEC2017-70 SITE2017-52 LOIS2017-47 pp.123-128 |
EMM, IT |
2017-05-22 14:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4 |
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] |
IT2017-4 EMM2017-4 pp.19-24 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Efficient Verifiable Attribute-Based Keyword Search Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105 |
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] |
IT2016-129 ISEC2016-119 WBS2016-105 pp.195-202 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:45 |
Yamaguchi |
|
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 |
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] |
ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 pp.129-136 |
ISEC |
2016-05-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3 |
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] |
ISEC2016-3 p.13 |
IT, ISEC, WBS |
2016-03-11 10:25 |
Tokyo |
The University of Electro-Communications |
Expressive Attribute-Based Encryption with Fast Decryption Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115 |
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] |
IT2015-132 ISEC2015-91 WBS2015-115 pp.189-195 |
IT, ISEC, WBS |
2016-03-11 10:50 |
Tokyo |
The University of Electro-Communications |
Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116 |
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] |
IT2015-133 ISEC2015-92 WBS2015-116 pp.197-204 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] |
ICSS2014-93 pp.181-186 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |