IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
(Primary: On-site, Secondary: Online)
Multi-Authority Attribute Based Signatures from Lattice
Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86
We construct Multi-Authority Attribute-Based Signatures (MA-ABS) based on lattices. Our scheme is the first scheme that ... [more] IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86
RCC, ISEC, IT, WBS 2023-03-14
(Primary: On-site, Secondary: Online)
Attribute-based encryption with keyword search
Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91
VLD, HWS [detail] 2022-03-07
Online Online Attribute-based Encryption Acceleration by Pairing Engine Hardware on FPGA
Anawin Opasatian, Makoto Ikeda (EEIS, The University of Tokyo) VLD2021-80 HWS2021-57
Attribute-based Encryption (ABE) can provide fine grain access control which is suitable for a shared file system such a... [more] VLD2021-80 HWS2021-57
HWS, ICD [detail] 2021-10-19
Online Online Attribute-based Encryption for File Encryption Application
Anawin Opasatian, Makoto Ikeda (The University of Tokyo) HWS2021-47 ICD2021-21
Attribute-based Encryption (ABE) allows fine grain access control in the system. In this work, we look into practical us... [more] HWS2021-47 ICD2021-21
WBS, IT, ISEC 2021-03-05
Online Online A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction
Hiroaki Anada (Univ. of Nagasaki) IT2020-149 ISEC2020-79 WBS2020-68
We propose an anonymous credential scheme and its generic construction, where there are independent decentralized multi-... [more] IT2020-149 ISEC2020-79 WBS2020-68
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
IOTA-Based Access Control Framework for the Internet of Things
Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] NS2019-230
ICSS, IPSJ-SPT 2020-03-03
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications
Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ICSS2019-103
In recent years, online shopping is getting more and more popular and has been used by many users all over the world. On... [more] ICSS2019-103
IA, SITE, IPSJ-IOT [detail] 2019-03-07
Tokushima Grand XIV Naruto Development of a Cloud Application Sharing Platform with Authorization Mechanism using CP-ABE
Yoshinori Kamori, Kaori Maeda (Hiroshima City Univ.), Tohru Kondo, Reiji Aibara (Hiroshima Univ.) SITE2018-69 IA2018-61
In recent years, collaborative work using cloud applications has become common. In that case, the user experience degrad... [more] SITE2018-69 IA2018-61
EA, ASJ-H, EMM, IPSJ-MUS [detail] 2018-11-21
Ishikawa Hotel Koshuen Implementation and Evaluation of Fingerprinting System for Preventing Internal Leakage of Sensitive Data
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EA2018-70 EMM2018-70
Due to the development of electrical system in organizations such as companies, the sensitive data should be managed sec... [more] EA2018-70 EMM2018-70
Miyazaki Phoenix Seagaia Resort A Study on Secure Emergency Message Delivery in NDN Networks
Kai Ryu, Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2017-205
Emergency communication such as 119 calls cannot be provided if congestion occurs in telephone networks due to a disaste... [more] NS2017-205
LOIS, ISEC, SITE 2017-11-10
Kyoto   An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT
Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.) ISEC2017-70 SITE2017-52 LOIS2017-47
Recently, services using IoT have been widespread. The IoT system is a bidirectional communication model between the dev... [more] ISEC2017-70 SITE2017-52 LOIS2017-47
EMM, IT 2017-05-22
Yamagata Yamagata University(Yonezawa Campus) A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] IT2017-4 EMM2017-4
ISEC, WBS, IT 2017-03-10
Tokyo TOKAI University Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] IT2016-129 ISEC2016-119 WBS2016-105
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
Yamaguchi   Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
ISEC 2016-05-19
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] ISEC2016-3
IT, ISEC, WBS 2016-03-11
Tokyo The University of Electro-Communications Expressive Attribute-Based Encryption with Fast Decryption
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] IT2015-132 ISEC2015-91 WBS2015-115
IT, ISEC, WBS 2016-03-11
Tokyo The University of Electro-Communications Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] IT2015-133 ISEC2015-92 WBS2015-116
ICSS 2015-03-04
Okinawa Meio Univiersity A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] ICSS2014-92
ICSS 2015-03-04
Okinawa Meio Univiersity Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] ICSS2014-93
ISEC 2014-09-05
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Dual System Encryption via Doubly Selective Security -- A Generic Framework for Fully-Secure Predicate Encryption --
Nuttapong Attrapadung (AIST) ISEC2014-54
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] ISEC2014-54
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan