IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RISING
(3rd)
2023-10-31
10:45
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation
Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.)
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more]
SS, DC 2023-10-12
10:00
Nagano
(Primary: On-site, Secondary: Online)
A game-theoretic approach to indistinguishability of winning objectives as user privacy
Rindo Nakanishi (Nagoya Univ.), Yoshiaki Takata (KUT), Hiroyuki Seki (Nagoya Univ.) SS2023-27 DC2023-33
We propose a new game-theoretic framework for studying the privacy protection of a user
who interactively uses a softwa... [more]
SS2023-27 DC2023-33
pp.32-37
AI 2023-09-12
14:35
Hokkaido   Proposal of effective location information privacy protection method using measurement equipment error
Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] AI2023-15
pp.77-82
ISEC 2021-05-19
14:30
Online Online [Invited Talk] Security Definitions on Time-Lock Puzzles (from ICISC 2020)
Daiki Hiraga (Tokyo Tech), Keisuke Hara (Tokyo Tech/AIST), Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2021-7
Time-lock puzzles allow one to encapsulate a message for a pre-determined amount of time.
The message is required to be... [more]
ISEC2021-7
p.32
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:40
Hokkaido Sapporo Convention Center [Invited Talk] Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
p.91
LOIS, ISEC, SITE 2017-11-09
16:30
Kyoto   Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation
Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) ISEC2017-59 SITE2017-41 LOIS2017-36
In a setting that a single user is given plural credentials on her attributes and related secret keys, an authentication... [more] ISEC2017-59 SITE2017-41 LOIS2017-36
pp.63-70
ISEC, WBS, IT 2017-03-10
11:45
Tokyo TOKAI University Diagonally Witness-Indistinguishable Proof Systems
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) IT2016-121 ISEC2016-111 WBS2016-97
We propose a witness-indistinguishable proof system which is a kind of parallel composition of witness-indistinguishable... [more] IT2016-121 ISEC2016-111 WBS2016-97
pp.145-148
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
11:10
Yamaguchi   Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
pp.137-143
QIT
(2nd)
2015-11-25
15:20
Kanagawa NTT Atsugi R&D center Security of Quantum Key Distribution from Attacker's View
Takehisa Iwakoshi (Tamagawa Univ.)
In 2005, trace distance between an ideal quantum state to be distributed and an actual quantum state distributed was int... [more]
ISEC, IT, WBS 2014-03-11
11:00
Aichi Nagoya Univ., Higashiyama Campus A Note on Indistinguishability of Fail-Stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] IT2013-79 ISEC2013-108 WBS2013-68
pp.155-161
IT, ISEC, WBS 2013-03-08
14:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Security Definitions for Public Key Encryption with Keyword Search Revisited
Hirokazu Tagai, Junji Shikata (Yokohama National Univ.) IT2012-104 ISEC2012-122 WBS2012-90
Public Key Encryption with Keyword Search (PEKS) is a cryptographic primitive imparting the keyword search function with... [more] IT2012-104 ISEC2012-122 WBS2012-90
pp.263-270
ISEC, IT, WBS 2011-03-03
16:35
Osaka Osaka University RFID Identification Protocol with Reduced Reader Computational Cost
Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.) IT2010-76 ISEC2010-80 WBS2010-55
In the general setting of the RFID system, as each tag has its unique secret key, the reader needs to exhaustively searc... [more] IT2010-76 ISEC2010-80 WBS2010-55
pp.49-55
ISEC, IT, WBS 2008-02-29
09:45
Tokyo   Security Analysis of DRBG Algorithm in NIST SP 800-90
Shoichi Hirose (Univ. of Fukui) IT2007-52 ISEC2007-149 WBS2007-83
We discuss the security of HMAC_DRBG specified in NIST SP 800-90.
We show that HMAC_DRBG is a pseudorandom bit generato... [more]
IT2007-52 ISEC2007-149 WBS2007-83
pp.23-28
COMP 2006-06-23
13:00
Saitama Saitama Univ. Relationships between Data-Privacy and Key-Privacy
Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.)
The classical security requirement
of public-key encryption schemes is
that it provides privacy
of the encrypted data... [more]
COMP2006-20
pp.21-27
COMP 2005-09-15
13:20
Osaka Osaka Univ., Toyonaka Campus [Tutorial Lecture] NA
Akinori Kawachi (Tokyo Tech.)
Applications of quantum information processing to cryptography has played a central role in the quantum information scie... [more]
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan