Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
SS, DC |
2023-10-12 10:00 |
Nagano |
(Primary: On-site, Secondary: Online) |
A game-theoretic approach to indistinguishability of winning objectives as user privacy Rindo Nakanishi (Nagoya Univ.), Yoshiaki Takata (KUT), Hiroyuki Seki (Nagoya Univ.) SS2023-27 DC2023-33 |
We propose a new game-theoretic framework for studying the privacy protection of a user
who interactively uses a softwa... [more] |
SS2023-27 DC2023-33 pp.32-37 |
AI |
2023-09-12 14:35 |
Hokkaido |
|
Proposal of effective location information privacy protection method using measurement equipment error Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15 |
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] |
AI2023-15 pp.77-82 |
ISEC |
2021-05-19 14:30 |
Online |
Online |
[Invited Talk]
Security Definitions on Time-Lock Puzzles (from ICISC 2020) Daiki Hiraga (Tokyo Tech), Keisuke Hara (Tokyo Tech/AIST), Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2021-7 |
Time-lock puzzles allow one to encapsulate a message for a pre-determined amount of time.
The message is required to be... [more] |
ISEC2021-7 p.32 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:40 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018) Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 |
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] |
ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 p.91 |
LOIS, ISEC, SITE |
2017-11-09 16:30 |
Kyoto |
|
Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) ISEC2017-59 SITE2017-41 LOIS2017-36 |
In a setting that a single user is given plural credentials on her attributes and related secret keys, an authentication... [more] |
ISEC2017-59 SITE2017-41 LOIS2017-36 pp.63-70 |
ISEC, WBS, IT |
2017-03-10 11:45 |
Tokyo |
TOKAI University |
Diagonally Witness-Indistinguishable Proof Systems Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) IT2016-121 ISEC2016-111 WBS2016-97 |
We propose a witness-indistinguishable proof system which is a kind of parallel composition of witness-indistinguishable... [more] |
IT2016-121 ISEC2016-111 WBS2016-97 pp.145-148 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 11:10 |
Yamaguchi |
|
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] |
ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 pp.137-143 |
QIT (2nd) |
2015-11-25 15:20 |
Kanagawa |
NTT Atsugi R&D center |
Security of Quantum Key Distribution from Attacker's View Takehisa Iwakoshi (Tamagawa Univ.) |
In 2005, trace distance between an ideal quantum state to be distributed and an actual quantum state distributed was int... [more] |
|
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
IT, ISEC, WBS |
2013-03-08 14:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Security Definitions for Public Key Encryption with Keyword Search Revisited Hirokazu Tagai, Junji Shikata (Yokohama National Univ.) IT2012-104 ISEC2012-122 WBS2012-90 |
Public Key Encryption with Keyword Search (PEKS) is a cryptographic primitive imparting the keyword search function with... [more] |
IT2012-104 ISEC2012-122 WBS2012-90 pp.263-270 |
ISEC, IT, WBS |
2011-03-03 16:35 |
Osaka |
Osaka University |
RFID Identification Protocol with Reduced Reader Computational Cost Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.) IT2010-76 ISEC2010-80 WBS2010-55 |
In the general setting of the RFID system, as each tag has its unique secret key, the reader needs to exhaustively searc... [more] |
IT2010-76 ISEC2010-80 WBS2010-55 pp.49-55 |
ISEC, IT, WBS |
2008-02-29 09:45 |
Tokyo |
|
Security Analysis of DRBG Algorithm in NIST SP 800-90 Shoichi Hirose (Univ. of Fukui) IT2007-52 ISEC2007-149 WBS2007-83 |
We discuss the security of HMAC_DRBG specified in NIST SP 800-90.
We show that HMAC_DRBG is a pseudorandom bit generato... [more] |
IT2007-52 ISEC2007-149 WBS2007-83 pp.23-28 |
COMP |
2006-06-23 13:00 |
Saitama |
Saitama Univ. |
Relationships between Data-Privacy and Key-Privacy Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.) |
The classical security requirement
of public-key encryption schemes is
that it provides privacy
of the encrypted data... [more] |
COMP2006-20 pp.21-27 |
COMP |
2005-09-15 13:20 |
Osaka |
Osaka Univ., Toyonaka Campus |
[Tutorial Lecture]
NA Akinori Kawachi (Tokyo Tech.) |
Applications of quantum information processing to cryptography has played a central role in the quantum information scie... [more] |
|