IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
pp.215-220
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:10
Hokkaido Sapporo Convention Center [Invited Talk] Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018)
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
We introduce the paper ``Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model'' by Tsunekazu Sa... [more] ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
p.89
ISEC, WBS, IT 2017-03-10
14:35
Tokyo TOKAI University Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] IT2016-129 ISEC2016-119 WBS2016-105
pp.195-202
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
10:45
Yamaguchi   Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
pp.129-136
IT, ISEC, WBS 2016-03-11
10:50
Tokyo The University of Electro-Communications Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] IT2015-133 ISEC2015-92 WBS2015-116
pp.197-204
COMP 2009-05-26
13:00
Saitama Saitama Univ. [Invited Talk] Sampling Algorithms and Their Applications to Cryptography
Keisuke Tanaka (Tokyo Inst. of Tech.) COMP2009-13
We consider efficient algorithms of sampling from the binomial and the Poisson distributions with large parameters, by o... [more] COMP2009-13
p.29
ISEC 2007-05-18
13:40
Tokyo Kikai-Shinko-Kaikan Bldg. Efficient ID-Based Signature without Random Oracle
Jiageng Chen, Atsuko Miyaji (JAIST) ISEC2007-8
ID-Based signature scheme is a kind of public key signature scheme which uses the user's identity as the public key. Com... [more] ISEC2007-8
pp.53-56
ISEC 2006-09-13
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
Shoichi Hirose (Fukui Univ.)
In this article, we discuss the security of double-block-length (DBL) hash functions against the free-start collision at... [more] ISEC2006-78
pp.45-52
ISEC 2006-05-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Fair Exchange of Signatures with Multiple Signers
Yuichi Komano (Toshiba)
Chen et al.~introduced a new notion of a concurrent signature scheme for a fair exchange of signatures with two parties.... [more] ISEC2006-2
pp.7-14
ISEC 2005-05-18
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Ring Signature Schemes with Innocence Assertion Revisited (Part 2) -- Group Signatures Strengthening the Signers' Privacy --
Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Atsushi Shimbo, Shinichi Kawamura (Toshiba)
This paper reconsiders the ring signature scheme with innocence assertion [10] as a group signature scheme. The ring sig... [more] ISEC2005-2
pp.9-16
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan