Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
Generic Even-Mansour Construction Based on Group Actions Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 |
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] |
ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 pp.215-220 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:10 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018) Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21 |
We introduce the paper ``Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model'' by Tsunekazu Sa... [more] |
ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21 p.89 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Efficient Verifiable Attribute-Based Keyword Search Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105 |
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] |
IT2016-129 ISEC2016-119 WBS2016-105 pp.195-202 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:45 |
Yamaguchi |
|
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 |
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] |
ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 pp.129-136 |
IT, ISEC, WBS |
2016-03-11 10:50 |
Tokyo |
The University of Electro-Communications |
Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116 |
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] |
IT2015-133 ISEC2015-92 WBS2015-116 pp.197-204 |
COMP |
2009-05-26 13:00 |
Saitama |
Saitama Univ. |
[Invited Talk]
Sampling Algorithms and Their Applications to Cryptography Keisuke Tanaka (Tokyo Inst. of Tech.) COMP2009-13 |
We consider efficient algorithms of sampling from the binomial and the Poisson distributions with large parameters, by o... [more] |
COMP2009-13 p.29 |
ISEC |
2007-05-18 13:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient ID-Based Signature without Random Oracle Jiageng Chen, Atsuko Miyaji (JAIST) ISEC2007-8 |
ID-Based signature scheme is a kind of public key signature scheme which uses the user's identity as the public key. Com... [more] |
ISEC2007-8 pp.53-56 |
ISEC |
2006-09-13 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack Shoichi Hirose (Fukui Univ.) |
In this article, we discuss the security of double-block-length (DBL) hash functions against the free-start collision at... [more] |
ISEC2006-78 pp.45-52 |
ISEC |
2006-05-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fair Exchange of Signatures with Multiple Signers Yuichi Komano (Toshiba) |
Chen et al.~introduced a new notion of a concurrent signature scheme for a fair exchange of signatures with two parties.... [more] |
ISEC2006-2 pp.7-14 |
ISEC |
2005-05-18 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Ring Signature Schemes with Innocence Assertion Revisited (Part 2)
-- Group Signatures Strengthening the Signers' Privacy -- Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Atsushi Shimbo, Shinichi Kawamura (Toshiba) |
This paper reconsiders the ring signature scheme with innocence assertion [10] as a group signature scheme. The ring sig... [more] |
ISEC2005-2 pp.9-16 |