IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Security (ISEC)
Chair: Naoya Torii (Fujitsu Labs.)
Vice Chair: Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.)
Secretary: Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.)
Assistant: Tetsuya Izu (Fujitsu Labs.)

===============================================
Technical Committee on Life Intelligence and Office Information Systems (LOIS)
Chair: Masanobu Abe (Okayama Univ.) Vice Chair: Toshihiko Wakahara (Fukuoka Inst. of Tech.)
Secretary: Noriyasu Yamamoto (Fukuoka Inst. of Tech.), Tetsuya Kinebuchi (NTT)
Assistant: Hiroshi Konishi (NTT)

DATE:
Mon, Nov 14, 2011 10:00 - 17:40
Tue, Nov 15, 2011 09:00 - 16:30

PLACE:
I101, Ekimae Campus, Osaka Electro-Communication University(12-16, Hayakocho, Neyagawa, Osaka, 572-0837 Japan. http://oweb11.osakac.ac.jp/institution/access.html. Prof. Ryuichi Sakai. 072-824-8900)

TOPICS:


----------------------------------------
Mon, Nov 14 AM ISEC (10:00 - 11:40)
----------------------------------------

(1) 10:00 - 10:25
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.)

(2) 10:25 - 10:50
A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.)

(3) 10:50 - 11:15
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II)
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.)

(4) 11:15 - 11:40
An element-selective knapsack cryptosystem with encryption multipliers
Yuki Okada, Akira Hayashi (KIT)

----- Lunch ( 60 min. ) -----

----------------------------------------
Mon, Nov 14 PM LOIS -Life Log- (12:40 - 14:10)
----------------------------------------

(5) 12:40 - 13:10
A study on necessary location information accuracy in lifelog
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo)

(6) 13:10 - 13:40
Evaluation method for telephone conversations retrieval using precision and recall
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ)

(7) 13:40 - 14:10
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service --
Minako Toba (Hitachi, Ltd.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Nov 14 PM ISEC (14:20 - 16:00)
----------------------------------------

(8) 14:20 - 14:45
Three dimensional Dyck Path Cipher
Jun Hashimoto, Akira Hayashi (KIT)

(9) 14:45 - 15:10
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)

(10) 15:10 - 15:35
Ramp secret sharing scheme based on MBR codes
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University)

(11) 15:35 - 16:00
Formalization and Verification of Arithmetic Algorithms by Mizar
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Nov 14 PM LOIS -Office System- (16:10 - 17:40)
----------------------------------------

(12) 16:10 - 16:40
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet --
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT)

(13) 16:40 - 17:10
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability --
Keisuke Saito, Masakatu Morii (Kobe Univ.)

(14) 17:10 - 17:40
A suudy of machine learning corresponding to the change of a turn and the of the recognition object
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.)

----------------------------------------
Tue, Nov 15 AM ISEC (09:00 - 10:40)
----------------------------------------

(15) 09:00 - 09:25
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.)

(16) 09:25 - 09:50
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.)

(17) 09:50 - 10:15
Optimized Right-to-Left Scalar Multiplication RIP Algorithms
Atsuko Miyaji, Yiren Mo (JAIST)

(18) 10:15 - 10:40
Efficient Privacy Preserving Set Operations
Atsuko Miyaji, Mohammad Rahman (JAIST)

----- Break ( 15 min. ) -----

----------------------------------------
Tue, Nov 15 AM LOIS -System Security- (10:55 - 12:25)
----------------------------------------

(19) 10:55 - 11:25
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT)

(20) 11:25 - 11:55
Secure and Effective Password Management System
Ryo Hirano, Masakatu Morii (Kobe Univ.)

(21) 11:55 - 12:25
Secure VoIP system for mobile devices
Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.)

----- Lunch ( 60 min. ) -----

----------------------------------------
Tue, Nov 15 PM ISEC (13:25 - 14:40)
----------------------------------------

(22) 13:25 - 13:50
SLP separates the strong RSA assumption from the DDH assumption
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)

(23) 13:50 - 14:15
On the Little Knowledge Interactive Proof
Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)

(24) 14:15 - 14:40
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Nov 15 PM ISEC (14:50 - 16:30)
----------------------------------------

(25) 14:50 - 15:15
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8
Masaaki Shirase (FUN)

(26) 15:15 - 15:40
A proposal of Privacy Impact Assessment framework in Japan
Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT)

(27) 15:40 - 16:05
Content Authentication for Range Queries in Peer-to-Peer Networks
Shoichi Hirose (Univ. of Fukui)

(28) 16:05 - 16:30
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.)

# Information for speakers
General Talk (ISEC) will have 20 minutes for presentation and 5 minutes for discussion.
General Talk (LOIS) will have 20 minutes for presentation and 10 minutes for discussion.


=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Wed, Dec 14, 2011: Kikai-Shinko-Kaikan Bldg. [Tue, Oct 18]

# SECRETARY:
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Life Intelligence and Office Information Systems (LOIS) ===
# FUTURE SCHEDULE:

Thu, Jan 19, 2012 - Fri, Jan 20, 2012: Sojo Univ. [Wed, Nov 16]

# SECRETARY:
Noriyasu Yamamoto
Fukuoka Institute of Technology
3-30-1 Wajiro-higashi, Higashi-ku, Fukuoka-shi 811-0295
FAX +81-92-606-0758
E-mail: fit


Last modified: 2011-11-09 09:52:23


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to LOIS Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan