Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 14:55 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Forward-Secure for Claimable/Repudiable Ring Signature Scheme Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ) IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 |
web3.0 is a network of independent users directly connected to each other in a decentralized manner using the characteri... [more] |
IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 pp.155-162 |
RCC, ISEC, IT, WBS |
2023-03-14 16:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Proposal for a privacy-preserving frequency estimation method Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 |
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] |
IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 pp.187-194 |
RCC, ISEC, IT, WBS |
2023-03-14 17:15 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Local Differential Privacy mechanism for non-linear machine learning Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST), Tomoaki Mimoto (ATR) IT2022-98 ISEC2022-77 WBS2022-95 RCC2022-95 |
[more] |
IT2022-98 ISEC2022-77 WBS2022-95 RCC2022-95 pp.195-202 |
RCC, ISEC, IT, WBS |
2023-03-15 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
New Differential Pair of Linear Differential Attack for Salsa Kunjo Ri, Atsuko Miyaji (Handai) IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 |
Salsa20 is a stream cipher designed by D.J.Bernstein in 2005, and research on its security is highly necessary in ensuri... [more] |
IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 pp.412-418 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
New linear approximation and improved bias of ChaCha in differential linear analysis Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-69 |
Differential analysis has been widely used to analyze ChaCha, a stream cipher selected for TLS 1.3. Recently, differenti... [more] |
ICSS2022-69 pp.127-132 |
ICSS, IPSJ-SPT |
2023-03-13 17:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-70 |
ChaCha, a stream cipher, is the successor to Salsa20, which is also a stream cipher, and is the only cipher adopted in T... [more] |
ICSS2022-70 pp.133-138 |
ICSS, IPSJ-SPT |
2023-03-13 17:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) ICSS2022-71 |
We have researched Learning with Errors(LWE) problem and Ring-LWE problem. Module-LWE problem is a version of RLWE probl... [more] |
ICSS2022-71 pp.139-144 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures Ryunosuke Higashi, Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (OU) ICSS2022-72 |
The ring signature proposed by Rivest et al. does not assume the existence of an administrator, so the signer cannot be ... [more] |
ICSS2022-72 pp.145-150 |
IT, ISEC, RCC, WBS |
2022-03-10 10:30 |
Online |
Online |
Threshold Signature Scheme Suitable for a Short Message Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 |
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] |
IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 pp.42-49 |
IT, ISEC, RCC, WBS |
2022-03-10 14:15 |
Online |
Online |
Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 |
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] |
IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 pp.130-137 |
IT, ISEC, RCC, WBS |
2022-03-10 14:40 |
Online |
Online |
Crypto Analysis for Ring-LWE Problem on Subfield in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji (OU) IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 |
Since the proposal of the quantum computer, steady progress has been made toward its practical use. It has been reported... [more] |
IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 pp.138-144 |
IT, ISEC, RCC, WBS |
2022-03-11 14:55 |
Online |
Online |
Analysis of Multi-Bit Differentials in the Stream Cipher ChaCha Kai Izumi, Atsuko Miyaji (Osaka Univ.) IT2021-128 ISEC2021-93 WBS2021-96 RCC2021-103 |
[more] |
IT2021-128 ISEC2021-93 WBS2021-96 RCC2021-103 pp.262-269 |
ICSS, IPSJ-SPT |
2022-03-07 15:00 |
Online |
Online |
ICSS2021-64 |
Accountable Subgroup Multisignature (ASM) enables any subgroup of signers from a group to produce a multi-signature for ... [more] |
ICSS2021-64 pp.32-37 |
ICSS, IPSJ-SPT |
2022-03-08 10:20 |
Online |
Online |
Development of validation system for stack unwinding information according to the AArch64 calling convention Tetsuhiro Kawaguchi, Yuki Takano, Atsuko Miyaji (Osaka Univ.) ICSS2021-68 |
The stack unwinding during program execution implemented in high-level languages is based on debugging information writt... [more] |
ICSS2021-68 pp.55-60 |
ICSS, IPSJ-SPT |
2022-03-08 14:50 |
Online |
Online |
On Extension of scalable local differential privacy Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (Osaka Univ./ATR) ICSS2021-79 |
[more] |
ICSS2021-79 pp.123-128 |
ICSS, IPSJ-SPT |
2022-03-08 15:10 |
Online |
Online |
Proposal of a lattice-based accumulator with efficient update function Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (Osaka Univ) ICSS2021-80 |
In recent years, as the digitization of various information and assets continues, the technology of proving the ownershi... [more] |
ICSS2021-80 pp.129-134 |
QIT (2nd) |
2021-11-30 13:30 |
Online |
Online |
[Poster Presentation]
Attacks on Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Sinya Okumura, Atsuko Miyaji (Osaka Univ.) |
The Ring-Learning with Error (Ring-LWE) has attracted a great deal of attention because it is quantum-resistant and can ... [more] |
|
ICSS |
2021-11-29 14:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Ring Signature scheme based on prime-order bilinear group Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49 |
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] |
ICSS2021-49 pp.19-24 |
ICSS |
2021-11-29 15:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Design and Implementation of a Session Types-based Secure Communication Protocol for Processes Xiaolong, Yuuki Takano, Atsuko Miyaji (OU) ICSS2021-50 |
For inter-process communication, the type and order of data to be passed must be specified in advance from the viewpoint... [more] |
ICSS2021-50 pp.25-30 |
IA, ICSS |
2021-06-21 13:05 |
Online |
Online |
Post-Quantum Commitment Scheme with Extending Message Length Hideaki Miyaji (OU), Yuntao Wang (JAIST), Atsuko Miyaji (OU) IA2021-1 ICSS2021-1 |
[more] |
IA2021-1 ICSS2021-1 pp.1-7 |