Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2012-03-02 10:50 |
Kanagawa |
|
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.) IT2011-70 ISEC2011-97 WBS2011-71 |
A new multivariate public-key cryptosystem (MPKC) with the security assured by the difficulty of the prime factoring is ... [more] |
IT2011-70 ISEC2011-97 WBS2011-71 pp.149-155 |
SITE, IPSJ-CE |
2011-12-17 15:15 |
Shimane |
|
On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy
-- Part 1 -- Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28 |
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] |
SITE2011-28 pp.19-24 |
ISEC, LOIS |
2011-11-14 14:45 |
Osaka |
Osaka Electro-Communication University |
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36 |
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] |
ISEC2011-42 LOIS2011-36 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 09:00 |
Shizuoka |
Shizuoka University |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-15 SITE2011-12 ICSS2011-20 EMM2011-14 |
Abstract The most basic way to cryptanalyze Multivariate Public Key Cryptosystems (MPKC) is solving the equation system ... [more] |
ISEC2011-15 SITE2011-12 ICSS2011-20 EMM2011-14 pp.79-83 |
ISEC, IT, WBS |
2011-03-04 14:15 |
Osaka |
Osaka University |
Proposal of Hidden Pair of Bijection Signature Scheme Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) IT2010-126 ISEC2010-130 WBS2010-105 |
[more] |
IT2010-126 ISEC2010-130 WBS2010-105 pp.383-388 |
IA, SITE, IPSJ-IOT [detail] |
2011-02-28 13:55 |
Kochi |
Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) |
Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network Hiroshi Yamaguchi, Kohtaro Tadaki, Shigeo Tsujii, Norihisa Doi (Chuo Univ.) SITE2010-52 IA2010-88 |
On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the tech... [more] |
SITE2010-52 IA2010-88 pp.33-38 |
ISEC |
2010-09-10 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Extension of Rank Attacks to MPKC Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44 |
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more] |
ISEC2010-44 pp.35-40 |
CS |
2010-07-08 16:00 |
Kagoshima |
Yoron Park Hotel, Kagoshima |
[Memorial Lecture]
Electronic Government from the Viewpoint of Service Science for Overcoming two Contradicting Insecurity of Citizens
-- Overcoming two Contradicting Insecurity of Citizens -- Shigeo Tsujii (Chuo University) CS2010-19 |
[more] |
CS2010-19 pp.61-66 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
ISEC |
2009-12-16 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of the Internal Perturbation Modifier
-- An example of Perturbed Matsumoto-Imai -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2009-78 |
Internal Perturbation is among the modifiers of Multivariate Public Key Cryptosystems designed to reinforce the existing... [more] |
ISEC2009-78 pp.51-55 |
ISEC, LOIS |
2009-11-13 09:00 |
Gifu |
Gifu Univ. |
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48 |
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] |
ISEC2009-59 LOIS2009-48 pp.55-60 |
ISEC, LOIS |
2009-11-13 09:25 |
Gifu |
Gifu Univ. |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49 |
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more] |
ISEC2009-60 LOIS2009-49 pp.61-68 |
ISEC, LOIS |
2009-11-13 09:50 |
Gifu |
Gifu Univ. |
Anonymous Query Language Retrieval Hiroshi Yamaguchi, Shigeo Tsujii (Chuo Univ) ISEC2009-61 LOIS2009-50 |
[more] |
ISEC2009-61 LOIS2009-50 pp.69-74 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:20 |
Akita |
Akita University |
Proposal of Integrated MPKC: PPS
-- STS Enhanced by Perturbed Piece In Hand Method -- Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41 |
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] |
ISEC2009-27 SITE2009-19 ICSS2009-41 pp.139-146 |
EA |
2009-03-27 10:30 |
Tokyo |
|
Kalman Filter Based Robust Restoration Method with Colored Driving Source Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci), Hideaki Matsue (Tokyo Univ. of Sci, Suwa.), Shigeo Tsujii (Inst. of Info Security) EA2008-136 |
This paper proposes a Kalman filter based robust restoration method with colored driving source for degraded images. The... [more] |
EA2008-136 pp.1-5 |
EA |
2009-03-27 11:00 |
Tokyo |
|
A Fast Noise Suppression Algorithm using Kalman filter with Colored Driving Source Nari Tanabe, Yasuhiro Onozuka, Masataka Tabata (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci.), Shigeo Tsujii (Inst. of Information Security.) EA2008-137 |
[more] |
EA2008-137 pp.7-11 |
ITE-BCT, IE, CS, IPSJ-AVM |
2008-12-11 15:15 |
Aichi |
Nagoya University |
Kalman Filter Based Restoration Algorithm for Degraded Image Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (nstitute of Information Security) CS2008-44 IE2008-108 |
We propose a Kalman filter based restoration algorithm for degraded images.The algorithm aims to achieve high quality im... [more] |
CS2008-44 IE2008-108 pp.29-34 |
SITE |
2008-12-05 15:30 |
Tokyo |
|
[Invited Talk]
Comprehensive Science on Information Security
-- from the Viewpoint of Contradiction in Information Society -- Shigeo Tsujii (Institute of Infotmation Security) SITE2008-41 |
[more] |
SITE2008-41 pp.31-36 |
EA |
2008-11-21 11:15 |
Oita |
|
Kalman filter based fast noise suppression algorithm Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Institute of Information Security) EA2008-94 |
[more] |
EA2008-94 pp.57-62 |
SITE |
2008-10-17 14:20 |
Kanagawa |
|
About the access rule of the integrated security model based on the intuitionistic logic
-- The case of combining a conflict of interest attribute with a hierarchical attribute -- Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) SITE2008-31 |
[more] |
SITE2008-31 pp.9-14 |