Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 09:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication
-- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication -- Masaaki Shirase (FUN) IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69 |
The 2nd-Me scalar multiple $P_{n,Z}^{II}$ can be defined
for points $P,Z in E(F_p)$ of an elliptic curve over a finite... [more] |
IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69 pp.25-32 |
ISEC, SITE, LOIS |
2022-11-18 17:20 |
Online |
Online |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29 |
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] |
ISEC2022-45 SITE2022-49 LOIS2022-29 pp.92-99 |
IT, ISEC, RCC, WBS |
2022-03-10 10:30 |
Online |
Online |
Threshold Signature Scheme Suitable for a Short Message Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 |
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] |
IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 pp.42-49 |
WBS, IT, ISEC |
2021-03-05 10:55 |
Online |
Online |
Digital Signatures with Wildcards Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66 |
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] |
IT2020-147 ISEC2020-77 WBS2020-66 pp.213-218 |
HWS, VLD [detail] |
2021-03-04 14:15 |
Online |
Online |
Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60 |
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] |
VLD2020-85 HWS2020-60 pp.97-101 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 10:05 |
Ehime |
Ehime Prefecture Gender Equality Center |
Evaluation of operating performance of ECDSA hardware module Yuya Takahashi, Monta kazuki (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) ICD2019-35 IE2019-41 |
There are limits to how much IoT power and encryption speed can be improved at the software level. Therefore, it is nece... [more] |
ICD2019-35 IE2019-41 pp.37-40 |
HWS, VLD |
2019-03-02 10:25 |
Okinawa |
Okinawa Ken Seinen Kaikan |
ASIC Chip Implementation and Evaluation of Elliptic Curve Digital Signature Algorithm Sosuke Sato, Hiroki Yoshida, Kazuki Monta (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2018-138 HWS2018-101 |
We have designed and fabricated application specific semiconductor integrated circuit (ASIC) chips that embody the gener... [more] |
VLD2018-138 HWS2018-101 pp.267-269 |
ISEC |
2018-05-16 10:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature Masaaki Shirase (FUN) ISEC2018-1 |
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] |
ISEC2018-1 pp.1-8 |
IT, ISEC, WBS |
2016-03-11 10:00 |
Tokyo |
The University of Electro-Communications |
Reconsideration of Fail-Stop Signature Schemes and Their UC-Security Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114 |
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] |
IT2015-131 ISEC2015-90 WBS2015-114 pp.181-188 |
ISEC |
2014-09-05 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fail-Stop Signature Scheme with TTP and Its UC-Security Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49 |
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] |
ISEC2014-49 pp.13-20 |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Compatible 2d-code having tamper detection system with QR-code Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2013-106 pp.39-44 |
ISEC |
2013-05-23 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) ISEC2013-4 |
When implementing advanced automotive services in cooperation with external data centers, it is very important to ensure... [more] |
ISEC2013-4 pp.23-28 |
EMM |
2013-03-07 13:30 |
Kyoto |
|
Information hiding for QR-code using Wet Paper Code Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2012-107 pp.1-6 |
IT, ISEC, WBS |
2013-03-07 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Consideration on Security Requirements of Fail-stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53 |
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] |
IT2012-67 ISEC2012-85 WBS2012-53 pp.31-38 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
IT, ISEC, WBS |
2010-03-04 11:40 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Construction of secure Group Identification based on Digital Signature Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56 |
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more] |
IT2009-77 ISEC2009-85 WBS2009-56 pp.39-43 |
CAS, NLP |
2009-09-24 10:30 |
Hiroshima |
Hiroshima Univ. Higashi Senda Campus |
Correlation-Based Image Watermarking Based on Smoothing Hideaki Kadota, Masayoshi Nakamoto, Shuichi Ohno (Hiroshima Univ.) CAS2009-25 NLP2009-61 |
Digital watermarking is a copyright protection method by embedding watermark data in the digital contents.
In this wor... [more] |
CAS2009-25 NLP2009-61 pp.7-12 |
CAS, NLP |
2009-09-24 10:55 |
Hiroshima |
Hiroshima Univ. Higashi Senda Campus |
Detection Method for Digital Watermark with Dual-Sided Correlation Tomotaka Harano, Masayoshi Nakamoto, Hideaki Kadota, Shuichi Ohno (Hiroshima Univ.) CAS2009-26 NLP2009-62 |
The watermark systems should be robust against common image processing operations, such as noise adding and JPEG compres... [more] |
CAS2009-26 NLP2009-62 pp.13-18 |
ISEC |
2009-05-22 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Digital Signature Using Knapsack Problem Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (α systems) ISEC2009-12 |
We propose a digital signature using the knapsack problem. The security of this digital signature is based on the diffic... [more] |
ISEC2009-12 pp.77-80 |