Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81 |
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] |
ICSS2021-81 pp.135-140 |
ISEC |
2021-05-19 10:00 |
Online |
Online |
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1 |
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] |
ISEC2021-1 pp.1-8 |
WBS, IT, ISEC |
2021-03-05 11:20 |
Online |
Online |
Non-interactive multiparty computation adapt to dynamic participants Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67 |
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] |
IT2020-148 ISEC2020-78 WBS2020-67 pp.219-224 |
CPSY, DC, IPSJ-ARC [detail] |
2019-07-26 17:00 |
Hokkaido |
Kitami Civic Hall |
Secure Distributed Computing using Blockchain Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37 |
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] |
CPSY2019-37 DC2019-37 pp.223-227 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112 |
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more] |
IT2018-111 ISEC2018-117 WBS2018-112 pp.223-228 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105 |
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] |
IT2017-124 ISEC2017-112 WBS2017-105 pp.121-128 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106 |
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more] |
IT2017-125 ISEC2017-113 WBS2017-106 pp.129-135 |
ISEC |
2017-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42 |
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] |
ISEC2017-42 pp.7-14 |
ISEC |
2014-12-19 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima (NTT) ISEC2014-74 |
We talk about our paper that appeared in CRYPTO 2014.In that paper, we present a round-efficient black-box construction ... [more] |
ISEC2014-74 p.23 |