Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 |
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] |
ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 pp.52-59 |
RCC, ISEC, IT, WBS |
2023-03-14 15:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Attribute-based encryption with keyword search Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 |
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] |
IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 pp.163-170 |
ISEC |
2021-05-19 13:25 |
Online |
Online |
Secure Chat and Storage Systems based on Searchable Encryption: Implementation and Evaluation Keita Emura, Sachiko Kanamori, Ryo Nojima (NICT), Yohei Watanabe (UEC/NICT) ISEC2021-5 |
(To be available after the conference date) [more] |
ISEC2021-5 pp.19-24 |
DE |
2019-06-22 10:50 |
Tokyo |
|
Efficient Similar Document Search over Encrypted Data On the Cloud Daisuke Aritomo (Univ. of Tsukuba), Chiemi Watanabe (NTUT) DE2019-7 |
More and more data owners are building information retrieval systems on cloud computing platforms, which provides scalab... [more] |
DE2019-7 pp.29-34 |
WBS, IT, ISEC |
2018-03-09 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121 |
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] |
IT2017-140 ISEC2017-128 WBS2017-121 pp.219-223 |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104 |
(To be available after the conference date) [more] |
IT2016-128 ISEC2016-118 WBS2016-104 pp.187-193 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Efficient Verifiable Attribute-Based Keyword Search Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105 |
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] |
IT2016-129 ISEC2016-119 WBS2016-105 pp.195-202 |
IN |
2015-10-15 15:55 |
Osaka |
Osaka University |
[Invited Talk]
Data Secrecy in the Cloud Era Yasunori Ishihara (Osaka Univ.) IN2015-56 |
In the Cloud Era, third parties are required to process data without knowing the content of the data. In this talk, we f... [more] |
IN2015-56 pp.19-24 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:20 |
Fukushima |
|
Fast Searchable Encryption Scheme Using Single Bloom Filter and Its Evalustion Shunsuke Kimura, Hiroyuki Inaba (KIT) SITE2014-79 IA2014-111 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
SITE2014-79 IA2014-111 pp.227-232 |
ISEC |
2014-09-05 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Computer Simulation of Garbled Searchable Symmetric Encryption Scheme Keisuke Sasaki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2014-51 |
In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which ... [more] |
ISEC2014-51 pp.27-34 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 pp.281-286 |
IT, ISEC, WBS |
2013-03-08 14:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Security Definitions for Public Key Encryption with Keyword Search Revisited Hirokazu Tagai, Junji Shikata (Yokohama National Univ.) IT2012-104 ISEC2012-122 WBS2012-90 |
Public Key Encryption with Keyword Search (PEKS) is a cryptographic primitive imparting the keyword search function with... [more] |
IT2012-104 ISEC2012-122 WBS2012-90 pp.263-270 |
IT, ISEC, WBS |
2013-03-08 15:35 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Toward Practical Application of Searchable Encryption Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric) IT2012-106 ISEC2012-124 WBS2012-92 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2012-106 ISEC2012-124 WBS2012-92 pp.279-283 |
IT, ISEC, WBS |
2012-03-02 09:00 |
Kanagawa |
|
Searchable Symmetric Encryption with small information leakage in index update Toshinori Araki (NEC) IT2011-67 ISEC2011-94 WBS2011-68 |
Searchable symmetric encryption(SSE) has been used for privacy preserving keyword search. Although the importance for pr... [more] |
IT2011-67 ISEC2011-94 WBS2011-68 pp.129-134 |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
Efficient Searchable Encryption Schemes Against Frequency Analysis Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2010-68 ISEC2010-72 WBS2010-47 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:45 |
Aomori |
Hirosaki University |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35 |
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] |
ISEC2010-29 SITE2010-25 ICSS2010-35 pp.147-152 |