IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 86  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
15:05
Osaka Osaka Univ. (Suita Campus) Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem
Akitaka Yokota, Bagus Santoso (UEC) IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72
No general quantum algorithm is known to efficiently solve computational problems based on
Multivariate Quadratic Poly... [more]
IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72
pp.94-101
VLD, HWS, ICD 2024-03-02
10:50
Okinawa
(Primary: On-site, Secondary: Online)
Design of General Hardware for Optimal Strategy in Isogeny-Based Post-Quantum Cryptography
Kosei Nakamura, Makoto Ikeda (UT) VLD2023-137 HWS2023-97 ICD2023-126
The computation in isogeny-based post-quantum cryptography primarily consists of two operations: scalar multiplication o... [more] VLD2023-137 HWS2023-97 ICD2023-126
pp.198-203
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Certified Deletion for Mult-bit Message Using Pseudorandom Functions
Duo XU (NU)
With the aid of quantum communication, one can delete messages from receiver’s memory. This is what so called Certified ... [more]
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Verification of identifiability of quantum states in quantum key delivery
Shunya Tajima, Atsushi Okamoto, Akihisa Tomita (hokudai)
In quantum key distribution, it is required that when creating the transmission state, the state is identical in all deg... [more]
AP, SANE, SAT
(Joint)
2023-07-12
14:40
Hokkaido The Citizen Activity Center
(Primary: On-site, Secondary: Online)
Improvement of key generation efficiency of free-space optical physical layer cryptography using polar code
Ryuto Terada (Nitech), Hiroyuki Endo (NICT), Kensuke Yamaura, Eiji Okamoto (Nitech), Mitsuo Kitamura (NICT), Ryosuke Shimizu (UEC), Morio Toyoshima, Mikio Hujiwara, Masahide Sasaki (NICT) SAT2023-12
Quantum key distribution is known as a secure key sharing technology against all physically possible attacks. However, t... [more] SAT2023-12
pp.13-18
QIT
(2nd)
2023-05-29
10:10
Kyoto Katsura Campus, Kyoto University A computational complexity assumption necessary for pseudorandom quantum states generators
Yuki Shirakawa (Kyoto Univ.)
Pseudorandom quantum states generators (PRSGs) are efficient quantum algorithms that output quantum states which are com... [more]
QIT
(2nd)
2023-05-30
15:50
Kyoto Katsura Campus, Kyoto University General treatment of trusted receiver noise in continuous variable quantum key distribution
Shinichiro Yamano (UT), Takaya Matsuura (RMIT University), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (UT)
Continuous Variable (CV) quantum key distribution (QKD) is a promising candidate for practical implementations due to it... [more]
COMP, IPSJ-AL 2023-05-11
10:00
Hokkaido Hokkaido University A computational complexity assumption necessary for pseudorandom quantum states generators
Yuki Shirakawa (Kyoto Univ.) COMP2023-2
Pseudorandom quantum states generators (PRSGs) are efficient quantum algorithms that output quantum states which are com... [more] COMP2023-2
pp.2-7
QIT
(2nd)
2022-12-09
10:15
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Finite-size security proof of binary-modulation continuous-variable quantum key distribution using only heterodyne measurement
Shinichiro Yamano (Univ. of Tokyo), Takaya Matsuura (RMIT Univ.), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (Univ. of Tokyo)
Continuous-variable quantum key distribution (CV QKD) has many practical advantages including compatibility with current... [more]
QIT
(2nd)
2022-12-09
10:30
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Refined security proof of the binary-modulation continuous-variable quantum key distribution
Takaya Matsuura (RMIT Univ.), Shinichiro Yamano (Univ. of Tokyo), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (Univ. of Tokyo)
Continuous-variable (CV) quantum key distribution (QKD) has its distinct advantages in lower-cost
implementation and mu... [more]

IT, ISEC, RCC, WBS 2022-03-10
14:15
Online Online Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field
Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80
pp.130-137
QIT
(2nd)
2021-11-30
16:20
Online Online Certified Deletion for Public Key Encryption and Classical Communication
Taiga Hiroka, Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT)
Broadbent and Islam (TCC’20) proposed a quantum cryptographic primitive called quantum encryption with certified deletio... [more]
QIT
(2nd)
2021-11-30
13:30
Online Online [Poster Presentation] Attacks on Search Ring-LWE Problem by Trace Map on Finite Field
Tomoka Takahashi, Sinya Okumura, Atsuko Miyaji (Osaka Univ.)
The Ring-Learning with Error (Ring-LWE) has attracted a great deal of attention because it is quantum-resistant and can ... [more]
NS 2021-10-07
13:50
Online Online [Invited Talk] Quantum Cryptography technologies for realizing the Quantum Key Distribution platform
Keisuke Mera (Toshiba) NS2021-70
The outline of the technologies of Quantum cryptography for realizing the Quantum Key Distribution platform, the trends ... [more] NS2021-70
pp.14-15
IA, ICSS 2021-06-21
13:30
Online Online secure isogeny-based cryptosystem CSIDH for side-channel attacks
Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IA2021-2 ICSS2021-2
pp.8-13
QIT
(2nd)
2021-05-24
10:10
Online Online Quantum-Classical Hybrid Algorithm for LWE Problems
Yasuhito Kawano (Chubu Univ.)
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more]
ICM 2021-03-18
10:30
Online Online [Invited Talk] Quantum Technology and Innovation Strategy
Toshio Tonouchi (RIKEN) ICM2020-62
Quantum technology is an innovation technology, which is a key to the rapid and discontinuity development of economy and... [more] ICM2020-62
p.19
WBS, IT, ISEC 2021-03-04
11:45
Online Online Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IT2020-123 ISEC2020-53 WBS2020-42
pp.73-80
SIP, IT, RCS 2021-01-22
16:45
Online Online Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
pp.271-276
QIT
(2nd)
2020-12-10
10:10
Online Online Security of continuous variable quantum key distribution with digital signal processing
Takaya Matsuura, Kento Maeda, Toshihiko Sasaki, Masato Koashi (U-Tokyo)
Continuous-variable (CV) quantum key distribution (QKD) uses homodyne/heterodyne measurement, which is technologically m... [more]
 Results 1 - 20 of 86  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan