IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] 2021-06-28
17:40
Online Online Translation Dose Not Contain Meaning -- Translation is Physical Layer Phenomenon --
Kumon Tokumaru (Writer) NC2021-11 IBISML2021-11
Translation introduces intelligence from external societies into a linguistic community. However it is not easy to impor... [more] NC2021-11 IBISML2021-11
pp.78-84
ISEC 2017-05-12
10:25
Tokyo Kikai-Shinko-Kaikan Bldg. Fully Secure Oblivious Keyword Search
Kaoru Kurosawa, Yuuki Nemoto (Ibaraki Univ.) ISEC2017-2
Oblivious keyword search (OKS) is a secure two party protocol such that the server has ( Data={(x_i,m_i)} ), and the cli... [more] ISEC2017-2
pp.7-14
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
09:10
Hokkaido   A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
pp.247-254
ISEC, LOIS 2011-11-15
13:25
Osaka Osaka Electro-Communication University SLP separates the strong RSA assumption from the DDH assumption
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) ISEC2011-55 LOIS2011-49
Although we have many computational reductions among the cryptographic primitives, little is known about the relationshi... [more] ISEC2011-55 LOIS2011-49
pp.141-148
ISEC, SITE, IPSJ-CSEC 2007-07-20
15:45
Hokkaido Future University-Hakodate Efficient Group Signature Scheme based on the DDH Problem
Takuya Yoshida, Koji Okada (Toshiba Solutions) ISEC2007-66
We propose an efficient group signature scheme, which is based on the DDH problem. A group signature scheme can be used ... [more] ISEC2007-66
pp.141-146
ISEC 2005-05-18
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Ring Signature Schemes with Innocence Assertion Revisited (Part 2) -- Group Signatures Strengthening the Signers' Privacy --
Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Atsushi Shimbo, Shinichi Kawamura (Toshiba)
This paper reconsiders the ring signature scheme with innocence assertion [10] as a group signature scheme. The ring sig... [more] ISEC2005-2
pp.9-16
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan