|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2021-06-28 17:40 |
Online |
Online |
Translation Dose Not Contain Meaning
-- Translation is Physical Layer Phenomenon -- Kumon Tokumaru (Writer) NC2021-11 IBISML2021-11 |
Translation introduces intelligence from external societies into a linguistic community. However it is not easy to impor... [more] |
NC2021-11 IBISML2021-11 pp.78-84 |
ISEC |
2017-05-12 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fully Secure Oblivious Keyword Search Kaoru Kurosawa, Yuuki Nemoto (Ibaraki Univ.) ISEC2017-2 |
Oblivious keyword search (OKS) is a secure two party protocol such that the server has ( Data={(x_i,m_i)} ), and the cli... [more] |
ISEC2017-2 pp.7-14 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 09:10 |
Hokkaido |
|
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 |
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] |
ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 pp.247-254 |
ISEC, LOIS |
2011-11-15 13:25 |
Osaka |
Osaka Electro-Communication University |
SLP separates the strong RSA assumption from the DDH assumption Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) ISEC2011-55 LOIS2011-49 |
Although we have many computational reductions among the cryptographic primitives, little is known about the relationshi... [more] |
ISEC2011-55 LOIS2011-49 pp.141-148 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:45 |
Hokkaido |
Future University-Hakodate |
Efficient Group Signature Scheme based on the DDH Problem Takuya Yoshida, Koji Okada (Toshiba Solutions) ISEC2007-66 |
We propose an efficient group signature scheme, which is based on the DDH problem. A group signature scheme can be used ... [more] |
ISEC2007-66 pp.141-146 |
ISEC |
2005-05-18 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Ring Signature Schemes with Innocence Assertion Revisited (Part 2)
-- Group Signatures Strengthening the Signers' Privacy -- Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Atsushi Shimbo, Shinichi Kawamura (Toshiba) |
This paper reconsiders the ring signature scheme with innocence assertion [10] as a group signature scheme. The ring sig... [more] |
ISEC2005-2 pp.9-16 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|