Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2024-05-15 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6 |
Identity-based matchmaking encryption (IB-ME) is a generalization of identity-based encryption (IBE), in which both the ... [more] |
ISEC2024-6 p.22 |
NLC |
2023-09-07 10:20 |
Osaka |
Osaka Metropolitan University. Nakamozu Campus. (Primary: On-site, Secondary: Online) |
An Investigation of Suggested Keywords Generation Method for Search Behavior Analysis Using Large-Scale Language Model Yumeto Inaoka (Faber Company), Mitsuo Yoshida (Univ. Tsukuba) NLC2023-9 |
In content marketing, it is vital to produce beneficial content that fits with customer needs by utilizing the knowledge... [more] |
NLC2023-9 pp.47-50 |
IT |
2023-08-04 11:00 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
The Outer Bounds for the General Secret-Private Key Capacity Region for Three Terminals Gustavo Oliveira, Shun Watanabe (TUAT) IT2023-24 |
We consider the general model for secret key generation between three terminals in which they are required to generate o... [more] |
IT2023-24 pp.56-61 |
AP, SANE, SAT (Joint) |
2023-07-12 15:00 |
Hokkaido |
The Citizen Activity Center (Primary: On-site, Secondary: Online) |
Quantum Signal Transmission Experiment for Line-of-sight Quantum Key Distribution Hiroyuki Endo, Mitsuo Kitamura, Shunsuke Ozawa (NICT), Ryosuke Shimizu (UEC), Mikio Fujiwara, Masahide Sasaki (NICT) SAT2023-13 |
Quantum key distribution (QKD) can be secure against any physically allowable attacks. Its transmission distance and key... [more] |
SAT2023-13 pp.19-24 |
RCC, ISEC, IT, WBS |
2023-03-14 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Identity-based Matchmaking Encryption Secure against the KGC Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 |
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] |
IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 pp.179-186 |
AI |
2022-12-21 15:50 |
Fukuoka |
|
Generating Student Progress Reports in Cram School Based on Keywords Shumpei Kobashi, Tsunenori Mine (Kyushu Univ) AI2022-44 |
In many cram schools, instructors write reports on students' progress after each class. The generation of these reports ... [more] |
AI2022-44 pp.62-67 |
QIT (2nd) |
2022-12-08 14:00 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Quantum State Generation using DPQPSK Modulator for High Speed Quantum Key Distribution Yuki Sugawara, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
In implementing a high-speed QKD system, distortions in the modulation signal degrade the performance of the QKD system.... [more] |
|
RCS |
2022-06-17 15:20 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66 |
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] |
RCS2022-66 pp.247-252 |
RECONF |
2021-06-08 13:00 |
Online |
Online |
[Invited Talk]
Basics, Applications, and International Standardization of Physically Unclonable Functions (PUFs) Yohei Hori (AIST) RECONF2021-1 |
A Physically Unclonable Function (PUF) is a security primitive that generates chip-specific values by exploiting device ... [more] |
RECONF2021-1 p.1 |
AI |
2020-12-10 15:00 |
Shizuoka |
Online and HAMAMATSU ACT CITY (Primary: On-site, Secondary: Online) |
Realizing a Paper Title Generation System Using BERT for Keyword Extraction and Title Evaluation Kento Kaku, Tadachika Ozono, Toramatsu Shintani (NITech) AI2020-4 |
It is necessary to create a system that proposes appropriate titles in order to support the creation of titles that accu... [more] |
AI2020-4 pp.19-24 |
WIT |
2020-09-08 14:45 |
Online |
Online |
Sign Language Learning Support System
-- Proposal of Functions as Clearly Indicate Learning Points using Sign Keyframe -- Sho Inooka (SIT), Ken Tsutsuguchi (Sojo Univ.), Shunichi Yonemura (SIT) WIT2020-8 |
In case of novices learn sign language in self-study, they use books and videos as learning materials. Although illustra... [more] |
WIT2020-8 pp.15-20 |
SAT, RCS (Joint) |
2020-08-21 09:25 |
Online |
Online |
A study on encrypted hybrid modulation scheme using chaos modulation and QAM Tomoki Kaga, Mamoru Okumura, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-83 |
In the fifth generation mobile communications system (5G), it is important to ensure wireless security as well as to rea... [more] |
RCS2020-83 pp.23-28 |
QIT (2nd) |
2019-11-18 13:50 |
Tokyo |
Gakushuin University |
[Poster Presentation]
Analysis of the effects of the two-photon distinguishability on decoy state measurement-device-independent quantum key distribution Haobo Ge, Akihisa Tomita, Kazuhisa Ogawa, Atsushi Okamoto (Hokkaido Univ.) |
Measurement-device-independent quantum key distribution (MDI-QKD) protects the receiver from attacks against the measure... [more] |
|
QIT (2nd) |
2018-06-05 10:00 |
Hiroshima |
ICCH Ran |
State tomographic characterization of BB84 states generated by a Dual-Parallel Modulator Weiyang Zhang, Akihisa Tomita, Yu Kadosawa, Kazuhisa Ogawa (Hokkaido Univ.) |
We have proposed the use of Dual-Parallel Modulator to generate BB84 states to reduce the state preparation flaw due to ... [more] |
|
MoNA |
2018-01-18 17:30 |
Kyoto |
Campus Plaza Kyoto |
Signal Generation Method for Stable Vibration-based Data Communication Keishi Usa, Eiji Kamioka (SIT) MoNA2017-50 |
Vibration-based communication, which realizes communication by propagating vibration with information on a solid medium,... [more] |
MoNA2017-50 pp.51-56 |
QIT (2nd) |
2017-11-16 13:50 |
Saitama |
Saitama University |
[Poster Presentation]
BB84 Quantum Key Distribution system with a Dual-Parallel Modulator Weiyang Zhang, Yu Kadosawa, Akihisa Tomita, Kazuhisa Ogawa, Atsushi Okamoto (Hokkaido Univ.) |
The state preparation flaw which is generated by the pulse fluctuation in the signal applied for the phase modulator in ... [more] |
|
NS, ASN, RCC, RCS, SR (Joint) |
2017-07-19 14:35 |
Hokkaido |
Hokkaido Univ. |
A Study on Sampling Method of Independent Time Series and Evaluation of Secret Key Capacity in Secret key Agreement Based on Fading Variation Keita Kuroyanagi, Hideiti Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2017-101 |
There is increasing interesting about Secret key Agreement Scheme based on radio wave propagation characteristics as phy... [more] |
RCS2017-101 pp.49-54 |
ICSS, IA |
2016-06-06 15:40 |
Saga |
Saga University |
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4 |
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] |
IA2016-4 ICSS2016-4 pp.19-24 |
QIT (2nd) |
2016-05-30 10:10 |
Kochi |
Kochi University of Technology Eikokuji campus |
Quantum key distribution protocol with slow basis choice Toshihiko Sasaki (U Tokyo), Kiyoshi Tamaki (NTT), Masato koashi (U Tokyo) |
In order to improve the key generation rate of the quantum key distribution (QKD) protocols, we try to
make the signal ... [more] |
|
QIT (2nd) |
2016-05-30 13:00 |
Kochi |
Kochi University of Technology Eikokuji campus |
[Poster Presentation]
Generation of WDM time-bin entanglement using cascaded sum-frequency generation/spontaneous parametric down conversion in a PPLN waveguide device Shin Arahira, Hitoshi Murai, Hironori Sasaki (OKI) |
We report the generation of WDM time-bin entanglement by using cascaded optical nonlinearities: sum-frequency generation... [more] |
|