Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Improvement of non-interactive privacy-preserving document classification Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102 |
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] |
IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102 pp.279-286 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-23 16:25 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
Evaluation of Bit-Reduced Homomorphic Encryption Library on Intel Xeon and Fujitsu A64FX Masaki Nishi, Teppei Shishido, Xinyi Li, Keiji Kimura (Waseda Univ.), Kentaro Sano (RIKEN) CPSY2022-38 DC2022-97 |
As deep learning is used in various applications, the protection of training data, input data, inference results, and tr... [more] |
CPSY2022-38 DC2022-97 pp.25-30 |
HWS, ICD |
2022-10-25 14:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Prototype Evaluation of Stochastic Encrypted Computing Hardware Yuki Tamura, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2022-38 ICD2022-30 |
This paper describes the design and evaluation of Homomorphic Encryption for
Stochastic Computing (HESC) hardware.HESC ... [more] |
HWS2022-38 ICD2022-30 pp.46-51 |
HWS, ICD |
2022-10-25 15:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
Hardware Acceleration of TFHE-based Adder by Controlling Error Yinfan Zhao, Ikeda Makoto (Univ. of Tokyo) HWS2022-40 ICD2022-32 |
Fully homomorphic encryption (FHE) is expected to be used in the secure delegating computation. The bootstrapping in the... [more] |
HWS2022-40 ICD2022-32 pp.58-63 |
CPSY, DC, IPSJ-ARC [detail] |
2022-07-28 15:45 |
Yamaguchi |
Kaikyo Messe Shimonoseki (Primary: On-site, Secondary: Online) |
Acceleration of HE-Transformer with bit reduced SEAL and HEXL Xinyi Li, Masaki Nishi, Teppei Shishido, Keiji Kimura (Waseda Univ.) CPSY2022-12 DC2022-12 |
While cloud applications are covering people's privacy data, their related risks, such as theft risk, leak risk, and oth... [more] |
CPSY2022-12 DC2022-12 pp.65-70 |
IT, ISEC, RCC, WBS |
2022-03-11 09:40 |
Online |
Online |
[Invited Talk]
Fundamentals and Security of Encrypted Control Systems Kiminao Kogiso, Kaoru Teranishi (UEC) IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85 |
Networked control systems are constantly exposed to the threat of cyberattacks by malicious third parties. Cyberattacks ... [more] |
IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85 p.161 |
VLD, HWS [detail] |
2022-03-07 11:50 |
Online |
Online |
An efficient scheme of homomorphic encryption for stochastic computing and its performance evaluation Ryusuke Koseki, Rei Ueno, Akira Ito, Naofumi Homma (Tohoku Univ.) VLD2021-82 HWS2021-59 |
This paper describes how to improve the efficiency of Homomorphic Encryption for Stochastic Computing (HESC) and its per... [more] |
VLD2021-82 HWS2021-59 pp.37-42 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:35 |
Online |
Online |
A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing. Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 |
In this paper, we describe a construct and evaluation of probabilistic homomorphic encryption (PHE)scheme. PHE is const... [more] |
ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 pp.61-67 |
HWS, VLD [detail] |
2020-03-07 14:15 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Algorithm and Architecture Design for Fully Homomorphic Encryption Hardware Shotaro Sugiyama, Makoto Ikeda (Tokyo Univ.) VLD2019-144 HWS2019-117 |
Fully Homomorphic Encryption (FHE), a core technology of privacy guard on cloud services, has a disadvantage of high com... [more] |
VLD2019-144 HWS2019-117 pp.285-290 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2020-02-27 17:20 |
Kagoshima |
Yoron-cho Chuou-Kouminkan |
Toward acceleration of matrix multiplication on homomorphic encryption library Tetsuya Makita, Teppei Shishido (Waseda Univ.), Yasutaka Wada (Meisei Univ.), Keiji Kimura (Waseda Univ.) CPSY2019-96 DC2019-102 |
(To be available after the conference date) [more] |
CPSY2019-96 DC2019-102 pp.51-56 |
ISEC, SITE, LOIS |
2019-11-02 15:50 |
Osaka |
Osaka Univ. |
A Note on Encryption-based Recommender Systems Seiya Jumonji, Kazuya Sakai (TMU) ISEC2019-85 SITE2019-79 LOIS2019-44 |
Collaborative filtering recommends unknown contents to a user based on the past behavior or review of the user and is us... [more] |
ISEC2019-85 SITE2019-79 LOIS2019-44 pp.149-152 |
DE |
2019-06-22 10:50 |
Tokyo |
|
Efficient Similar Document Search over Encrypted Data On the Cloud Daisuke Aritomo (Univ. of Tsukuba), Chiemi Watanabe (NTUT) DE2019-7 |
More and more data owners are building information retrieval systems on cloud computing platforms, which provides scalab... [more] |
DE2019-7 pp.29-34 |
MoNA |
2019-01-16 13:25 |
Kyoto |
T. B. D. |
[Encouragement Talk]
A Study of Distributed Secure Data Mining System while Updating Database using Fully Homomorphic Encryption Yuri Yamamoto, Masato Oguchi (Ochanomizu Univ.) MoNA2018-62 |
Uploading commercial data to third-party cloud services is popular in general. To further promote the active utilizatio... [more] |
MoNA2018-62 pp.27-32 |
IT |
2018-07-19 14:30 |
Nara |
Yamato Kaigishitsu |
A homomorphic encryption based on non-commutative algebra and its implementation Maki Kihara, Satoshi Iriyama (TUS) IT2018-14 |
Homomorphic encryption is the cryptographic system with additively or multiplicatively homomorphism. Paillier and RSA ar... [more] |
IT2018-14 pp.11-13 |
PRMU, CNR |
2018-02-19 13:50 |
Wakayama |
|
Use of Homomorphic Encryption for Secret Person Re-identification Kazunari Morita, Masaki Harayama, Hiroki Yoshimura, Masashi Nishiyama, Yoshio Iwai (Tottori Univ.) PRMU2017-154 CNR2017-32 |
In this paper, We propose a person re-identification method during cameras with homomorphic encryption. homomorphic encr... [more] |
PRMU2017-154 CNR2017-32 pp.53-58 |
MoNA |
2017-12-21 14:40 |
Tokyo |
Ochanomizu University |
A Study of Decentralization for Data Mining System Implemented with Fully Homomorphic Encryption Yuri Yamamoto, Masato Oguchi (Ochanomizu Univ.) MoNA2017-37 |
For promoting utilization of big data, outsourcing systems have been proposed in which transaction data such as purchase... [more] |
MoNA2017-37 pp.49-53 |
MoNA |
2017-12-21 15:05 |
Tokyo |
Ochanomizu University |
MoNA2017-38 |
Putting genome data to practical use is drawing more attention as it becomes possible to analyze human genome data and a... [more] |
MoNA2017-38 pp.55-58 |
DC, SS |
2016-10-27 14:05 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Note on Data Aggregation on Smart Grid Communications Considering Fault Tolerance and Privacy Ryota Ogasawara, Masayuki Arai (Nihon Univ.) SS2016-23 DC2016-25 |
In smart grid communications it is important to aggregate users' usage data while preserving privacy. In this paper we p... [more] |
SS2016-23 DC2016-25 pp.31-36 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |