IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 35  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Improvement of non-interactive privacy-preserving document classification
Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
pp.279-286
EMM 2024-01-16
15:25
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Federated Learning with Enhanced Privacy Protection in AI
Lihua Wang (NICT) EMM2023-83
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] EMM2023-83
p.19
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2023-03-23
16:25
Kagoshima Amagi Town Disaster Prevention Center (Tokunoshima)
(Primary: On-site, Secondary: Online)
Evaluation of Bit-Reduced Homomorphic Encryption Library on Intel Xeon and Fujitsu A64FX
Masaki Nishi, Teppei Shishido, Xinyi Li, Keiji Kimura (Waseda Univ.), Kentaro Sano (RIKEN) CPSY2022-38 DC2022-97
As deep learning is used in various applications, the protection of training data, input data, inference results, and tr... [more] CPSY2022-38 DC2022-97
pp.25-30
HWS, ICD 2022-10-25
14:50
Shiga
(Primary: On-site, Secondary: Online)
Design and Prototype Evaluation of Stochastic Encrypted Computing Hardware
Yuki Tamura, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2022-38 ICD2022-30
This paper describes the design and evaluation of Homomorphic Encryption for
Stochastic Computing (HESC) hardware.HESC ... [more]
HWS2022-38 ICD2022-30
pp.46-51
HWS, ICD 2022-10-25
15:40
Shiga
(Primary: On-site, Secondary: Online)
Hardware Acceleration of TFHE-based Adder by Controlling Error
Yinfan Zhao, Ikeda Makoto (Univ. of Tokyo) HWS2022-40 ICD2022-32
Fully homomorphic encryption (FHE) is expected to be used in the secure delegating computation. The bootstrapping in the... [more] HWS2022-40 ICD2022-32
pp.58-63
CPSY, DC, IPSJ-ARC [detail] 2022-07-28
15:45
Yamaguchi Kaikyo Messe Shimonoseki
(Primary: On-site, Secondary: Online)
Acceleration of HE-Transformer with bit reduced SEAL and HEXL
Xinyi Li, Masaki Nishi, Teppei Shishido, Keiji Kimura (Waseda Univ.) CPSY2022-12 DC2022-12
While cloud applications are covering people's privacy data, their related risks, such as theft risk, leak risk, and oth... [more] CPSY2022-12 DC2022-12
pp.65-70
IT, ISEC, RCC, WBS 2022-03-11
09:40
Online Online [Invited Talk] Fundamentals and Security of Encrypted Control Systems
Kiminao Kogiso, Kaoru Teranishi (UEC) IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85
Networked control systems are constantly exposed to the threat of cyberattacks by malicious third parties. Cyberattacks ... [more] IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85
p.161
VLD, HWS [detail] 2022-03-07
11:50
Online Online An efficient scheme of homomorphic encryption for stochastic computing and its performance evaluation
Ryusuke Koseki, Rei Ueno, Akira Ito, Naofumi Homma (Tohoku Univ.) VLD2021-82 HWS2021-59
This paper describes how to improve the efficiency of Homomorphic Encryption for Stochastic Computing (HESC) and its per... [more] VLD2021-82 HWS2021-59
pp.37-42
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
16:35
Online Online A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing.
Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20
In this paper, we describe a construct and evaluation of probabilistic homomorphic encryption (PHE)scheme. PHE is const... [more] ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20
pp.61-67
HWS, VLD [detail] 2020-03-07
14:15
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Algorithm and Architecture Design for Fully Homomorphic Encryption Hardware
Shotaro Sugiyama, Makoto Ikeda (Tokyo Univ.) VLD2019-144 HWS2019-117
Fully Homomorphic Encryption (FHE), a core technology of privacy guard on cloud services, has a disadvantage of high com... [more] VLD2019-144 HWS2019-117
pp.285-290
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2020-02-27
17:20
Kagoshima Yoron-cho Chuou-Kouminkan Toward acceleration of matrix multiplication on homomorphic encryption library
Tetsuya Makita, Teppei Shishido (Waseda Univ.), Yasutaka Wada (Meisei Univ.), Keiji Kimura (Waseda Univ.) CPSY2019-96 DC2019-102
(To be available after the conference date) [more] CPSY2019-96 DC2019-102
pp.51-56
ISEC, SITE, LOIS 2019-11-02
15:50
Osaka Osaka Univ. A Note on Encryption-based Recommender Systems
Seiya Jumonji, Kazuya Sakai (TMU) ISEC2019-85 SITE2019-79 LOIS2019-44
Collaborative filtering recommends unknown contents to a user based on the past behavior or review of the user and is us... [more] ISEC2019-85 SITE2019-79 LOIS2019-44
pp.149-152
DE 2019-06-22
10:50
Tokyo   Efficient Similar Document Search over Encrypted Data On the Cloud
Daisuke Aritomo (Univ. of Tsukuba), Chiemi Watanabe (NTUT) DE2019-7
More and more data owners are building information retrieval systems on cloud computing platforms, which provides scalab... [more] DE2019-7
pp.29-34
MoNA 2019-01-16
13:25
Kyoto T. B. D. [Encouragement Talk] A Study of Distributed Secure Data Mining System while Updating Database using Fully Homomorphic Encryption
Yuri Yamamoto, Masato Oguchi (Ochanomizu Univ.) MoNA2018-62
Uploading commercial data to third-party cloud services is popular in general. To further promote the active utilizatio... [more] MoNA2018-62
pp.27-32
IT 2018-07-19
14:30
Nara Yamato Kaigishitsu A homomorphic encryption based on non-commutative algebra and its implementation
Maki Kihara, Satoshi Iriyama (TUS) IT2018-14
Homomorphic encryption is the cryptographic system with additively or multiplicatively homomorphism. Paillier and RSA ar... [more] IT2018-14
pp.11-13
PRMU, CNR 2018-02-19
13:50
Wakayama   Use of Homomorphic Encryption for Secret Person Re-identification
Kazunari Morita, Masaki Harayama, Hiroki Yoshimura, Masashi Nishiyama, Yoshio Iwai (Tottori Univ.) PRMU2017-154 CNR2017-32
In this paper, We propose a person re-identification method during cameras with homomorphic encryption. homomorphic encr... [more] PRMU2017-154 CNR2017-32
pp.53-58
MoNA 2017-12-21
14:40
Tokyo Ochanomizu University A Study of Decentralization for Data Mining System Implemented with Fully Homomorphic Encryption
Yuri Yamamoto, Masato Oguchi (Ochanomizu Univ.) MoNA2017-37
For promoting utilization of big data, outsourcing systems have been proposed in which transaction data such as purchase... [more] MoNA2017-37
pp.49-53
MoNA 2017-12-21
15:05
Tokyo Ochanomizu University MoNA2017-38 Putting genome data to practical use is drawing more attention as it becomes possible to analyze human genome data and a... [more] MoNA2017-38
pp.55-58
DC, SS 2016-10-27
14:05
Shiga Hikone Kinro-Fukushi Kaikan Bldg. Note on Data Aggregation on Smart Grid Communications Considering Fault Tolerance and Privacy
Ryota Ogasawara, Masayuki Arai (Nihon Univ.) SS2016-23 DC2016-25
In smart grid communications it is important to aggregate users' usage data while preserving privacy. In this paper we p... [more] SS2016-23 DC2016-25
pp.31-36
ISEC 2016-09-02
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
pp.27-34
 Results 1 - 20 of 35  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan