Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2016-03-11 13:05 |
Tokyo |
The University of Electro-Communications |
[Invited Talk]
A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119 |
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] |
IT2015-136 ISEC2015-95 WBS2015-119 p.219 |
ICSS, IPSJ-SPT |
2016-03-04 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Privacy-enhanced Similarity Search Scheme for Cloud Image Databases Hao Liu, Hideaki Goto (Tohoku Univ.) ICSS2015-68 |
With the increasing use of Cloud Service in recent years, its security vulnerabilities becomes a bigger concern, for one... [more] |
ICSS2015-68 pp.129-133 |
IBISML |
2015-11-27 14:00 |
Ibaraki |
Epochal Tsukuba |
[Poster Presentation]
Secure Approximation Guarantee for Private Empirical Risk Minimization with Homomorphic Encryption Toshiyuki Takada, Hiroyuki Hanada (NIT), Jun Sakuma (Univ.Tsukuba), Ichiro takeuchi (NIT) IBISML2015-86 |
Privacy concern has been increasingly important in many machine learning problems. In this paper, we study empirical ris... [more] |
IBISML2015-86 pp.249-256 |
ISEC |
2015-09-04 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces (from Eurocrypt 2015) Kaoru Kurosawa (Ibaraki Univ.) ISEC2015-35 |
In this invited talk,
we explain the paper,
``(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Mess... [more] |
ISEC2015-35 p.57 |
CS |
2015-07-03 11:40 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28 |
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] |
CS2015-28 pp.103-108 |
ISEC, IT, WBS |
2015-03-02 14:05 |
Fukuoka |
The University of Kitakyushu |
On the Limit of Security Proof for Homomorphic Encryption Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59 |
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more] |
IT2014-67 ISEC2014-80 WBS2014-59 pp.33-38 |
ISEC, IT, WBS |
2015-03-02 14:30 |
Fukuoka |
The University of Kitakyushu |
An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme Tomoki Hayafuji, Masahiro Mambo (Kanazawa Univ.) IT2014-68 ISEC2014-81 WBS2014-60 |
Multikey homomorphic encryption is an extended variant of a single key homomorphic encryption where ciphertexts encrypte... [more] |
IT2014-68 ISEC2014-81 WBS2014-60 pp.39-46 |
ISEC, LOIS |
2013-11-28 15:25 |
Miyagi |
Tohoku Univ. |
Efficient Multi-Party Private Set Intersection Protocol Tomoaki Mimoto, Atsuko Miyaji (JAIST) ISEC2013-63 LOIS2013-29 |
Private Set Intersection Protocol(PSI) is a protocol by which two or more players with each data sets can compute some i... [more] |
ISEC2013-63 LOIS2013-29 pp.29-34 |
SIS |
2013-06-13 13:00 |
Kagoshima |
Houzan Hall (Kagoshima) |
[Tutorial Lecture]
Signal Processing in the Encrypted Domain
-- Development of a New Technique for Secure Manipulation of Signals -- Akio Miyazaki (Kyushu Sangyo Univ.) SIS2013-4 |
We have established the fundamental techniques for computing with signals that are encrypted or otherwise hidden often r... [more] |
SIS2013-4 pp.17-21 |
ISEC |
2012-09-21 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Jean-Sebastien Coron (Univ. of Luxembourg), David Naccache (ENS), Mehdi Tibouchi (NTT) ISEC2012-50 |
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan's (D... [more] |
ISEC2012-50 p.37 |
SITE |
2011-10-18 14:25 |
Tokyo |
|
A study on privacy protection scheme for Smart Grid using homomorphic encryption Shinji Yamanaka, Yuichi Komano, Satoshi Ito (TOSHIBA) SITE2011-25 |
In the smart grid, a smart meter which contains communication facilities is used to monitor and manage the home electric... [more] |
SITE2011-25 pp.7-12 |
ISEC |
2011-09-09 16:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the security of the fully-homomorphic encryption scheme based on ideal lattices Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure (Fujitsu Lab.) ISEC2011-33 |
A fully-homomorphic encryption is a public-key encryption that allows one to fully interact with encypted data without b... [more] |
ISEC2011-33 pp.43-50 |
ISEC, IT, WBS |
2011-03-03 10:25 |
Osaka |
Osaka University |
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric) IT2010-69 ISEC2010-73 WBS2010-48 |
Hattori et al. proposed privacy-preserving biometric authentication protocols with generic 2-DNF homomorphic encryption ... [more] |
IT2010-69 ISEC2010-73 WBS2010-48 pp.7-14 |
IA |
2010-11-24 14:45 |
Yamanashi |
Seisen-Ryo |
Bidirectional Policy Matching using Homomorphic Encryption Systems Fumihiro Mori, Hirofumi Yamaki (Nagoya Univ.) IA2010-52 |
Automated Trust Negotiation(ATN) is a mechanism to establish mutual trust between service providers and users in the Int... [more] |
IA2010-52 pp.7-12 |
ISEC, LOIS |
2009-11-13 14:15 |
Gifu |
Gifu Univ. |
Secure Biometric Authentication Using 2-DNF Homomorphic Encryption Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric) ISEC2009-68 LOIS2009-57 |
In this paper, a secure biometric authentication protocol is proposed which can authenticate users using encrypted biome... [more] |
ISEC2009-68 LOIS2009-57 pp.113-120 |