IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 35 of 35 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2016-03-11
13:05
Tokyo The University of Electro-Communications [Invited Talk] A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools
Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] IT2015-136 ISEC2015-95 WBS2015-119
p.219
ICSS, IPSJ-SPT 2016-03-04
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Privacy-enhanced Similarity Search Scheme for Cloud Image Databases
Hao Liu, Hideaki Goto (Tohoku Univ.) ICSS2015-68
With the increasing use of Cloud Service in recent years, its security vulnerabilities becomes a bigger concern, for one... [more] ICSS2015-68
pp.129-133
IBISML 2015-11-27
14:00
Ibaraki Epochal Tsukuba [Poster Presentation] Secure Approximation Guarantee for Private Empirical Risk Minimization with Homomorphic Encryption
Toshiyuki Takada, Hiroyuki Hanada (NIT), Jun Sakuma (Univ.Tsukuba), Ichiro takeuchi (NIT) IBISML2015-86
Privacy concern has been increasingly important in many machine learning problems. In this paper, we study empirical ris... [more] IBISML2015-86
pp.249-256
ISEC 2015-09-04
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces (from Eurocrypt 2015)
Kaoru Kurosawa (Ibaraki Univ.) ISEC2015-35
In this invited talk,
we explain the paper,
``(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Mess... [more]
ISEC2015-35
p.57
CS 2015-07-03
11:40
Okinawa Eef Information Plaza (Kumejima Is.) Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information
Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] CS2015-28
pp.103-108
ISEC, IT, WBS 2015-03-02
14:05
Fukuoka The University of Kitakyushu On the Limit of Security Proof for Homomorphic Encryption
Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more]
IT2014-67 ISEC2014-80 WBS2014-59
pp.33-38
ISEC, IT, WBS 2015-03-02
14:30
Fukuoka The University of Kitakyushu An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme
Tomoki Hayafuji, Masahiro Mambo (Kanazawa Univ.) IT2014-68 ISEC2014-81 WBS2014-60
Multikey homomorphic encryption is an extended variant of a single key homomorphic encryption where ciphertexts encrypte... [more] IT2014-68 ISEC2014-81 WBS2014-60
pp.39-46
ISEC, LOIS 2013-11-28
15:25
Miyagi Tohoku Univ. Efficient Multi-Party Private Set Intersection Protocol
Tomoaki Mimoto, Atsuko Miyaji (JAIST) ISEC2013-63 LOIS2013-29
Private Set Intersection Protocol(PSI) is a protocol by which two or more players with each data sets can compute some i... [more] ISEC2013-63 LOIS2013-29
pp.29-34
SIS 2013-06-13
13:00
Kagoshima Houzan Hall (Kagoshima) [Tutorial Lecture] Signal Processing in the Encrypted Domain -- Development of a New Technique for Secure Manipulation of Signals --
Akio Miyazaki (Kyushu Sangyo Univ.) SIS2013-4
We have established the fundamental techniques for computing with signals that are encrypted or otherwise hidden often r... [more] SIS2013-4
pp.17-21
ISEC 2012-09-21
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Jean-Sebastien Coron (Univ. of Luxembourg), David Naccache (ENS), Mehdi Tibouchi (NTT) ISEC2012-50
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan's (D... [more] ISEC2012-50
p.37
SITE 2011-10-18
14:25
Tokyo   A study on privacy protection scheme for Smart Grid using homomorphic encryption
Shinji Yamanaka, Yuichi Komano, Satoshi Ito (TOSHIBA) SITE2011-25
In the smart grid, a smart meter which contains communication facilities is used to monitor and manage the home electric... [more] SITE2011-25
pp.7-12
ISEC 2011-09-09
16:45
Tokyo Kikai-Shinko-Kaikan Bldg. On the security of the fully-homomorphic encryption scheme based on ideal lattices
Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure (Fujitsu Lab.) ISEC2011-33
A fully-homomorphic encryption is a public-key encryption that allows one to fully interact with encypted data without b... [more] ISEC2011-33
pp.43-50
ISEC, IT, WBS 2011-03-03
10:25
Osaka Osaka University Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric) IT2010-69 ISEC2010-73 WBS2010-48
Hattori et al. proposed privacy-preserving biometric authentication protocols with generic 2-DNF homomorphic encryption ... [more] IT2010-69 ISEC2010-73 WBS2010-48
pp.7-14
IA 2010-11-24
14:45
Yamanashi Seisen-Ryo Bidirectional Policy Matching using Homomorphic Encryption Systems
Fumihiro Mori, Hirofumi Yamaki (Nagoya Univ.) IA2010-52
Automated Trust Negotiation(ATN) is a mechanism to establish mutual trust between service providers and users in the Int... [more] IA2010-52
pp.7-12
ISEC, LOIS 2009-11-13
14:15
Gifu Gifu Univ. Secure Biometric Authentication Using 2-DNF Homomorphic Encryption
Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric) ISEC2009-68 LOIS2009-57
In this paper, a secure biometric authentication protocol is proposed which can authenticate users using encrypted biome... [more] ISEC2009-68 LOIS2009-57
pp.113-120
 Results 21 - 35 of 35 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan