IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 203

Information Security

Workshop Date : 2014-09-05 / Issue Date : 2014-08-29

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2014-47
New Class of Multivariate Public Key Cryptosystem, K(X)RSE(2)PKC and K_M(X)RSE(2)PKC Constructed based on Reed-Solomon Code, along with K(XI)RSE(2)PKC.
Masao Kasahara (Waseda Univ./Chuo Univ.)
pp. 1 - 7

ISEC2014-48
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution: Part II
Takehisa Iwakoshi (Tamagawa Univ.)
pp. 9 - 11

ISEC2014-49
Fail-Stop Signature Scheme with TTP and Its UC-Security
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.)
pp. 13 - 20

ISEC2014-50
Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System
Shahidatul Sadiah (Okayama Univ.), Toru Nakanishi (Hiroshima Univ.), Nobuo Funabiki (Okayama Univ.)
pp. 21 - 26

ISEC2014-51
Computer Simulation of Garbled Searchable Symmetric Encryption Scheme
Keisuke Sasaki, Kaoru Kurosawa (Ibaraki Univ.)
pp. 27 - 34

ISEC2014-52
GPU implementation of Ciphers using Schematic to Program Translator(SPT)
Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA)
pp. 35 - 42

ISEC2014-53
A Report on EUROCRYPT 2014
Ryotaro Hayashi (Toshiba)
pp. 43 - 45

ISEC2014-54
[Invited Talk] Dual System Encryption via Doubly Selective Security -- A Generic Framework for Fully-Secure Predicate Encryption --
Nuttapong Attrapadung (AIST)
p. 47

ISEC2014-55
[Invited Talk] Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu (NEC)
p. 49

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan