|
Chair |
|
Koichi Sakurai (Kyushu Univ.) |
Vice Chair |
|
Yukiyasu Tsunoo (NEC), Masahiro Mambo (Kanazawa Univ.) |
Secretary |
|
Tetsu Iwata (Nagoya Univ.), Goichiro Hanaoka (AIST) |
Assistant |
|
Tetsuya Izu (Fujitsu Lab.), Junpei Kawamoto (Kyushu Univ.), Yuichi Komano (Toshiba), Shigeyoshi Shima (NEC), Takaaki Mizuki (Tohoku Univ.) |
|
Conference Date |
Fri, Sep 5, 2014 13:20 - 17:35 |
Topics |
|
Conference Place |
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, Sep 5 PM 13:20 - 17:35 |
(1) |
13:20-13:45 |
New Class of Multivariate Public Key Cryptosystem, K(X)RSE(2)PKC and K_M(X)RSE(2)PKC Constructed based on Reed-Solomon Code, along with K(XI)RSE(2)PKC. ISEC2014-47 |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(2) |
13:45-14:10 |
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution: Part II ISEC2014-48 |
Takehisa Iwakoshi (Tamagawa Univ.) |
(3) |
14:10-14:35 |
Fail-Stop Signature Scheme with TTP and Its UC-Security ISEC2014-49 |
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) |
|
14:35-14:45 |
Break ( 10 min. ) |
(4) |
14:45-15:10 |
Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System ISEC2014-50 |
Shahidatul Sadiah (Okayama Univ.), Toru Nakanishi (Hiroshima Univ.), Nobuo Funabiki (Okayama Univ.) |
(5) |
15:10-15:35 |
Computer Simulation of Garbled Searchable Symmetric Encryption Scheme ISEC2014-51 |
Keisuke Sasaki, Kaoru Kurosawa (Ibaraki Univ.) |
(6) |
15:35-16:00 |
GPU implementation of Ciphers using Schematic to Program Translator(SPT) ISEC2014-52 |
Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) |
|
16:00-16:10 |
Break ( 10 min. ) |
(7) |
16:10-16:35 |
A Report on EUROCRYPT 2014 ISEC2014-53 |
Ryotaro Hayashi (Toshiba) |
(8) |
16:35-17:05 |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- ISEC2014-54 |
Nuttapong Attrapadung (AIST) |
(9) |
17:05-17:35 |
[Invited Talk]
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions ISEC2014-55 |
Kazuhiko Minematsu (NEC) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-: ic-c (to ISEC secretaries) |
Last modified: 2014-08-15 21:45:06
|