===============================================
Technical Committee on Information Security (ISEC)
Chair: Naoya Torii (Fujitsu Labs.)
Vice Chair: Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.)
Secretary: Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.)
Assistant: Tetsuya Izu (Fujitsu Labs.)
===============================================
Technical Committee on Life Intelligence and Office Information Systems (LOIS)
Chair: Masanobu Abe (Okayama Univ.) Vice Chair: Toshihiko Wakahara (Fukuoka Inst. of Tech.)
Secretary: Noriyasu Yamamoto (Fukuoka Inst. of Tech.), Tetsuya Kinebuchi (NTT)
Assistant: Hiroshi Konishi (NTT)
DATE:
Mon, Nov 14, 2011 10:00 - 17:40
Tue, Nov 15, 2011 09:00 - 16:30
PLACE:
I101, Ekimae Campus, Osaka Electro-Communication University(12-16, Hayakocho, Neyagawa, Osaka, 572-0837 Japan. http://oweb11.osakac.ac.jp/institution/access.html. Prof. Ryuichi Sakai. 072-824-8900)
TOPICS:
----------------------------------------
Mon, Nov 14 AM ISEC (10:00 - 11:40)
----------------------------------------
(1) 10:00 - 10:25
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.)
(2) 10:25 - 10:50
A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.)
(3) 10:50 - 11:15
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II)
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.)
(4) 11:15 - 11:40
An element-selective knapsack cryptosystem with encryption multipliers
Yuki Okada, Akira Hayashi (KIT)
----- Lunch ( 60 min. ) -----
----------------------------------------
Mon, Nov 14 PM LOIS -Life Log- (12:40 - 14:10)
----------------------------------------
(5) 12:40 - 13:10
A study on necessary location information accuracy in lifelog
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo)
(6) 13:10 - 13:40
Evaluation method for telephone conversations retrieval using precision and recall
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ)
(7) 13:40 - 14:10
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service --
Minako Toba (Hitachi, Ltd.)
----- Break ( 10 min. ) -----
----------------------------------------
Mon, Nov 14 PM ISEC (14:20 - 16:00)
----------------------------------------
(8) 14:20 - 14:45
Three dimensional Dyck Path Cipher
Jun Hashimoto, Akira Hayashi (KIT)
(9) 14:45 - 15:10
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
(10) 15:10 - 15:35
Ramp secret sharing scheme based on MBR codes
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University)
(11) 15:35 - 16:00
Formalization and Verification of Arithmetic Algorithms by Mizar
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.)
----- Break ( 10 min. ) -----
----------------------------------------
Mon, Nov 14 PM LOIS -Office System- (16:10 - 17:40)
----------------------------------------
(12) 16:10 - 16:40
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet --
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT)
(13) 16:40 - 17:10
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability --
Keisuke Saito, Masakatu Morii (Kobe Univ.)
(14) 17:10 - 17:40
A suudy of machine learning corresponding to the change of a turn and the of the recognition object
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.)
----------------------------------------
Tue, Nov 15 AM ISEC (09:00 - 10:40)
----------------------------------------
(15) 09:00 - 09:25
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.)
(16) 09:25 - 09:50
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.)
(17) 09:50 - 10:15
Optimized Right-to-Left Scalar Multiplication RIP Algorithms
Atsuko Miyaji, Yiren Mo (JAIST)
(18) 10:15 - 10:40
Efficient Privacy Preserving Set Operations
Atsuko Miyaji, Mohammad Rahman (JAIST)
----- Break ( 15 min. ) -----
----------------------------------------
Tue, Nov 15 AM LOIS -System Security- (10:55 - 12:25)
----------------------------------------
(19) 10:55 - 11:25
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT)
(20) 11:25 - 11:55
Secure and Effective Password Management System
Ryo Hirano, Masakatu Morii (Kobe Univ.)
(21) 11:55 - 12:25
Secure VoIP system for mobile devices
Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.)
----- Lunch ( 60 min. ) -----
----------------------------------------
Tue, Nov 15 PM ISEC (13:25 - 14:40)
----------------------------------------
(22) 13:25 - 13:50
SLP separates the strong RSA assumption from the DDH assumption
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
(23) 13:50 - 14:15
On the Little Knowledge Interactive Proof
Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
(24) 14:15 - 14:40
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
----- Break ( 10 min. ) -----
----------------------------------------
Tue, Nov 15 PM ISEC (14:50 - 16:30)
----------------------------------------
(25) 14:50 - 15:15
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8
Masaaki Shirase (FUN)
(26) 15:15 - 15:40
A proposal of Privacy Impact Assessment framework in Japan
Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT)
(27) 15:40 - 16:05
Content Authentication for Range Queries in Peer-to-Peer Networks
Shoichi Hirose (Univ. of Fukui)
(28) 16:05 - 16:30
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.)
# Information for speakers
General Talk (ISEC) will have 20 minutes for presentation and 5 minutes for discussion.
General Talk (LOIS) will have 20 minutes for presentation and 10 minutes for discussion.
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Wed, Dec 14, 2011: Kikai-Shinko-Kaikan Bldg. [Tue, Oct 18]
# SECRETARY:
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-mail: ic-c (to ISEC secretaries)
=== Technical Committee on Life Intelligence and Office Information Systems (LOIS) ===
# FUTURE SCHEDULE:
Thu, Jan 19, 2012 - Fri, Jan 20, 2012: Sojo Univ. [Wed, Nov 16]
# SECRETARY:
Noriyasu Yamamoto
Fukuoka Institute of Technology
3-30-1 Wajiro-higashi, Higashi-ku, Fukuoka-shi 811-0295
FAX +81-92-606-0758
E-mail: fit
Last modified: 2011-11-09 09:52:23
|
Notification: Mail addresses are partially hidden against SPAM.
|