Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2024-05-15 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
(To be available after the conference date) [more] |
|
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Hierarchical Identity-based Matchmaking Encryption Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 |
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] |
ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 pp.60-67 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] |
IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 pp.171-178 |
RCC, ISEC, IT, WBS |
2023-03-14 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Identity-based Matchmaking Encryption Secure against the KGC Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 |
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] |
IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 pp.179-186 |
ISEC |
2022-05-18 15:35 |
Online |
Online |
[Invited Talk]
Forward Secure Message Franking (from ICISC 2021) Hiroki Yamamuro (Tokyo Tech), Keisuke Hara (AIST/YNU), Masayuki Tezuka (NIT, Tsuruoka College), Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2022-5 |
Message franking is introduced by Facebook in end-to-end encrypted messaging services.
It allows to produce verifiable... [more] |
ISEC2022-5 p.20 |
ISEC |
2021-05-19 14:30 |
Online |
Online |
[Invited Talk]
Security Definitions on Time-Lock Puzzles (from ICISC 2020) Daiki Hiraga (Tokyo Tech), Keisuke Hara (Tokyo Tech/AIST), Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2021-7 |
Time-lock puzzles allow one to encapsulate a message for a pre-determined amount of time.
The message is required to be... [more] |
ISEC2021-7 p.32 |
WBS, IT, ISEC |
2021-03-05 09:50 |
Online |
Online |
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech) IT2020-145 ISEC2020-75 WBS2020-64 |
[more] |
IT2020-145 ISEC2020-75 WBS2020-64 pp.201-207 |
ISEC |
2019-05-17 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions(from SCN 2018) Keisuke Hara, Fuyuki Kitagawa (TokyoTech), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (TokyoTech) ISEC2019-1 |
[more] |
ISEC2019-1 p.1 |
RCS, SR, SRW (Joint) |
2019-03-06 09:50 |
Kanagawa |
YRP |
A Study on new modulation/demodulation method for 6G Mobile (Part-II)
-- Development of new communication method using MARIA (MIMO Applied Resource-block Interleaving Access) method -- Keisuke Hara, Aoi Yamaki, Maria Takigawa, Yutaka Kobayashi (Yokosuka highschool), Gen-ichiro Ohta (YRP inc.) RCS2018-290 |
We propose a new modulation method / communication method applying the MARIA method (MIMO Applied Resource-block Interle... [more] |
RCS2018-290 pp.49-54 |
CS |
2018-11-02 11:00 |
Ehime |
The Shiki Museum |
[Invited Lecture]
A Proposal on new modulation/demodulation method for 6G Mobile
-- A Commentary of MARIA (MIMO Applied Resource-block Interleaving Access) method -- Gen-ichiro Ohta (YRP inc.), Maria Takigawa, Keisuke Hara, Aoi Yamaki, Yutaka Kobayashi (Yokosuka High School) CS2018-67 |
We devised a new modulation / demodulation scheme that enable improvement of spectral efficiency in the LTE / OFDMA syst... [more] |
CS2018-67 pp.67-72 |
RCS |
2018-10-19 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on new modulation/demodulation method for 6G Mobile
-- A proposal of MARIA (MIMO Applied Resource-block Interleaving Access) method -- Maria Takigawa, Keisuke Hara, Aoi Yamaki, Hiroshi Kobayashi (Yokosuka Highschool), Gen-ichiro Ohta (YRP) RCS2018-166 |
We devised a novel modulation / demodulation scheme that makes it possible to improve spectral efficiency in LTE / OFDMA... [more] |
RCS2018-166 pp.83-88 |
US, EA (Joint) |
2018-01-23 13:00 |
Osaka |
|
[Poster Presentation]
Elucidation of disruption mechanism of microalgae by ultrasonic cavitation Takashi Ikeno, Naoto Goda, Shohei Yamanaka, Keisuke Haraguchi, Ken Yamamoto (Kansai Univ.) US2017-83 |
It is a well-known fact that underwater microorganisms can be inactivated through the administration of ultrasonic energ... [more] |
US2017-83 pp.7-12 |
US, EA (Joint) |
2018-01-23 13:00 |
Osaka |
|
[Poster Presentation]
Mechanical properties on disruption of microcapsules by ultrasonic irradiation Shohei Yamanaka, Takashi Ikeno, Naoto Goda, Keisuke haraguchi, Ken Yamamoto (Kansai Univ.) US2017-84 |
Recently, numerous studies on the inactivation of microorganisms in water have been reported. One such study deals with ... [more] |
US2017-84 pp.13-16 |
AI |
2013-07-04 13:50 |
Tokyo |
|
A prototype of Multi-agent based voltage control simulator Keisuke Hara, Shantanu Chakraborty, Takayuki Ito, Mutsumi Aoki (nich) AI2013-7 |
In order to break away from large-scale concentration type electric power supply form, distributed gen- eration (DG) is ... [more] |
AI2013-7 pp.37-42 |