|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2018-09-07 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Constrained PRFs for NC1 in Traditional Groups (from CRYPTO 2018) Nuttapong Attrapadung, Takahiro Matsuda (AIST), Ryo Nishimaki (NTT), Shota Yamada (AIST), Takashi Yamakawa (NTT) ISEC2018-63 |
[more] |
ISEC2018-63 p.61 |
ISEC |
2016-05-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3 |
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] |
ISEC2016-3 p.13 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |
IT, ISEC, WBS |
2012-03-01 10:55 |
Kanagawa |
|
Object Verification System from Artifact-Metrics Based on Printed Ink Spread Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST) IT2011-47 ISEC2011-74 WBS2011-48 |
Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thin... [more] |
IT2011-47 ISEC2011-74 WBS2011-48 pp.9-13 |
IT, ISEC, WBS |
2010-03-05 13:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89 |
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] |
IT2009-110 ISEC2009-118 WBS2009-89 pp.255-260 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103 |
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] |
IT2008-90 ISEC2008-148 WBS2008-103 pp.301-306 |
ISEC |
2006-09-13 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC) |
We propose a black-box traitor revocable broadcast encryption
scheme. This is a variant of a broadcast encryption schem... [more] |
ISEC2006-80 pp.61-68 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST) |
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] |
ISEC2005-46 pp.25-32 |
ISEC |
2004-09-17 17:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.) |
[more] |
ISEC2004-77 pp.69-76 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|