IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
pp.87-93
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
pp.91-96
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
16:10
Online Online Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation
Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
pp.53-60
ISEC, IT, WBS 2020-03-10
15:35
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Improved Threshold Signature with Anonymity
Takuya Inomoto, Atsuko Miyaji (Osaka Univ.) IT2019-97 ISEC2019-93 WBS2019-46
Today, we can exchange information at remote locations via the Internet. It is very important to distinguish whether or ... [more] IT2019-97 ISEC2019-93 WBS2019-46
pp.51-58
COMP 2018-03-05
14:25
Osaka Osaka Prefecture Univ. Analysis of Polynomial-time Learnability with Membership Queries
Mikito Nanashima (Tokyo Inst. of Tech.) COMP2017-49
We investigate the polynomial-time learnability by using examples and membership queries. Angluin and Kharitonov proved ... [more] COMP2017-49
pp.21-26
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
BioX
(2nd)
2013-05-24
17:40
Toyama Toyama Prefectural University [Poster Presentation] Lazy Signature: A non-registered Digital Signature Using Biometrics
Yuta Yoneyama (Shizuoka Univ.), Kenta Takahashi (Hitachi Ltd.), Eisei Honbu, Masakatsu Nishigaki (Shizuoka Univ.)
The conventional digital signature is implemented and operated as the function of registered stamp or signature for digi... [more]
ISEC, LOIS 2011-11-14
14:45
Osaka Osaka Electro-Communication University Hidden Pair of Bijection Signature system (2) -- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] ISEC2011-42 LOIS2011-36
pp.55-60
ISEC 2010-09-10
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. On the Extension of Rank Attacks to MPKC
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more]
ISEC2010-44
pp.35-40
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:00
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
pp.107-112
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:25
Aomori Hirosaki University Improvement of Rainbow MPKC Signature system
Masahito Gotaishi (Chuo Univ.) ISEC2010-24 SITE2010-20 ICSS2010-30
Rainbow signature system is making effective use of the advantage of
multivariate public key cryptosystem (MPKC) and o... [more]
ISEC2010-24 SITE2010-20 ICSS2010-30
pp.113-117
ISEC, LOIS 2009-11-13
09:00
Gifu Gifu Univ. Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] ISEC2009-59 LOIS2009-48
pp.55-60
ISEC, LOIS 2009-11-13
09:25
Gifu Gifu Univ. Matsumoto-Imai Signature by Dual Perturbation -- Two new Modifiers --
Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more]
ISEC2009-60 LOIS2009-49
pp.61-68
ISEC 2006-05-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Fair Exchange of Signatures with Multiple Signers
Yuichi Komano (Toshiba)
Chen et al.~introduced a new notion of a concurrent signature scheme for a fair exchange of signatures with two parties.... [more] ISEC2006-2
pp.7-14
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:45
Iwate Iwate Prefectural University An Information Hiding System for Word 2003 XML Documents
Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo)
We are considering an information hiding technique for the following
situation: 1) The original writer applies the digi... [more]
ISEC2005-37 SITE2005-35
pp.205-212
ISEC, IPSJ-CSEC 2004-07-20
15:50
Tokushima Tokushima Univ. Certification of Program Execution by Tamper Resistant CPU
Atsuya Okazaki, Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)
In grid computing and mobile agents system, remote computers may be untrusted. It is difficult to certify that remote co... [more] ISEC2004-37
pp.165-170
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan