Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Post-Quantum Digital Signature Schemes Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 |
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] |
IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 pp.87-93 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Novel Image authentication scheme using error correction code and digital signature Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 |
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] |
ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 pp.91-96 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:10 |
Online |
Online |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 |
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] |
ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 pp.53-60 |
ISEC, IT, WBS |
2020-03-10 15:35 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Improved Threshold Signature with Anonymity Takuya Inomoto, Atsuko Miyaji (Osaka Univ.) IT2019-97 ISEC2019-93 WBS2019-46 |
Today, we can exchange information at remote locations via the Internet. It is very important to distinguish whether or ... [more] |
IT2019-97 ISEC2019-93 WBS2019-46 pp.51-58 |
COMP |
2018-03-05 14:25 |
Osaka |
Osaka Prefecture Univ. |
Analysis of Polynomial-time Learnability with Membership Queries Mikito Nanashima (Tokyo Inst. of Tech.) COMP2017-49 |
We investigate the polynomial-time learnability by using examples and membership queries. Angluin and Kharitonov proved ... [more] |
COMP2017-49 pp.21-26 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
BioX (2nd) |
2013-05-24 17:40 |
Toyama |
Toyama Prefectural University |
[Poster Presentation]
Lazy Signature: A non-registered Digital Signature Using Biometrics Yuta Yoneyama (Shizuoka Univ.), Kenta Takahashi (Hitachi Ltd.), Eisei Honbu, Masakatsu Nishigaki (Shizuoka Univ.) |
The conventional digital signature is implemented and operated as the function of registered stamp or signature for digi... [more] |
|
ISEC, LOIS |
2011-11-14 14:45 |
Osaka |
Osaka Electro-Communication University |
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36 |
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] |
ISEC2011-42 LOIS2011-36 pp.55-60 |
ISEC |
2010-09-10 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Extension of Rank Attacks to MPKC Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44 |
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more] |
ISEC2010-44 pp.35-40 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:25 |
Aomori |
Hirosaki University |
Improvement of Rainbow MPKC Signature system Masahito Gotaishi (Chuo Univ.) ISEC2010-24 SITE2010-20 ICSS2010-30 |
Rainbow signature system is making effective use of the advantage of
multivariate public key cryptosystem (MPKC) and o... [more] |
ISEC2010-24 SITE2010-20 ICSS2010-30 pp.113-117 |
ISEC, LOIS |
2009-11-13 09:00 |
Gifu |
Gifu Univ. |
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48 |
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] |
ISEC2009-59 LOIS2009-48 pp.55-60 |
ISEC, LOIS |
2009-11-13 09:25 |
Gifu |
Gifu Univ. |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49 |
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more] |
ISEC2009-60 LOIS2009-49 pp.61-68 |
ISEC |
2006-05-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fair Exchange of Signatures with Multiple Signers Yuichi Komano (Toshiba) |
Chen et al.~introduced a new notion of a concurrent signature scheme for a fair exchange of signatures with two parties.... [more] |
ISEC2006-2 pp.7-14 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:45 |
Iwate |
Iwate Prefectural University |
An Information Hiding System for Word 2003 XML Documents Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo) |
We are considering an information hiding technique for the following
situation: 1) The original writer applies the digi... [more] |
ISEC2005-37 SITE2005-35 pp.205-212 |
ISEC, IPSJ-CSEC |
2004-07-20 15:50 |
Tokushima |
Tokushima Univ. |
Certification of Program Execution by Tamper Resistant CPU Atsuya Okazaki, Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST) |
In grid computing and mobile agents system, remote computers may be untrusted. It is difficult to certify that remote co... [more] |
ISEC2004-37 pp.165-170 |