Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 11:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Revisiting the Soundness of 5-Pass Identification Scheme Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 |
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more] |
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 pp.44-51 |
QIT (2nd) |
2021-11-30 15:30 |
Online |
Online |
[Invited Talk]
Recent progress in the security proof of quantum key distribution in the finite-key regime Toshihiko Sasaki (Univ. of Tokyo) |
We show a finite-key analysis method for a broad type of quantum key distribution protocols based on a numerical optimiz... [more] |
|
SITE, ISEC, LOIS |
2018-11-04 15:40 |
Fukuoka |
|
An improvement on Winternitz OTS with puncturing of signing keys Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40 |
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] |
ISEC2018-80 SITE2018-58 LOIS2018-40 pp.95-102 |
ISEC |
2018-09-07 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018) Kan Yasuda (NTT) ISEC2018-55 |
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] |
ISEC2018-55 p.27 |
QIT (2nd) |
2015-11-25 15:20 |
Kanagawa |
NTT Atsugi R&D center |
Security of Quantum Key Distribution from Attacker's View Takehisa Iwakoshi (Tamagawa Univ.) |
In 2005, trace distance between an ideal quantum state to be distributed and an actual quantum state distributed was int... [more] |
|
ISEC, IT, WBS |
2015-03-02 14:05 |
Fukuoka |
The University of Kitakyushu |
On the Limit of Security Proof for Homomorphic Encryption Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59 |
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more] |
IT2014-67 ISEC2014-80 WBS2014-59 pp.33-38 |
QIT (2nd) |
2014-11-18 13:50 |
Miyagi |
Tohoku Univ. |
Defect in Security Proof of Quantum Key Distribution based on Complementarity
-- Problem with Interpretation of Trace Distance as Failure Probability in QKD: Part III -- Takehisa Iwakoshi (Tamagawa Univ.) |
Quantum key distribution is currently under development aiming provably secure key distribution protocols. In the previo... [more] |
|
ISEC |
2014-09-05 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution: Part II Takehisa Iwakoshi (Tamagawa Univ.) ISEC2014-48 |
Quantum Key Distribution (QKD) has been attracting attention as an important technique to share a provably secure key un... [more] |
ISEC2014-48 pp.9-11 |
QIT (2nd) |
2014-05-12 16:30 |
Aichi |
Nagoya Univ. |
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.) |
Quantum Key Distribution (QKD) has been attracting attention as an important technique to share an information-theoretic... [more] |
|
ISEC, LOIS |
2005-11-14 15:45 |
Fukuoka |
Kitakyushu Science and Research Park |
A Digital Signature Suitable for XTR Masaaki Shirase, Yasushi Hibino (JAIST) |
This paper proposes a new efficient digital signature scheme for
XTR (Efficient and Compact Subgroup Trace Representat... [more] |
ISEC2005-95 OIS2005-58 pp.39-44 |