Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 11:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
ICSS, IPSJ-SPT |
2020-03-03 11:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ICSS2019-103 |
In recent years, online shopping is getting more and more popular and has been used by many users all over the world. On... [more] |
ICSS2019-103 pp.301-306 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-07 10:50 |
Tokushima |
Grand XIV Naruto |
Development of a Cloud Application Sharing Platform with Authorization Mechanism using CP-ABE Yoshinori Kamori, Kaori Maeda (Hiroshima City Univ.), Tohru Kondo, Reiji Aibara (Hiroshima Univ.) SITE2018-69 IA2018-61 |
In recent years, collaborative work using cloud applications has become common. In that case, the user experience degrad... [more] |
SITE2018-69 IA2018-61 pp.15-21 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
Implementation and Evaluation of Fingerprinting System for Preventing Internal Leakage of Sensitive Data Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EA2018-70 EMM2018-70 |
Due to the development of electrical system in organizations such as companies, the sensitive data should be managed sec... [more] |
EA2018-70 EMM2018-70 pp.43-48 |
LOIS, ISEC, SITE |
2017-11-10 15:40 |
Kyoto |
|
An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.) ISEC2017-70 SITE2017-52 LOIS2017-47 |
Recently, services using IoT have been widespread. The IoT system is a bidirectional communication model between the dev... [more] |
ISEC2017-70 SITE2017-52 LOIS2017-47 pp.123-128 |
EMM, IT |
2017-05-22 14:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4 |
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] |
IT2017-4 EMM2017-4 pp.19-24 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Efficient Verifiable Attribute-Based Keyword Search Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105 |
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] |
IT2016-129 ISEC2016-119 WBS2016-105 pp.195-202 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:45 |
Yamaguchi |
|
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 |
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] |
ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 pp.129-136 |
ISEC |
2016-05-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3 |
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] |
ISEC2016-3 p.13 |
IT, ISEC, WBS |
2016-03-11 10:25 |
Tokyo |
The University of Electro-Communications |
Expressive Attribute-Based Encryption with Fast Decryption Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115 |
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] |
IT2015-132 ISEC2015-91 WBS2015-115 pp.189-195 |
IT, ISEC, WBS |
2016-03-11 10:50 |
Tokyo |
The University of Electro-Communications |
Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116 |
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] |
IT2015-133 ISEC2015-92 WBS2015-116 pp.197-204 |
ICSS |
2012-11-22 15:35 |
Hiroshima |
Miyajima Mori-no-Yado |
Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) ICSS2012-53 |
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's fi... [more] |
ICSS2012-53 pp.49-54 |
LOIS, ICM |
2012-01-20 15:10 |
Kumamoto |
Sojo Univ. |
Implementation and Evaluation of a Client Application using Attribute Based Encryption for an Online Storage Service Yoshinori Matsumoto (Univ. of Hyogo), Daisuke Nigaki, Megumi Uchida, Nobuaki Kondo (Kobe Digital Lab.), Takuho Mitsunaga (Kyoto Univ.), Yutaka Igarashi (College of Engineering, Kanazawa Institute of Technology), Yukio Rikiso (Univ. of Hyogo) ICM2011-44 LOIS2011-69 |
Although Cloud Computing has attracted a great deal of attention for years, it also raises a lot of se- curity concerns.... [more] |
ICM2011-44 LOIS2011-69 pp.73-78 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 13:25 |
Aomori |
Hirosaki University |
Attribute-based encryption with arbitrary number of authorities Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] |
ISEC2010-30 SITE2010-26 ICSS2010-36 pp.153-158 |
ISEC |
2010-05-21 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Attribute-based Encryption Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6 |
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] |
ISEC2010-6 pp.33-39 |