IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 77 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
09:50
Hiroshima Satellite Campus Hiroshima Secure PUF Authentication Method against Machine Learning Attack
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] VLD2018-49 DC2018-35
pp.77-82
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more]
IT2017-108 ISEC2017-96 WBS2017-89
pp.31-36
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
pp.81-88
IT 2017-09-08
11:15
Yamaguchi Centcore Yamaguchi Hotel A Strongly Secure Secret Sharing Scheme with Ramp Threshold Forms a Maximum Distance Separable Code
Mikihiko Nishiara (Shinshu Univ.) IT2017-43
It is known that ideal secret sharing schemes can be constructed from MDS (maximum distance separable) codes on a finite... [more] IT2017-43
pp.27-30
EMM, IT 2017-05-23
14:50
Yamagata Yamagata University(Yonezawa Campus) A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality
Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-15 EMM2017-15
In the $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS for short), a secret black-white image is encoded to $n... [more] IT2017-15 EMM2017-15
pp.85-90
IT, SIP, RCS 2017-01-19
13:05
Osaka Osaka City Univ. A study on application of one time pad to enhance information secrecy in wireless distributed transmission
Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] IT2016-60 SIP2016-98 RCS2016-250
pp.81-86
IA, IN
(Joint)
2016-12-15
16:45
Hiroshima Hiroshima city university The Reconstruction System of Partial Information by using Partial Restoring Method in Secret Sharing Scheme
Asami Tanaka, Masahiro Fukumoto (KUT) IA2016-70
Recently to prevent medical data from loss and leak, there is the distributed backup project using secret sharing scheme... [more] IA2016-70
pp.41-46
IT, EMM 2016-05-19
14:05
Hokkaido Otaru Economic Center An Optimal Construction of Visual Secret Sharing Schemes for General Access Structures Using Integer Programming and its Application
Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2016-6 EMM2016-6
In a visual secret sharing scheme for black-white images, a secret image is encoded to $n$ shares by using $n times m$ B... [more] IT2016-6 EMM2016-6
pp.31-36
SAT, WBS
(Joint)
2016-05-19
11:45
Aichi Nagoya Institute of Technology A Study on Multi-hop/Multi-route Network Systems using Visual Secret Sharing Scheme with Polar Signaling
Liyuan Chen, Hiromasa Habuchi (Ibaraki Univ.) WBS2016-3
The visual secret sharing scheme is using non-negative signal, like 0 and 1, to show message data. So, it always has no ... [more] WBS2016-3
pp.13-16
IN, IA
(Joint)
2015-12-17
16:10
Hiroshima Hiroshima City University The Reconstruction of Partial Information by using Partial Restoring Method in Secret Sharing Scheme
Asami Tanaka, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2015-74
Recently the medical data which backup and distributed in outside area using the secret sharing scheme (SSS) when the di... [more] IA2015-74
pp.31-36
IT 2015-07-13
13:00
Tokyo Tokyo Institute of Technology Proposal of a Visual Secret Sharing Scheme Based on a Access Structure with Multiple Thresholds and Its Extensions
Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2015-21
The visual secret sharing scheme is a nonconventional secret sharing scheme for digital images in which a secret image i... [more] IT2015-21
pp.23-28
EMM, IT 2015-05-22
13:40
Kyoto Kyoto International Community House An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] IT2015-14 EMM2015-14
pp.75-80
ISEC 2015-05-15
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. Cheating detectable multi-use password protected secret sharing secure against active adversary
Atsunori Ichikawa, Wakaha Ogata (TIT) ISEC2015-4
(To be available after the conference date) [more] ISEC2015-4
pp.23-30
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Generation Methods of Secret Sharing QR Codes
Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] EMM2014-92
pp.91-96
ISEC, IT, WBS 2015-03-02
15:35
Fukuoka The University of Kitakyushu (k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks
Wataru Nakamura, Hirosuke Yamamoto (UTokyo) IT2014-79 ISEC2014-92 WBS2014-71
This paper treats $(k,n)$-threshold secret sharing schemes to detect substitution attacks. First a symbolwise coding sch... [more] IT2014-79 ISEC2014-92 WBS2014-71
pp.111-116
IT 2014-09-19
10:15
Chiba   A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] IT2014-44
pp.19-24
CAS, SIP, MSS, VLD, SIS [detail] 2014-07-11
14:30
Hokkaido Hokkaido University Tamper resistance PUF ID based on secret sharing schemes
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42
In recently years, semiconductor counterfeiting has become a serious problem. To prevent the problem, Physical Unclonabl... [more] CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42
pp.225-230
EMM 2014-05-15
14:30
Tokyo   Secret Sharing based on Image Representation using Compressed Sensing
Michiharu Niimi, Shinya Isaki, Hideki Noda (KIT) EMM2014-2
Due to the development of information technology, many types of data including documents, image and audio, etc. is digit... [more] EMM2014-2
pp.5-10
 Results 21 - 40 of 77 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan