Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2014-05-15 14:30 |
Tokyo |
|
Secret Sharing based on Image Representation using Compressed Sensing Michiharu Niimi, Shinya Isaki, Hideki Noda (KIT) EMM2014-2 |
Due to the development of information technology, many types of data including documents, image and audio, etc. is digit... [more] |
EMM2014-2 pp.5-10 |
EMM |
2014-05-16 13:30 |
Tokyo |
|
[Tutorial Lecture]
Secret Sharing Schemes and Visual Secret Sharing Schemes
-- What is in common and what is different? -- Mitsugu Iwamoto (UEC) EMM2014-7 |
A Secret sharing scheme is one of the most fundamental primitives in cryptography and has a lot of applications. A visu... [more] |
EMM2014-7 pp.35-40 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77 |
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more] |
IT2012-91 ISEC2012-109 WBS2012-77 pp.181-188 |
SIP, RCS |
2013-02-01 11:40 |
Hiroshima |
Viewport-Kure-Hotel (Kure) |
A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275 |
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] |
SIP2012-118 RCS2012-275 pp.219-224 |
EMM |
2013-01-30 11:10 |
Miyagi |
Tohoku Univ. |
A Secret Sharing Method for String Data Incorporating Their Transformation Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100 |
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more] |
EMM2012-100 pp.53-58 |
CW (2nd) |
2012-12-07 |
Tokyo |
AIIT (DAIBIRU) |
The robustness and security of distributed archive scheme Ahmed Tallat (DenDai) |
[more] |
|
ISEC, LOIS |
2012-11-21 15:05 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Secure multiplication algorithm based on secret sharing Ryota Nakada, Takayuki Nakachi (NTT) ISEC2012-59 LOIS2012-34 |
In this paper, we propose secure multiplication algorithm based on the secret sharing scheme.
Secret sharing scheme can... [more] |
ISEC2012-59 LOIS2012-34 pp.15-20 |
NS, IN (Joint) |
2012-03-09 12:00 |
Miyazaki |
Miyazaki Seagia |
An Application of Content Management on Named Data Networking Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Tokyo Univ.) IN2011-183 |
Named Data Networking (NDN) designed for a large scale content
distribution has a similar problem like P2P, i.e. diffic... [more] |
IN2011-183 pp.275-280 |
IT, ISEC, WBS |
2012-03-01 14:20 |
Kanagawa |
|
Consideration for IT-secure password protected secret sharing Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53 |
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] |
IT2011-52 ISEC2011-79 WBS2011-53 pp.41-43 |
ISEC, LOIS |
2011-11-14 15:10 |
Osaka |
Osaka Electro-Communication University |
Ramp secret sharing scheme based on MBR codes Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University) ISEC2011-43 LOIS2011-37 |
Some Ramp secret sharing system based on minimum bandwidth regenerating code(MBR code) for repairable distributed storag... [more] |
ISEC2011-43 LOIS2011-37 pp.61-68 |
IT |
2011-07-22 09:55 |
Okayama |
Okayama University |
On ramp secret sharing schemes for distributed storage systems under repair dynamics
-- Ramp Secret Sharing Schemes based on MBR Codes -- Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe Univ.) IT2011-17 |
In this paper, a construction method of ramp secret sharing systems based on minimum bandwidth regenerating(MBR) codes f... [more] |
IT2011-17 pp.41-46 |
IT |
2011-05-20 13:55 |
Osaka |
Osaka City University |
Access Structure of Secret Sharing Scheme based on Second-Degree Bivariate Polynomial Interpolation Scheme Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ.) IT2011-4 |
Shamir's polynomial interpolation scheme is a secret sharing scheme
with univariate polynomial.
In this study, we inve... [more] |
IT2011-4 pp.19-24 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Visual Card Games for Boys and Girls Miyuki Uno, Mikio Kano (Ibaraki Univ.) IT2010-103 ISEC2010-107 WBS2010-82 |
We propose a new visual card game for two parties
$\mathcal{X}$ and $\mathcal{Y}$ of boys and girls, respectively.
In ... [more] |
IT2010-103 ISEC2010-107 WBS2010-82 pp.227-234 |
NS, RCS (Joint) |
2010-12-17 15:30 |
Okayama |
Okayama Univ. |
A Study on Parameter Controls of Transmit Antenna Directivity for Secure Wireless Link Creation based on Secret Sharing Method Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.), Norihiko Morinaga (Hiroshima International Univ.) RCS2010-196 |
The authors have proposed a secure wireless communication scheme by producing shared information by secret sharing metho... [more] |
RCS2010-196 pp.221-226 |
ISEC, LOIS |
2010-11-17 16:05 |
Ibaraki |
Tsukuba Univ. |
Improved Broadcast Encryption by Secret Sharing Scheme Kyota Miwa, Wataru Kishimoto (Chiba Univ.) ISEC2010-56 LOIS2010-35 |
(To be available after the conference date) [more] |
ISEC2010-56 LOIS2010-35 pp.45-50 |
ISEC |
2010-09-10 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A general construction method of visual secret sharing scheme with share rotations Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49 |
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] |
ISEC2010-49 pp.67-74 |
IPSJ-AVM, MoNA |
2010-07-16 10:55 |
Hokkaido |
Hokkaido Univ. |
An Approach to Reduce Illegal Content Redistributions of P2P Video Sharing System Using Multiple Secret Sharing Scheme Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Univ. of Tokyo.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) MoMuC2010-23 |
CGM (Consumer Generated Media) based video sharing services are one of the killer applications among the current Interne... [more] |
MoMuC2010-23 pp.57-62 |
ISEC |
2010-05-21 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Attribute-based Encryption Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6 |
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] |
ISEC2010-6 pp.33-39 |
IT, ISEC, WBS |
2010-03-05 15:20 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ) IT2009-141 ISEC2009-149 WBS2009-120 |
Shamir’s polynomial interpolation scheme is a secret sharing scheme with univariate polynomial.
In this study, we inve... [more] |
IT2009-141 ISEC2009-149 WBS2009-120 pp.445-448 |
IT |
2009-07-24 15:15 |
Osaka |
Kwansei Gakuin Univ. (Umeda campus) |
Strongly Secure Secret Sharing Scheme with Ramp Threshold based on Shamir's Polynomial Interpolation Scheme Mikihiko Nishiara (Shinshu Univ.), Katsunori Takizawa (Suzuki) IT2009-27 |
A construction method for secret sharing scheme with ramp threshold based on extended scheme of Shamir's polynomial inte... [more] |
IT2009-27 pp.127-129 |