IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 78 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2014-05-15
14:30
Tokyo   Secret Sharing based on Image Representation using Compressed Sensing
Michiharu Niimi, Shinya Isaki, Hideki Noda (KIT) EMM2014-2
Due to the development of information technology, many types of data including documents, image and audio, etc. is digit... [more] EMM2014-2
pp.5-10
EMM 2014-05-16
13:30
Tokyo   [Tutorial Lecture] Secret Sharing Schemes and Visual Secret Sharing Schemes -- What is in common and what is different? --
Mitsugu Iwamoto (UEC) EMM2014-7
A Secret sharing scheme is one of the most fundamental primitives in cryptography and has a lot of applications. A visu... [more] EMM2014-7
pp.35-40
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more]
IT2012-91 ISEC2012-109 WBS2012-77
pp.181-188
SIP, RCS 2013-02-01
11:40
Hiroshima Viewport-Kure-Hotel (Kure) A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming
Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] SIP2012-118 RCS2012-275
pp.219-224
EMM 2013-01-30
11:10
Miyagi Tohoku Univ. A Secret Sharing Method for String Data Incorporating Their Transformation
Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more]
EMM2012-100
pp.53-58
CW
(2nd)
2012-12-07 Tokyo AIIT (DAIBIRU) The robustness and security of distributed archive scheme
Ahmed Tallat (DenDai)
 [more]
ISEC, LOIS 2012-11-21
15:05
Shizuoka Shizuoka City Industry-University Exchange Center Secure multiplication algorithm based on secret sharing
Ryota Nakada, Takayuki Nakachi (NTT) ISEC2012-59 LOIS2012-34
In this paper, we propose secure multiplication algorithm based on the secret sharing scheme.
Secret sharing scheme can... [more]
ISEC2012-59 LOIS2012-34
pp.15-20
NS, IN
(Joint)
2012-03-09
12:00
Miyazaki Miyazaki Seagia An Application of Content Management on Named Data Networking
Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Tokyo Univ.) IN2011-183
Named Data Networking (NDN) designed for a large scale content
distribution has a similar problem like P2P, i.e. diffic... [more]
IN2011-183
pp.275-280
IT, ISEC, WBS 2012-03-01
14:20
Kanagawa   Consideration for IT-secure password protected secret sharing
Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] IT2011-52 ISEC2011-79 WBS2011-53
pp.41-43
ISEC, LOIS 2011-11-14
15:10
Osaka Osaka Electro-Communication University Ramp secret sharing scheme based on MBR codes
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University) ISEC2011-43 LOIS2011-37
Some Ramp secret sharing system based on minimum bandwidth regenerating code(MBR code) for repairable distributed storag... [more] ISEC2011-43 LOIS2011-37
pp.61-68
IT 2011-07-22
09:55
Okayama Okayama University On ramp secret sharing schemes for distributed storage systems under repair dynamics -- Ramp Secret Sharing Schemes based on MBR Codes --
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe Univ.) IT2011-17
In this paper, a construction method of ramp secret sharing systems based on minimum bandwidth regenerating(MBR) codes f... [more] IT2011-17
pp.41-46
IT 2011-05-20
13:55
Osaka Osaka City University Access Structure of Secret Sharing Scheme based on Second-Degree Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ.) IT2011-4
Shamir's polynomial interpolation scheme is a secret sharing scheme
with univariate polynomial.
In this study, we inve... [more]
IT2011-4
pp.19-24
ISEC, IT, WBS 2011-03-04
15:45
Osaka Osaka University Visual Card Games for Boys and Girls
Miyuki Uno, Mikio Kano (Ibaraki Univ.) IT2010-103 ISEC2010-107 WBS2010-82
We propose a new visual card game for two parties
$\mathcal{X}$ and $\mathcal{Y}$ of boys and girls, respectively.
In ... [more]
IT2010-103 ISEC2010-107 WBS2010-82
pp.227-234
NS, RCS
(Joint)
2010-12-17
15:30
Okayama Okayama Univ. A Study on Parameter Controls of Transmit Antenna Directivity for Secure Wireless Link Creation based on Secret Sharing Method
Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.), Norihiko Morinaga (Hiroshima International Univ.) RCS2010-196
The authors have proposed a secure wireless communication scheme by producing shared information by secret sharing metho... [more] RCS2010-196
pp.221-226
ISEC, LOIS 2010-11-17
16:05
Ibaraki Tsukuba Univ. Improved Broadcast Encryption by Secret Sharing Scheme
Kyota Miwa, Wataru Kishimoto (Chiba Univ.) ISEC2010-56 LOIS2010-35
(To be available after the conference date) [more] ISEC2010-56 LOIS2010-35
pp.45-50
ISEC 2010-09-10
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. A general construction method of visual secret sharing scheme with share rotations
Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] ISEC2010-49
pp.67-74
IPSJ-AVM, MoNA 2010-07-16
10:55
Hokkaido Hokkaido Univ. An Approach to Reduce Illegal Content Redistributions of P2P Video Sharing System Using Multiple Secret Sharing Scheme
Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Univ. of Tokyo.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) MoMuC2010-23
CGM (Consumer Generated Media) based video sharing services are one of the killer applications among the current Interne... [more] MoMuC2010-23
pp.57-62
ISEC 2010-05-21
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. An Improvement of Attribute-based Encryption
Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] ISEC2010-6
pp.33-39
IT, ISEC, WBS 2010-03-05
15:20
Nagano Nagano-Engineering Campus, Shinshu University On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ) IT2009-141 ISEC2009-149 WBS2009-120
Shamir’s polynomial interpolation scheme is a secret sharing scheme with univariate polynomial.
In this study, we inve... [more]
IT2009-141 ISEC2009-149 WBS2009-120
pp.445-448
IT 2009-07-24
15:15
Osaka Kwansei Gakuin Univ. (Umeda campus) Strongly Secure Secret Sharing Scheme with Ramp Threshold based on Shamir's Polynomial Interpolation Scheme
Mikihiko Nishiara (Shinshu Univ.), Katsunori Takizawa (Suzuki) IT2009-27
A construction method for secret sharing scheme with ramp threshold based on extended scheme of Shamir's polynomial inte... [more] IT2009-27
pp.127-129
 Results 41 - 60 of 78 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan