Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 10:45 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Encrypted data sharing system based on IBE secure against the KGC Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 |
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] |
IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 pp.273-278 |
LOIS, SITE, ISEC |
2023-11-10 11:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24 |
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] |
ISEC2023-66 SITE2023-60 LOIS2023-24 pp.78-85 |
RECONF |
2021-06-08 13:00 |
Online |
Online |
[Invited Talk]
Basics, Applications, and International Standardization of Physically Unclonable Functions (PUFs) Yohei Hori (AIST) RECONF2021-1 |
A Physically Unclonable Function (PUF) is a security primitive that generates chip-specific values by exploiting device ... [more] |
RECONF2021-1 p.1 |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
EMM |
2017-03-06 15:40 |
Okinawa |
Miyakojima Marin Terminal Building (Okinawa) |
[Poster Presentation]
A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91 |
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] |
EMM2016-91 pp.31-36 |
RECONF |
2015-06-20 11:35 |
Kyoto |
Kyoto University |
FPGA Implementation of a key generation circuit using PUF and Fuzzy Extractor on SASEBO-G3 Yohei Hori, Toshihiro Katashita (AIST) RECONF2015-19 |
We implemented a key generation circuit using a Physically Unclonable Function (PUF) and Fuzzy Extractor (FE) to a Kinte... [more] |
RECONF2015-19 pp.103-108 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 09:10 |
Hokkaido |
|
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 |
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] |
ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 pp.247-254 |
CS, SIP, CAS |
2011-03-03 14:30 |
Okinawa |
Ohhamanobumoto memorial hall (Ishigaki)( |
An efficient access control method for hierarchical multimedia content Shoko Imaizumi (IRI Niigata), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2010-136 SIP2010-152 CS2010-106 |
This paper proposes an efficient method of access control for multimedia content. The proposed method controls access to... [more] |
CAS2010-136 SIP2010-152 CS2010-106 pp.203-208 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:55 |
Aomori |
Hirosaki University |
Implementation of Key Generation Center for Identity-based Encryption Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) ISEC2010-27 SITE2010-23 ICSS2010-33 |
Identity-based Encryption (IBE) is approaching to practical use recently,
but several significant points to be solved r... [more] |
ISEC2010-27 SITE2010-23 ICSS2010-33 pp.133-139 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
WBS, IT, ISEC |
2009-03-10 13:25 |
Hokkaido |
Hakodate Mirai Univ. |
Optimal Axis Compensation in Quantum Key Distribution Protocols Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-104 ISEC2008-162 WBS2008-117 |
We show the optimal axis compensations
maximizing the key generation rate
for unital channels.
We consider the case ... [more] |
IT2008-104 ISEC2008-162 WBS2008-117 pp.401-407 |
MSS |
2009-01-29 13:25 |
Kanagawa |
Kanagawa Industrial Promotion Center |
A Method of Petri Nets and Calculating the Elementary T-invariants for Public-key Cryptography MEPKC Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ.) CST2008-42 |
This paper aims at automatically generating Petri nets that are used as key generator of public-key cryptography MEPKC. ... [more] |
CST2008-42 pp.5-10 |
MSS |
2008-01-29 10:20 |
Tokushima |
The University of Tokushima |
A Method of Generating and Complicating Petri Nets Used as Key-generator of a public-key cryptgraphy MEPKC Ryosuke Murakami, Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ) CST2007-48 |
This paper aims at automatically generating Petri nets that
are used as key generator of a public-key cryptography MEP... [more] |
CST2007-48 pp.11-16 |
MSS |
2007-06-29 10:15 |
Okinawa |
|
An algorithm to enumerate all the elementary T-invariants of auto-generated Petri nets Ryo Yamaguchi, Ryosuke Murakami, Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) CST2007-9 |
In this paper, we propose an algorithm to enumerate all the elementary
T-invariants of auto-generated Petri nets that ... [more] |
CST2007-9 pp.15-20 |