IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
10:45
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
pp.273-278
LOIS, SITE, ISEC 2023-11-10
11:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] ISEC2023-66 SITE2023-60 LOIS2023-24
pp.78-85
RECONF 2021-06-08
13:00
Online Online [Invited Talk] Basics, Applications, and International Standardization of Physically Unclonable Functions (PUFs)
Yohei Hori (AIST) RECONF2021-1
A Physically Unclonable Function (PUF) is a security primitive that generates chip-specific values by exploiting device ... [more] RECONF2021-1
p.1
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
EMM 2017-03-06
15:40
Okinawa Miyakojima Marin Terminal Building (Okinawa) [Poster Presentation] A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management
Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] EMM2016-91
pp.31-36
RECONF 2015-06-20
11:35
Kyoto Kyoto University FPGA Implementation of a key generation circuit using PUF and Fuzzy Extractor on SASEBO-G3
Yohei Hori, Toshihiro Katashita (AIST) RECONF2015-19
We implemented a key generation circuit using a Physically Unclonable Function (PUF) and Fuzzy Extractor (FE) to a Kinte... [more] RECONF2015-19
pp.103-108
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
09:10
Hokkaido   A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
pp.247-254
CS, SIP, CAS 2011-03-03
14:30
Okinawa Ohhamanobumoto memorial hall (Ishigaki)( An efficient access control method for hierarchical multimedia content
Shoko Imaizumi (IRI Niigata), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2010-136 SIP2010-152 CS2010-106
This paper proposes an efficient method of access control for multimedia content. The proposed method controls access to... [more] CAS2010-136 SIP2010-152 CS2010-106
pp.203-208
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:55
Aomori Hirosaki University Implementation of Key Generation Center for Identity-based Encryption
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) ISEC2010-27 SITE2010-23 ICSS2010-33
Identity-based Encryption (IBE) is approaching to practical use recently,
but several significant points to be solved r... [more]
ISEC2010-27 SITE2010-23 ICSS2010-33
pp.133-139
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
WBS, IT, ISEC 2009-03-10
13:25
Hokkaido Hakodate Mirai Univ. Optimal Axis Compensation in Quantum Key Distribution Protocols
Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-104 ISEC2008-162 WBS2008-117
We show the optimal axis compensations
maximizing the key generation rate
for unital channels.
We consider the case ... [more]
IT2008-104 ISEC2008-162 WBS2008-117
pp.401-407
MSS 2009-01-29
13:25
Kanagawa Kanagawa Industrial Promotion Center A Method of Petri Nets and Calculating the Elementary T-invariants for Public-key Cryptography MEPKC
Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ.) CST2008-42
This paper aims at automatically generating Petri nets that are used as key generator of public-key cryptography MEPKC. ... [more] CST2008-42
pp.5-10
MSS 2008-01-29
10:20
Tokushima The University of Tokushima A Method of Generating and Complicating Petri Nets Used as Key-generator of a public-key cryptgraphy MEPKC
Ryosuke Murakami, Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ) CST2007-48
This paper aims at automatically generating Petri nets that
are used as key generator of a public-key cryptography MEP... [more]
CST2007-48
pp.11-16
MSS 2007-06-29
10:15
Okinawa   An algorithm to enumerate all the elementary T-invariants of auto-generated Petri nets
Ryo Yamaguchi, Ryosuke Murakami, Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) CST2007-9
In this paper, we propose an algorithm to enumerate all the elementary
T-invariants of auto-generated Petri nets that ... [more]
CST2007-9
pp.15-20
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan