Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2012-12-12 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL) ISEC2012-79 |
In this invited talk, we introduce the lecture with the same title presented at the 32nd International Cryptology Confer... [more] |
ISEC2012-79 p.43 |
SWIM |
2011-11-18 11:20 |
Tokyo |
Tokai Univ.(Takanawa) |
A Case Study on a Business Model and its Branding Akira Horimai (Figeo) SWIM2011-21 |
This paper discusses a strategic ICT (Information and Communication Technology) business model in order for software hou... [more] |
SWIM2011-21 pp.19-24 |
SWIM |
2011-06-17 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Case Study on an ICT Business Model Akira Horimai (Figeo) SWIM2011-4 |
This paper discusses a strategic ICT (Information and Communication Technology) business model in order for software hou... [more] |
SWIM2011-4 pp.15-18 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ICD |
2008-12-12 11:00 |
Tokyo |
Tokyo Inst. Tech., Ohokayama Campus, Kokusa-Kouryu-Kaikan |
[Invited Talk]
For those who wish to be a integrated circuit designer Kenji Taniguchi (Osaka Univ.) ICD2008-120 |
Present-day engineering studies provided at universities and professional continuing education for analog circuit design... [more] |
ICD2008-120 pp.91-94 |
ISEC |
2006-09-13 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC) |
We propose a black-box traitor revocable broadcast encryption
scheme. This is a variant of a broadcast encryption schem... [more] |
ISEC2006-80 pp.61-68 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:45 |
Okayama |
Okayama Univ. |
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols Hirofumi Muratani (Toshiba) |
We derive a lower bound on the round complexity of an $m$-bounded concurrent black-box zero-knowledge interactive proof ... [more] |
ISEC2006-43 pp.19-26 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:00 |
Okayama |
Okayama Univ. |
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST) |
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] |
ISEC2006-52 pp.91-98 |
ISEC |
2006-05-19 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
General Composition of a Bounded Concurrent Black-Box Zero-Knowledge Protocol Hirofumi Muratani (TOSHIBA) |
We consider the round-complexity of an $m$-bounded concurrent black-box zero-knowledge interactive proof protocol. In th... [more] |
ISEC2006-7 pp.45-52 |
ISEC |
2004-09-17 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Double Block Length Hash Functions with Rate 1/2 Shoichi Hirose (Kyoto Univ.) |
There has been no known construction of an double-block-length hash
function which is optimally collision resistant, th... [more] |
ISEC2004-70 pp.21-26 |
ISEC, IPSJ-CSEC |
2004-07-20 13:30 |
Tokushima |
Tokushima Univ. |
Secure Double Block Length Hash Functions Based on Abreast/Tandem Davies-Meyer Shoichi Hirose (Kyoto Univ.) |
It is an open question whether there exists an efficient double-block-length hash function such that time complexity of ... [more] |
ISEC2004-32 pp.127-134 |