Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Post-Quantum Digital Signature Schemes Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 |
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] |
IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 pp.87-93 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Novel Image authentication scheme using error correction code and digital signature Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 |
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] |
ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 pp.91-96 |
ISEC, SITE, LOIS |
2022-11-18 17:20 |
Online |
Online |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29 |
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] |
ISEC2022-45 SITE2022-49 LOIS2022-29 pp.92-99 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:10 |
Online |
Online |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 |
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] |
ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 pp.53-60 |
IT, ISEC, WBS |
2016-03-11 10:00 |
Tokyo |
The University of Electro-Communications |
Reconsideration of Fail-Stop Signature Schemes and Their UC-Security Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114 |
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] |
IT2015-131 ISEC2015-90 WBS2015-114 pp.181-188 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
ISEC |
2014-09-05 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fail-Stop Signature Scheme with TTP and Its UC-Security Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49 |
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] |
ISEC2014-49 pp.13-20 |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
IT, ISEC, WBS |
2013-03-07 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Consideration on Security Requirements of Fail-stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53 |
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] |
IT2012-67 ISEC2012-85 WBS2012-53 pp.31-38 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
PRMU |
2011-02-17 16:00 |
Saitama |
|
Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216 |
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] |
PRMU2010-216 pp.49-54 |
ISEC |
2008-05-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15 |
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] |
ISEC2008-15 pp.99-106 |