IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 4 of 4  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2021-03-04
15:20
Online Online A Consideration on Evolving Secret Sharing Schemes using Linear Codes
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.) IT2020-132 ISEC2020-62 WBS2020-51
Shamir's $(k, n)$ threshold scheme is realized by linear codes on a finite field. This scheme requires that an upper bou... [more] IT2020-132 ISEC2020-62 WBS2020-51
pp.123-127
WBS, IT, ISEC 2021-03-05
11:20
Online Online Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] IT2020-148 ISEC2020-78 WBS2020-67
pp.219-224
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more]
IT2017-108 ISEC2017-96 WBS2017-89
pp.31-36
 Results 1 - 4 of 4  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan