|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2017-09-04 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46 |
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] |
ISEC2017-46 pp.35-42 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98 |
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] |
IT2016-122 ISEC2016-112 WBS2016-98 pp.149-154 |
ISEC |
2016-09-02 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Bundling Proofs of Knowledge and its Application to Signatures Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) ISEC2016-39 |
(To be available after the conference date) [more] |
ISEC2016-39 pp.9-14 |
ICSS, IA |
2016-06-06 16:05 |
Saga |
Saga University |
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5 |
(To be available after the conference date) [more] |
IA2016-5 ICSS2016-5 pp.25-30 |
ISEC, LOIS |
2013-11-29 13:05 |
Miyagi |
Tohoku Univ. |
A Lossy Identification Scheme from the Subgroup Decision Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34 |
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] |
ISEC2013-68 LOIS2013-34 pp.57-63 |
ISEC |
2012-09-21 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) ISEC2012-51 |
The Fiat-Shamir heuristic is a well-known technique for converting commitment-challenge-response identification schemes ... [more] |
ISEC2012-51 p.39 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|