IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2017-09-04
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings
Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] ISEC2017-46
pp.35-42
ISEC, WBS, IT 2017-03-10
12:10
Tokyo TOKAI University Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] IT2016-122 ISEC2016-112 WBS2016-98
pp.149-154
ISEC 2016-09-02
10:10
Tokyo Kikai-Shinko-Kaikan Bldg. Bundling Proofs of Knowledge and its Application to Signatures
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) ISEC2016-39
(To be available after the conference date) [more] ISEC2016-39
pp.9-14
ICSS, IA 2016-06-06
16:05
Saga Saga University
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5
(To be available after the conference date) [more] IA2016-5 ICSS2016-5
pp.25-30
ISEC, LOIS 2013-11-29
13:05
Miyagi Tohoku Univ. A Lossy Identification Scheme from the Subgroup Decision
Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] ISEC2013-68 LOIS2013-34
pp.57-63
ISEC 2012-09-21
14:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) ISEC2012-51
The Fiat-Shamir heuristic is a well-known technique for converting commitment-challenge-response identification schemes ... [more] ISEC2012-51
p.39
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan