Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DE |
2019-06-22 10:50 |
Tokyo |
|
Efficient Similar Document Search over Encrypted Data On the Cloud Daisuke Aritomo (Univ. of Tsukuba), Chiemi Watanabe (NTUT) DE2019-7 |
More and more data owners are building information retrieval systems on cloud computing platforms, which provides scalab... [more] |
DE2019-7 pp.29-34 |
WBS, IT, ISEC |
2018-03-09 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121 |
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] |
IT2017-140 ISEC2017-128 WBS2017-121 pp.219-223 |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104 |
(To be available after the conference date) [more] |
IT2016-128 ISEC2016-118 WBS2016-104 pp.187-193 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Efficient Verifiable Attribute-Based Keyword Search Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105 |
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] |
IT2016-129 ISEC2016-119 WBS2016-105 pp.195-202 |
ICSS, IPSJ-SPT |
2016-03-04 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Privacy-enhanced Similarity Search Scheme for Cloud Image Databases Hao Liu, Hideaki Goto (Tohoku Univ.) ICSS2015-68 |
With the increasing use of Cloud Service in recent years, its security vulnerabilities becomes a bigger concern, for one... [more] |
ICSS2015-68 pp.129-133 |
IN |
2015-10-15 15:55 |
Osaka |
Osaka University |
[Invited Talk]
Data Secrecy in the Cloud Era Yasunori Ishihara (Osaka Univ.) IN2015-56 |
In the Cloud Era, third parties are required to process data without knowing the content of the data. In this talk, we f... [more] |
IN2015-56 pp.19-24 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:20 |
Fukushima |
|
Fast Searchable Encryption Scheme Using Single Bloom Filter and Its Evalustion Shunsuke Kimura, Hiroyuki Inaba (KIT) SITE2014-79 IA2014-111 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
SITE2014-79 IA2014-111 pp.227-232 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
ISEC |
2014-09-05 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Computer Simulation of Garbled Searchable Symmetric Encryption Scheme Keisuke Sasaki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2014-51 |
In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which ... [more] |
ISEC2014-51 pp.27-34 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 pp.281-286 |
IT, ISEC, WBS |
2013-03-08 14:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Security Definitions for Public Key Encryption with Keyword Search Revisited Hirokazu Tagai, Junji Shikata (Yokohama National Univ.) IT2012-104 ISEC2012-122 WBS2012-90 |
Public Key Encryption with Keyword Search (PEKS) is a cryptographic primitive imparting the keyword search function with... [more] |
IT2012-104 ISEC2012-122 WBS2012-90 pp.263-270 |
IT, ISEC, WBS |
2013-03-08 15:35 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Toward Practical Application of Searchable Encryption Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric) IT2012-106 ISEC2012-124 WBS2012-92 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2012-106 ISEC2012-124 WBS2012-92 pp.279-283 |
IT, ISEC, WBS |
2012-03-02 09:00 |
Kanagawa |
|
Searchable Symmetric Encryption with small information leakage in index update Toshinori Araki (NEC) IT2011-67 ISEC2011-94 WBS2011-68 |
Searchable symmetric encryption(SSE) has been used for privacy preserving keyword search. Although the importance for pr... [more] |
IT2011-67 ISEC2011-94 WBS2011-68 pp.129-134 |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
Efficient Searchable Encryption Schemes Against Frequency Analysis Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2010-68 ISEC2010-72 WBS2010-47 pp.1-6 |