IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 132  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, MICT, WBS, RCC
(Joint) [detail]
2024-05-16
14:40
Miyazaki KITEN Convention hall (Miyazaki)
(Primary: On-site, Secondary: Online)
Illumination-light xASK-CodeSK System using (2,2)-Threshold Secret Sharing Scheme
Junya Yada, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90 In a secret sharing, a dealer generates n shares from a secret and random numbers and distributes the shares to each of ... [more] IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90
pp.220-225
SIP, IT, RCS 2024-01-18
10:20
Miyagi
(Primary: On-site, Secondary: Online)
A quantum secret sharing scheme with a 4-qubit code
Yuta Aoki, Mitsuru Tada (Chiba Univ.) IT2023-38 SIP2023-71 RCS2023-213
A Quantum secret sharing (QSS) is a cryptographic scheme in which a secret quantum state is converted into multiple quan... [more] IT2023-38 SIP2023-71 RCS2023-213
pp.45-50
LOIS, SITE, ISEC 2023-11-09
12:40
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] ISEC2023-55 SITE2023-49 LOIS2023-13
pp.2-9
LOIS, SITE, ISEC 2023-11-09
13:05
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) ISEC2023-56 SITE2023-50 LOIS2023-14
We propose a method to reduce the computational complexity of generating extended shares and regenerating lost shares in... [more] ISEC2023-56 SITE2023-50 LOIS2023-14
pp.10-17
IT 2023-08-04
11:50
Kanagawa Shonan Institute of Technology
(Primary: On-site, Secondary: Online)
Mutually Orthogonal Latin Squares and Computational Complexity of the Secret Sharing Scheme
Kouyou Nakamura, Shunpei Nishikawa, Tomoko Adachi (SIST) IT2023-26
The Secret Sharing Scheme proposed by Shamir in 1979, allows a secret to be shared among a set of participants. A Latin ... [more] IT2023-26
pp.68-73
RCC, ISEC, IT, WBS 2023-03-15
13:00
Yamaguchi
(Primary: On-site, Secondary: Online)
Data Sharing Illumination Light Communications System using (k,n) Visual Secret Sharing Scheme
Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2022-120 ISEC2022-99 WBS2022-117 RCC2022-117
By using the principle of the (n, n) Visual Secret Sharing(VSS) scheme, a data-sharing illumination light communication ... [more] IT2022-120 ISEC2022-99 WBS2022-117 RCC2022-117
pp.331-336
QIT
(2nd)
2022-12-09
17:30
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Advance Sharing of Quantum Shares for Classical Secrets
Rina Miyajima, Ryutaroh Matsumoto (Tokyo Tech)
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret ... [more]
MICT, WBS 2022-07-25
13:35
Okayama Okayama Prefectural University Illumination-light Communication System Using Three (2,2) Threshold Secret Sharing System
Yuma Yamada, Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) WBS2022-28 MICT2022-28
In this paper, a lightning optical communication system, that uses a frame consisting of three bits as a share of the se... [more] WBS2022-28 MICT2022-28
pp.65-69
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
IT, ISEC, RCC, WBS 2022-03-10
09:40
Online Online A New Necessary and Sufficient Condition for the Existence of a one-bit Secret Sharing Scheme and Its Applications
Ryo Okamura, Hiroki Koga (Univ. Tsukuba) IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58
In a secret sharing scheme, a dealer generates $n$ shares from a secret and distributes the $n$ shares to respective par... [more] IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58
pp.1-6
NS, IN
(Joint)
2022-03-11
16:10
Online Online A Data Distribution Method for Digital Content Market Using P2P Networks
Ryuji Kanno, Taiju Mikoshi (Nihon Univ.) NS2021-162
Online digital content market is becoming more popular, but the main market method is consignment sales to companies.Be... [more] NS2021-162
pp.236-240
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] ICSS2021-81
pp.135-140
CQ, ICM, NS, NV
(Joint)
2021-11-26
14:50
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Data privacy protection method for blockchain by using secret sharing
Jun Nakajima (Hitachi) ICM2021-27
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] ICM2021-27
pp.21-26
RCS 2021-06-23
10:30
Online Online A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation
Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] RCS2021-35
pp.37-42
WBS, RCC, SAT, MICT
(Joint) [detail]
2021-05-20
09:55
Online Online (Zoom) RGB Parallel Transmission System for (n,n) Visual Secret Sharing Scheme
Ryohei Hazu, Keisuke Manaka, Hiromasa Habuchi (Ibaraki Univ) WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2
In the illumination light communications using the intensity modulation/direct detection method, transmitted data cannot... [more] WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2
pp.7-12
ISEC 2021-05-19
15:00
Online Online [Invited Talk] Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020)
Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] ISEC2021-8
p.33
WBS, IT, ISEC 2021-03-04
15:20
Online Online A Consideration on Evolving Secret Sharing Schemes using Linear Codes
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.) IT2020-132 ISEC2020-62 WBS2020-51
Shamir's $(k, n)$ threshold scheme is realized by linear codes on a finite field. This scheme requires that an upper bou... [more] IT2020-132 ISEC2020-62 WBS2020-51
pp.123-127
WBS, IT, ISEC 2021-03-05
11:20
Online Online Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] IT2020-148 ISEC2020-78 WBS2020-67
pp.219-224
IA 2021-01-29
14:50
Online Online Retrieval in Confined Decodable Secret Sharing Scheme by Comparison of Difference in Coefficient between Shares and Its Security Evaluation
Tomo Nakamura, Ryohei Yoshitomi, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2020-34
In Kochi Prefecture, an effort is underway to back up medical data such as electronic medical records to remote location... [more] IA2020-34
pp.21-26
 Results 1 - 20 of 132  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan