Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 14:40 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Illumination-light xASK-CodeSK System using (2,2)-Threshold Secret Sharing Scheme Junya Yada, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(To be available after the conference date) [more] |
|
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90 |
In a secret sharing, a dealer generates n shares from a secret and random numbers and distributes the shares to each of ... [more] |
IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90 pp.220-225 |
SIP, IT, RCS |
2024-01-18 10:20 |
Miyagi |
(Primary: On-site, Secondary: Online) |
A quantum secret sharing scheme with a 4-qubit code Yuta Aoki, Mitsuru Tada (Chiba Univ.) IT2023-38 SIP2023-71 RCS2023-213 |
A Quantum secret sharing (QSS) is a cryptographic scheme in which a secret quantum state is converted into multiple quan... [more] |
IT2023-38 SIP2023-71 RCS2023-213 pp.45-50 |
LOIS, SITE, ISEC |
2023-11-09 12:40 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Private-preserving encoding and decoding using variable-length coding schemes Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13 |
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] |
ISEC2023-55 SITE2023-49 LOIS2023-13 pp.2-9 |
LOIS, SITE, ISEC |
2023-11-09 13:05 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) ISEC2023-56 SITE2023-50 LOIS2023-14 |
We propose a method to reduce the computational complexity of generating extended shares and regenerating lost shares in... [more] |
ISEC2023-56 SITE2023-50 LOIS2023-14 pp.10-17 |
IT |
2023-08-04 11:50 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
Mutually Orthogonal Latin Squares and Computational Complexity of the Secret Sharing Scheme Kouyou Nakamura, Shunpei Nishikawa, Tomoko Adachi (SIST) IT2023-26 |
The Secret Sharing Scheme proposed by Shamir in 1979, allows a secret to be shared among a set of participants. A Latin ... [more] |
IT2023-26 pp.68-73 |
RCC, ISEC, IT, WBS |
2023-03-15 13:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Data Sharing Illumination Light Communications System using (k,n) Visual Secret Sharing Scheme Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2022-120 ISEC2022-99 WBS2022-117 RCC2022-117 |
By using the principle of the (n, n) Visual Secret Sharing(VSS) scheme, a data-sharing illumination light communication ... [more] |
IT2022-120 ISEC2022-99 WBS2022-117 RCC2022-117 pp.331-336 |
QIT (2nd) |
2022-12-09 17:30 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Advance Sharing of Quantum Shares for Classical Secrets Rina Miyajima, Ryutaroh Matsumoto (Tokyo Tech) |
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret ... [more] |
|
MICT, WBS |
2022-07-25 13:35 |
Okayama |
Okayama Prefectural University |
Illumination-light Communication System Using Three (2,2) Threshold Secret Sharing System Yuma Yamada, Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) WBS2022-28 MICT2022-28 |
In this paper, a lightning optical communication system, that uses a frame consisting of three bits as a share of the se... [more] |
WBS2022-28 MICT2022-28 pp.65-69 |
RCS |
2022-06-17 15:20 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66 |
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] |
RCS2022-66 pp.247-252 |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
A New Necessary and Sufficient Condition for the Existence of a one-bit Secret Sharing Scheme and Its Applications Ryo Okamura, Hiroki Koga (Univ. Tsukuba) IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58 |
In a secret sharing scheme, a dealer generates $n$ shares from a secret and distributes the $n$ shares to respective par... [more] |
IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58 pp.1-6 |
NS, IN (Joint) |
2022-03-11 16:10 |
Online |
Online |
A Data Distribution Method for Digital Content Market Using P2P Networks Ryuji Kanno, Taiju Mikoshi (Nihon Univ.) NS2021-162 |
Online digital content market is becoming more popular, but the main market method is consignment sales to companies.Be... [more] |
NS2021-162 pp.236-240 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81 |
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] |
ICSS2021-81 pp.135-140 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 14:50 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Data privacy protection method for blockchain by using secret sharing Jun Nakajima (Hitachi) ICM2021-27 |
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] |
ICM2021-27 pp.21-26 |
RCS |
2021-06-23 10:30 |
Online |
Online |
A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35 |
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] |
RCS2021-35 pp.37-42 |
WBS, RCC, SAT, MICT (Joint) [detail] |
2021-05-20 09:55 |
Online |
Online (Zoom) |
RGB Parallel Transmission System for (n,n) Visual Secret Sharing Scheme Ryohei Hazu, Keisuke Manaka, Hiromasa Habuchi (Ibaraki Univ) WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2 |
In the illumination light communications using the intensity modulation/direct detection method, transmitted data cannot... [more] |
WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2 pp.7-12 |
ISEC |
2021-05-19 15:00 |
Online |
Online |
[Invited Talk]
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020) Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8 |
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] |
ISEC2021-8 p.33 |
WBS, IT, ISEC |
2021-03-04 15:20 |
Online |
Online |
A Consideration on Evolving Secret Sharing Schemes using Linear Codes Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.) IT2020-132 ISEC2020-62 WBS2020-51 |
Shamir's $(k, n)$ threshold scheme is realized by linear codes on a finite field. This scheme requires that an upper bou... [more] |
IT2020-132 ISEC2020-62 WBS2020-51 pp.123-127 |
WBS, IT, ISEC |
2021-03-05 11:20 |
Online |
Online |
Non-interactive multiparty computation adapt to dynamic participants Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67 |
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] |
IT2020-148 ISEC2020-78 WBS2020-67 pp.219-224 |
IA |
2021-01-29 14:50 |
Online |
Online |
Retrieval in Confined Decodable Secret Sharing Scheme by Comparison of Difference in Coefficient between Shares and Its Security Evaluation Tomo Nakamura, Ryohei Yoshitomi, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2020-34 |
In Kochi Prefecture, an effort is underway to back up medical data such as electronic medical records to remote location... [more] |
IA2020-34 pp.21-26 |