IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 61  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, IT, RCS 2024-01-18
10:20
Miyagi
(Primary: On-site, Secondary: Online)
A quantum secret sharing scheme with a 4-qubit code
Yuta Aoki, Mitsuru Tada (Chiba Univ.) IT2023-38 SIP2023-71 RCS2023-213
A Quantum secret sharing (QSS) is a cryptographic scheme in which a secret quantum state is converted into multiple quan... [more] IT2023-38 SIP2023-71 RCS2023-213
pp.45-50
LOIS, SITE, ISEC 2023-11-09
12:40
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] ISEC2023-55 SITE2023-49 LOIS2023-13
pp.2-9
LOIS, SITE, ISEC 2023-11-09
13:05
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) ISEC2023-56 SITE2023-50 LOIS2023-14
We propose a method to reduce the computational complexity of generating extended shares and regenerating lost shares in... [more] ISEC2023-56 SITE2023-50 LOIS2023-14
pp.10-17
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
NS, IN
(Joint)
2022-03-11
16:10
Online Online A Data Distribution Method for Digital Content Market Using P2P Networks
Ryuji Kanno, Taiju Mikoshi (Nihon Univ.) NS2021-162
Online digital content market is becoming more popular, but the main market method is consignment sales to companies.Be... [more] NS2021-162
pp.236-240
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] ICSS2021-81
pp.135-140
CQ, ICM, NS, NV
(Joint)
2021-11-26
14:50
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Data privacy protection method for blockchain by using secret sharing
Jun Nakajima (Hitachi) ICM2021-27
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] ICM2021-27
pp.21-26
RCS 2021-06-23
10:30
Online Online A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation
Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] RCS2021-35
pp.37-42
WBS, RCC, SAT, MICT
(Joint) [detail]
2021-05-20
09:55
Online Online (Zoom) RGB Parallel Transmission System for (n,n) Visual Secret Sharing Scheme
Ryohei Hazu, Keisuke Manaka, Hiromasa Habuchi (Ibaraki Univ) WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2
In the illumination light communications using the intensity modulation/direct detection method, transmitted data cannot... [more] WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2
pp.7-12
IA 2021-01-29
14:50
Online Online Retrieval in Confined Decodable Secret Sharing Scheme by Comparison of Difference in Coefficient between Shares and Its Security Evaluation
Tomo Nakamura, Ryohei Yoshitomi, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2020-34
In Kochi Prefecture, an effort is underway to back up medical data such as electronic medical records to remote location... [more] IA2020-34
pp.21-26
CS, IN, NS, NV
(Joint)
2020-09-11
15:10
Online Online A study of steganography based on error correction code and secret sharing scheme
Kaito Onuma, Sumiko Miyata (SIT) CS2020-44
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] CS2020-44
pp.47-52
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
pp.187-192
EMM, IT 2019-05-24
10:35
Hokkaido Asahikawa International Conference Hall Searchable Image Encryption using Secret Sharing Scheme
Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] IT2019-9 EMM2019-9
pp.43-48
EA, SIP, SP 2019-03-14
13:30
Nagasaki i+Land nagasaki (Nagasaki-shi) [Poster Presentation] Steganographic Audio Secret Sharing
Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] EA2018-108 SIP2018-114 SP2018-70
pp.55-60
EMM 2019-03-14
11:05
Okinawa TBD Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels
Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] EMM2018-114
pp.123-128
IT, ISEC, WBS 2019-03-08
11:40
Tokyo University of Electro-Communications On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] IT2018-120 ISEC2018-126 WBS2018-121
pp.275-280
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
09:50
Hiroshima Satellite Campus Hiroshima Secure PUF Authentication Method against Machine Learning Attack
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] VLD2018-49 DC2018-35
pp.77-82
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
IT 2017-07-13
10:40
Chiba Chiba University Study on Secret Sharing Scheme for Distributed Storage System
Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] IT2017-18
pp.11-14
 Results 1 - 20 of 61  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan