Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, IT, RCS |
2024-01-18 10:20 |
Miyagi |
(Primary: On-site, Secondary: Online) |
A quantum secret sharing scheme with a 4-qubit code Yuta Aoki, Mitsuru Tada (Chiba Univ.) IT2023-38 SIP2023-71 RCS2023-213 |
A Quantum secret sharing (QSS) is a cryptographic scheme in which a secret quantum state is converted into multiple quan... [more] |
IT2023-38 SIP2023-71 RCS2023-213 pp.45-50 |
LOIS, SITE, ISEC |
2023-11-09 12:40 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Private-preserving encoding and decoding using variable-length coding schemes Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13 |
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] |
ISEC2023-55 SITE2023-49 LOIS2023-13 pp.2-9 |
LOIS, SITE, ISEC |
2023-11-09 13:05 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) ISEC2023-56 SITE2023-50 LOIS2023-14 |
We propose a method to reduce the computational complexity of generating extended shares and regenerating lost shares in... [more] |
ISEC2023-56 SITE2023-50 LOIS2023-14 pp.10-17 |
RCS |
2022-06-17 15:20 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66 |
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] |
RCS2022-66 pp.247-252 |
NS, IN (Joint) |
2022-03-11 16:10 |
Online |
Online |
A Data Distribution Method for Digital Content Market Using P2P Networks Ryuji Kanno, Taiju Mikoshi (Nihon Univ.) NS2021-162 |
Online digital content market is becoming more popular, but the main market method is consignment sales to companies.Be... [more] |
NS2021-162 pp.236-240 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81 |
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] |
ICSS2021-81 pp.135-140 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 14:50 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Data privacy protection method for blockchain by using secret sharing Jun Nakajima (Hitachi) ICM2021-27 |
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] |
ICM2021-27 pp.21-26 |
RCS |
2021-06-23 10:30 |
Online |
Online |
A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35 |
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] |
RCS2021-35 pp.37-42 |
WBS, RCC, SAT, MICT (Joint) [detail] |
2021-05-20 09:55 |
Online |
Online (Zoom) |
RGB Parallel Transmission System for (n,n) Visual Secret Sharing Scheme Ryohei Hazu, Keisuke Manaka, Hiromasa Habuchi (Ibaraki Univ) WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2 |
In the illumination light communications using the intensity modulation/direct detection method, transmitted data cannot... [more] |
WBS2021-2 RCC2021-2 SAT2021-2 MICT2021-2 pp.7-12 |
IA |
2021-01-29 14:50 |
Online |
Online |
Retrieval in Confined Decodable Secret Sharing Scheme by Comparison of Difference in Coefficient between Shares and Its Security Evaluation Tomo Nakamura, Ryohei Yoshitomi, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2020-34 |
In Kochi Prefecture, an effort is underway to back up medical data such as electronic medical records to remote location... [more] |
IA2020-34 pp.21-26 |
CS, IN, NS, NV (Joint) |
2020-09-11 15:10 |
Online |
Online |
A study of steganography based on error correction code and secret sharing scheme Kaito Onuma, Sumiko Miyata (SIT) CS2020-44 |
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] |
CS2020-44 pp.47-52 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:25 |
Kochi |
Kochi University of Technology |
A simulation of a 3-D visual cryptography using holography Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 |
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] |
ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 pp.187-192 |
EMM, IT |
2019-05-24 10:35 |
Hokkaido |
Asahikawa International Conference Hall |
Searchable Image Encryption using Secret Sharing Scheme Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9 |
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] |
IT2019-9 EMM2019-9 pp.43-48 |
EA, SIP, SP |
2019-03-14 13:30 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
[Poster Presentation]
Steganographic Audio Secret Sharing Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70 |
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] |
EA2018-108 SIP2018-114 SP2018-70 pp.55-60 |
EMM |
2019-03-14 11:05 |
Okinawa |
TBD |
Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114 |
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] |
EMM2018-114 pp.123-128 |
IT, ISEC, WBS |
2019-03-08 11:40 |
Tokyo |
University of Electro-Communications |
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121 |
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] |
IT2018-120 ISEC2018-126 WBS2018-121 pp.275-280 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2018-12-06 09:50 |
Hiroshima |
Satellite Campus Hiroshima |
Secure PUF Authentication Method against Machine Learning Attack Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35 |
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] |
VLD2018-49 DC2018-35 pp.77-82 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88 |
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] |
IT2017-107 ISEC2017-95 WBS2017-88 pp.25-30 |
ISEC, COMP |
2017-12-21 14:10 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
[Invited Talk]
Foundations and practical studies of secure computation Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32 |
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] |
ISEC2017-78 COMP2017-32 p.41 |
IT |
2017-07-13 10:40 |
Chiba |
Chiba University |
Study on Secret Sharing Scheme for Distributed Storage System Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2017-18 pp.11-14 |