Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, SIP, RCS |
2017-01-19 13:05 |
Osaka |
Osaka City Univ. |
A study on application of one time pad to enhance information secrecy in wireless distributed transmission Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250 |
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] |
IT2016-60 SIP2016-98 RCS2016-250 pp.81-86 |
IA, IN (Joint) |
2016-12-15 16:45 |
Hiroshima |
Hiroshima city university |
The Reconstruction System of Partial Information by using Partial Restoring Method in Secret Sharing Scheme Asami Tanaka, Masahiro Fukumoto (KUT) IA2016-70 |
Recently to prevent medical data from loss and leak, there is the distributed backup project using secret sharing scheme... [more] |
IA2016-70 pp.41-46 |
RCS |
2016-10-20 11:35 |
Kanagawa |
YRP (Yokosuka) |
Study on Secret Information Sharing with Propagation Coefficient and Public Transmission of Antenna Weight Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2016-164 |
In recent years, as a countermeasure against eavesdropping in wireless communication, physical layer security draw atten... [more] |
RCS2016-164 pp.65-70 |
IN, IA (Joint) |
2015-12-17 16:10 |
Hiroshima |
Hiroshima City University |
The Reconstruction of Partial Information by using Partial Restoring Method in Secret Sharing Scheme Asami Tanaka, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2015-74 |
Recently the medical data which backup and distributed in outside area using the secret sharing scheme (SSS) when the di... [more] |
IA2015-74 pp.31-36 |
RCS, IN (Joint) |
2015-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Using Signal Strength to prevent sessinon hijacking in IEEE 802.11 Nariaki Tamaki, Takehiro Kawata (NTT) IN2015-12 |
We propose a method for detecting malicious frames used to disconnect legitimate sessions, and preventing session hijack... [more] |
IN2015-12 pp.55-60 |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Generation Methods of Secret Sharing QR Codes Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92 |
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] |
EMM2014-92 pp.91-96 |
CAS, SIP, MSS, VLD, SIS [detail] |
2014-07-11 14:30 |
Hokkaido |
Hokkaido University |
Tamper resistance PUF ID based on secret sharing schemes Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42 |
In recently years, semiconductor counterfeiting has become a serious problem. To prevent the problem, Physical Unclonabl... [more] |
CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42 pp.225-230 |
SWIM |
2014-05-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4 |
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] |
SWIM2014-4 pp.19-24 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2013-88 ISEC2013-117 WBS2013-77 pp.215-220 |
LOIS |
2014-03-07 14:00 |
Okinawa |
|
On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT) LOIS2013-61 |
When one treats confidential data such as personal information on a life log or an office information system, fulfilling... [more] |
LOIS2013-61 pp.41-46 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
SIS, IPSJ-AVM |
2013-09-13 11:35 |
Tokyo |
Waseda Univ. |
A study on encoding scheme of secret sharing information Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) SIS2013-26 |
A secret sharing is attracting attention as an algorithm in cryptography. It is a method in which the source data is div... [more] |
SIS2013-26 pp.77-82 |
LOIS |
2013-03-07 14:30 |
Okinawa |
|
Medical Consumer Controllable Information Disclosing Method by Secret Sharing for Personal Health Record Wataru Mizoguchi, Taichi Tatsuda, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-81 |
There is a need for self-management of medical and health information by medical consumers themselves using PHR(Personal... [more] |
LOIS2012-81 pp.71-76 |
SIP, RCS |
2013-02-01 11:40 |
Hiroshima |
Viewport-Kure-Hotel (Kure) |
A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275 |
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] |
SIP2012-118 RCS2012-275 pp.219-224 |
EMM |
2013-01-30 11:10 |
Miyagi |
Tohoku Univ. |
A Secret Sharing Method for String Data Incorporating Their Transformation Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100 |
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more] |
EMM2012-100 pp.53-58 |
ISEC, LOIS |
2012-11-22 13:15 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Secret sharing using the Chinese remainder theorem and its application Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.) ISEC2012-66 LOIS2012-41 |
This paper presents a method of secret sharing using Chinese remainder theorem. In particular, we develop a system whic... [more] |
ISEC2012-66 LOIS2012-41 pp.61-68 |
EMM |
2012-10-04 14:00 |
Chiba |
Makuhari Messe |
Secret Sharing Suitable for Cloud Computing Satoshi Takahashi, Keiichi Iwamura (TUS) EMM2012-57 |
Recently, secret sharing has been attracting attention of applying to loud computing. For this reason is secret sharing ... [more] |
EMM2012-57 pp.11-16 |
IT |
2011-07-22 09:55 |
Okayama |
Okayama University |
On ramp secret sharing schemes for distributed storage systems under repair dynamics
-- Ramp Secret Sharing Schemes based on MBR Codes -- Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe Univ.) IT2011-17 |
In this paper, a construction method of ramp secret sharing systems based on minimum bandwidth regenerating(MBR) codes f... [more] |
IT2011-17 pp.41-46 |
ISEC, IT, WBS |
2011-03-04 14:55 |
Osaka |
Osaka University |
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.) IT2010-114 ISEC2010-118 WBS2010-93 |
In this paper, an extended version of Rashmi-Shah-Kumar Minimum Storage Regenerating(MSR) codes is proposed. In Rashmi-S... [more] |
IT2010-114 ISEC2010-118 WBS2010-93 pp.303-310 |