Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SP, EA, SIP |
2020-03-02 15:10 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
A Pattern Recognition Method Using Secure Sparse Representations in L0 Norm Minimization Takayuki Nakachi, Yitu Wang (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EA2019-130 SIP2019-132 SP2019-79 |
In this paper, we propose a privacy-preserving pattern recognition method using encrypted sparse representations in L0 n... [more] |
EA2019-130 SIP2019-132 SP2019-79 pp.169-174 |
ITE-BCT, SIS |
2019-10-25 11:10 |
Fukui |
Fukui International Activities Plaza |
Image Compression in Encryption-then-Compression System Using Secure Sparse Representations Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21 |
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] |
SIS2019-21 pp.77-82 |
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] |
2019-09-19 15:10 |
Niigata |
Tokimeito, Niigata University |
Secure sparse representations in L0 norm minimization Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2019-11 IE2019-24 EMM2019-68 |
In this paper, we propose a method to estimate secure sparse representations in L0 norm minimization, and evaluate the e... [more] |
LOIS2019-11 IE2019-24 EMM2019-68 pp.25-30 |
CPSY, DC, IPSJ-ARC [detail] |
2019-07-26 17:00 |
Hokkaido |
Kitami Civic Hall |
Secure Distributed Computing using Blockchain Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37 |
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] |
CPSY2019-37 DC2019-37 pp.223-227 |
ISEC |
2019-05-17 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018) Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11 |
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] |
ISEC2019-11 p.49 |
EMM |
2019-03-14 11:30 |
Okinawa |
TBD |
Image Patch Modeling using Secure Computation of Sparse Dictionary Learning Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-115 |
With the advent of the big data era, digital content continues to increase.
Sparse coding is attracting attention as an... [more] |
EMM2018-115 pp.129-134 |
SIS |
2019-03-06 15:10 |
Tokyo |
Tokyo Univ. Science, Katsushika Campus |
Secure Computation of Sparse Dictionary Learning Takayuki Nakachi, Yukihiro Bandoh (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-43 |
With the advent of the big data era, all digital contents continue to increase. Sparse modeling is drawing attention as ... [more] |
SIS2018-43 pp.35-40 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 14:45 |
Hokkaido |
Hokkaido Univ. |
Encrypted Image Classification by Using Secure OMP Computation Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) ITS2018-84 IE2018-105 |
Currently, huge amounts of image/video are being recorded and uploaded every day by surveillance systems or SNS services... [more] |
ITS2018-84 IE2018-105 pp.227-232 |
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] |
2018-09-27 13:50 |
Oita |
Beppu Int'l Convention Ctr. aka B-CON Plaza |
Image Patch Modeling in Encrypted Domain using Sparse Coding Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2018-12 IE2018-32 EMM2018-51 |
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] |
LOIS2018-12 IE2018-32 EMM2018-51 pp.13-18 |
ISEC |
2018-09-07 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Ryo Kikuchi (NTT) ISEC2018-54 |
In this invited talk, we introduce the paper ``Fast Large-Scale Honest-Majority MPC for Malicious Adversaries'' by Koji ... [more] |
ISEC2018-54 p.25 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 16:15 |
Hokkaido |
Sapporo Convention Center |
Secure Multiparty Computation of Ranking Using a Deck of Cards Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 |
(To be available after the conference date) [more] |
ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 pp.163-169 |
SIS, IPSJ-AVM, ITE-3DMT [detail] |
2018-06-07 10:20 |
Hokkaido |
Jozankei View Hotel |
Secure Computation of Sparse Coding for Privacy Protection Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-2 |
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] |
SIS2018-2 pp.7-12 |
ISEC |
2018-05-16 11:30 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
The Minimum Number of Cards in Practical Card-Based Protocols (from ASIACRYPT 2017) Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-4 |
In this invited talk, we introduce the paper ``The Minimum Number of Cards in Practical Card-Based Protocols'' by J. Kas... [more] |
ISEC2018-4 p.25 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105 |
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] |
IT2017-124 ISEC2017-112 WBS2017-105 pp.121-128 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106 |
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more] |
IT2017-125 ISEC2017-113 WBS2017-106 pp.129-135 |
ISEC, COMP |
2017-12-21 14:10 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
[Invited Talk]
Foundations and practical studies of secure computation Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32 |
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] |
ISEC2017-78 COMP2017-32 p.41 |
ISEC |
2017-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42 |
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] |
ISEC2017-42 pp.7-14 |
ISEC |
2017-09-04 12:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-43 |
(To be available after the conference date) [more] |
ISEC2017-43 pp.15-22 |
ISEC |
2017-05-12 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on the Numbers of Cards Required to Make Copied Commitments Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3 |
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] |
ISEC2017-3 pp.15-22 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-09 15:30 |
Okinawa |
Kumejima Island |
Approach to Direct Memory Access for Tamper Resistant System using Secure Processor Rihito Suzuki, Takuya Kajiwara, Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2016-138 DC2016-84 |
In an environment using secure processor to support secure program execution, because of its integrity check mechanism, ... [more] |
CPSY2016-138 DC2016-84 pp.39-44 |