Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 15:10 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Extended $k^m$-anonymity for randomization Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 |
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] |
ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 pp.255-260 |
NS |
2023-04-13 12:50 |
Fukushima |
Nihon University, Koriyama Campus + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Designing Name Obfuscation Protocol on Content-Centric Networking using a Programmable Switch Yutaro Yoshinaka, Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2023-1 |
In CCN, much user privacy leaks to eavesdroppers due to the routing based on content names, which are semantically rich ... [more] |
NS2023-1 pp.1-6 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] |
IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 pp.171-178 |
IN, NS (Joint) |
2023-03-03 13:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Designing Lightweight Anonymity Protocol for Host- and AS-Level Relationship Anonymity Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-238 |
Lightweight anonymity protocols achieve high-performance anonymity communication compared to Onion Routing, which repeat... [more] |
NS2022-238 pp.406-411 |
IN, NS (Joint) |
2023-03-03 14:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A Study on the Design of a Method for Balancing Anonymity and Accountability in Network-layer Anonymity Protocols Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-241 |
Tor is the most widely used application-layer anonymity protocol; however, its performance degradation due to its featur... [more] |
NS2022-241 pp.424-429 |
ISEC |
2022-05-18 16:00 |
Online |
Online |
[Invited Talk]
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022) Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6 |
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] |
ISEC2022-6 p.21 |
CQ, IMQ, MVE, IE (Joint) [detail] |
2022-03-11 14:15 |
Online |
Online (Zoom) |
A morphing-based web conference system for promoting turning on the video Shunsuke Yoshitsugu, Ryota Mima, Keita Kobayashi, Taro Obayashi, Tomoko Yonezawa (Kansai Univ.) IMQ2021-60 IE2021-122 MVE2021-89 |
(To be available after the conference date) [more] |
IMQ2021-60 IE2021-122 MVE2021-89 pp.261-265 |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
ICSS |
2021-11-29 14:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Ring Signature scheme based on prime-order bilinear group Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49 |
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] |
ICSS2021-49 pp.19-24 |
HCS, HIP, HI-SIGCOASTER [detail] |
2021-05-25 15:20 |
Online |
Online |
Prevention of extremist opinions through breaking entitativity in online communication Masato Kondo (Nagoya Univ.), Sachiko Kiyokawa (Univ. of Tokyo), Jiro Takai (Nagoya Univ.) HCS2021-15 HIP2021-15 |
People tend to conform to the majority opinion in an anonymous situation. This tendency may lead to undesirable result l... [more] |
HCS2021-15 HIP2021-15 pp.75-80 |
WBS, IT, ISEC |
2021-03-05 09:00 |
Online |
Online |
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62 |
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] |
IT2020-143 ISEC2020-73 WBS2020-62 pp.187-194 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Consideration on the mechanism of identifying and tracking Bitcoin users Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44 |
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] |
ICSS2020-44 pp.108-113 |
QIT (2nd) |
2020-12-10 17:30 |
Online |
Online |
Quantum anonymous senser which hides positions of magnetic fields Hiroto Kasai (Univ of Tsukuba/AIST), Yuki Takeuchi (NTT), Hideaki Hakoshima, Yuichiro Matsuzaki (AIST), Yasuhiro Tokura (Univ of Tsukuba) |
A lot of attention has been paid to a quantum sensing network for detecting magnetic fields in different positions.
Her... [more] |
|
ISEC |
2020-05-20 15:30 |
Online |
Online |
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11 |
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] |
ISEC2020-11 pp.47-54 |
NS, IN (Joint) |
2020-03-06 09:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A k-anonymity based Scheme for Private Location-related Content Retrieval in NDN Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-108 |
We have proposed a location-based forwarding scheme for Named Data Networking, in which consumers retrieve content from ... [more] |
IN2019-108 pp.177-182 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
IT, ISEC, WBS |
2019-03-08 16:10 |
Tokyo |
University of Electro-Communications |
Non-interactive Proof Systems for Group-Dependent Bundled Languages Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115 |
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more] |
IT2018-114 ISEC2018-120 WBS2018-115 pp.243-248 |
IA, IN (Joint) |
2018-12-14 11:10 |
Hiroshima |
Hiroshima Univ. |
Privacy Protection against a Semi-honest Anonymizer for Location-Based Services Kentaro Kita, Yoshiki Kurihara, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2018-67 |
Location-based services, which provide content based on locations which are specified by users, are becoming essential f... [more] |
IN2018-67 pp.49-54 |
WBS, IT, ISEC |
2018-03-09 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120 |
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] |
IT2017-139 ISEC2017-127 WBS2017-120 pp.213-218 |
ISEC, COMP |
2017-12-21 16:15 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Blacklistable Anonymous Credential System with Reputation Using Accumulator Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35 |
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] |
ISEC2017-81 COMP2017-35 pp.59-65 |