|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2021-11-29 14:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Ring Signature scheme based on prime-order bilinear group Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49 |
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] |
ICSS2021-49 pp.19-24 |
ISEC |
2017-05-12 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Shuichi Katsumata (Univ. of Tokyo), Shota Yamada (AIST) ISEC2017-11 |
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing prope... [more] |
ISEC2017-11 p.61 |
ISEC, LOIS |
2009-11-12 14:20 |
Gifu |
Gifu Univ. |
A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2009-53 LOIS2009-42 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user,and efficient pairing-based sch... [more] |
ISEC2009-53 LOIS2009-42 pp.15-22 |
ISEC |
2008-09-12 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] |
ISEC2008-68 pp.33-38 |
ISEC |
2007-12-19 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IBE to PKE Proxy Re-Encryption Takeo Mizuno, Hiroshi Doi (IISEC) ISEC2007-124 |
A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice’s public key into the diffe... [more] |
ISEC2007-124 pp.85-92 |
IT, ISEC, WBS |
2007-03-16 13:25 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Group Signature with Efficient Revocation Nao Nomura, Atsuko Miyaji, Keita Emura (JAIST) |
Previous group signature schemes with revocation have computational cost of signing and verification depends on revoked ... [more] |
IT2006-115 ISEC2006-170 WBS2006-112 pp.179-184 |
ISEC, LOIS |
2005-11-15 15:35 |
Fukuoka |
Kitakyushu Science and Research Park |
A Encryption Scheme with Recording Decryption Evidence Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA) |
Currently, in order to protect individual's privacy information such as the image of surveillance camera, it is indispen... [more] |
ISEC2005-109 OIS2005-72 pp.71-76 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|