IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 31  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
pp.87-93
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
pp.91-96
RCC, ISEC, IT, WBS 2023-03-14
11:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields
Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75
Debris-Alazard, Sendrier, and Tillich proposed SURF in 2017, which is an efficient code-based signature scheme. However,... [more] IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75
pp.68-73
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] ISEC2022-45 SITE2022-49 LOIS2022-29
pp.92-99
IT, ISEC, RCC, WBS 2022-03-10
10:30
Online Online Threshold Signature Scheme Suitable for a Short Message
Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65
pp.42-49
WBS, IT, ISEC 2021-03-05
10:55
Online Online Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] IT2020-147 ISEC2020-77 WBS2020-66
pp.213-218
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
16:10
Online Online Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation
Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
pp.53-60
IT, ISEC, WBS 2016-03-11
10:00
Tokyo The University of Electro-Communications Reconsideration of Fail-Stop Signature Schemes and Their UC-Security
Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] IT2015-131 ISEC2015-90 WBS2015-114
pp.181-188
EMM 2016-03-02
15:40
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] Copyright Protection Scheme to Realize Edit Control between Two or More contents
Tatsuya Fujimoto, Keiichi Iwamura (TUS) EMM2015-84
We propose a new copyright protection technology suitable for editable contents, in contrast the conventional copyright ... [more] EMM2015-84
pp.45-50
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
ISEC 2014-09-05
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. Fail-Stop Signature Scheme with TTP and Its UC-Security
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] ISEC2014-49
pp.13-20
ISEC, IT, WBS 2014-03-11
11:00
Aichi Nagoya Univ., Higashiyama Campus A Note on Indistinguishability of Fail-Stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] IT2013-79 ISEC2013-108 WBS2013-68
pp.155-161
IT, ISEC, WBS 2013-03-07
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] IT2012-67 ISEC2012-85 WBS2012-53
pp.31-38
ICSS 2012-11-22
10:45
Hiroshima Miyajima Mori-no-Yado On Distribution of Certificate Revocation List Using Random Network Coding for VANET
Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] ICSS2012-45
pp.1-6
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] IT2010-71 ISEC2010-75 WBS2010-50
pp.23-30
PRMU 2011-02-17
16:00
Saitama   Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features
Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] PRMU2010-216
pp.49-54
VLD 2010-09-27
16:30
Kyoto Kyoto Institute of Technology [Invited Talk] An Automatic Test Generation Framework for Digitally-Assisted Analog Circuit
Satoshi Komatsu, Mohamed Abbas (Univ. of Tokyo), Yasuo Furukawa (Advantest), Kunihiro Asada (Univ. of Tokyo) VLD2010-46
This paper presents a new analog ATPG (AATPG) framework that generates near-optimal test stimulus for the digitally-assi... [more] VLD2010-46
pp.25-30
ISEC 2010-09-10
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. On the Extension of Rank Attacks to MPKC
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more]
ISEC2010-44
pp.35-40
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:00
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
pp.107-112
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
16:35
Aomori Hirosaki University Cost Estimates of CNTW Attack against EMV Signatures
Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2010-36 SITE2010-32 ICSS2010-42
Specification of EMV signatures is an ISO/IEC 9796-2 compliant format with extra redundancy, and used for certifying cre... [more] ISEC2010-36 SITE2010-32 ICSS2010-42
pp.195-201
 Results 1 - 20 of 31  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan