Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Post-Quantum Digital Signature Schemes Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 |
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] |
IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 pp.87-93 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Novel Image authentication scheme using error correction code and digital signature Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 |
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] |
ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 pp.91-96 |
RCC, ISEC, IT, WBS |
2023-03-14 11:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 |
Debris-Alazard, Sendrier, and Tillich proposed SURF in 2017, which is an efficient code-based signature scheme. However,... [more] |
IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 pp.68-73 |
ISEC, SITE, LOIS |
2022-11-18 17:20 |
Online |
Online |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29 |
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] |
ISEC2022-45 SITE2022-49 LOIS2022-29 pp.92-99 |
IT, ISEC, RCC, WBS |
2022-03-10 10:30 |
Online |
Online |
Threshold Signature Scheme Suitable for a Short Message Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 |
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] |
IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 pp.42-49 |
WBS, IT, ISEC |
2021-03-05 10:55 |
Online |
Online |
Digital Signatures with Wildcards Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66 |
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] |
IT2020-147 ISEC2020-77 WBS2020-66 pp.213-218 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:10 |
Online |
Online |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 |
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] |
ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 pp.53-60 |
IT, ISEC, WBS |
2016-03-11 10:00 |
Tokyo |
The University of Electro-Communications |
Reconsideration of Fail-Stop Signature Schemes and Their UC-Security Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114 |
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] |
IT2015-131 ISEC2015-90 WBS2015-114 pp.181-188 |
EMM |
2016-03-02 15:40 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
Copyright Protection Scheme to Realize Edit Control between Two or More contents Tatsuya Fujimoto, Keiichi Iwamura (TUS) EMM2015-84 |
We propose a new copyright protection technology suitable for editable contents, in contrast the conventional copyright ... [more] |
EMM2015-84 pp.45-50 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
ISEC |
2014-09-05 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fail-Stop Signature Scheme with TTP and Its UC-Security Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49 |
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] |
ISEC2014-49 pp.13-20 |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
IT, ISEC, WBS |
2013-03-07 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Consideration on Security Requirements of Fail-stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53 |
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] |
IT2012-67 ISEC2012-85 WBS2012-53 pp.31-38 |
ICSS |
2012-11-22 10:45 |
Hiroshima |
Miyajima Mori-no-Yado |
On Distribution of Certificate Revocation List Using Random Network Coding for VANET Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45 |
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] |
ICSS2012-45 pp.1-6 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
PRMU |
2011-02-17 16:00 |
Saitama |
|
Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216 |
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] |
PRMU2010-216 pp.49-54 |
VLD |
2010-09-27 16:30 |
Kyoto |
Kyoto Institute of Technology |
[Invited Talk]
An Automatic Test Generation Framework for Digitally-Assisted Analog Circuit Satoshi Komatsu, Mohamed Abbas (Univ. of Tokyo), Yasuo Furukawa (Advantest), Kunihiro Asada (Univ. of Tokyo) VLD2010-46 |
This paper presents a new analog ATPG (AATPG) framework that generates near-optimal test stimulus for the digitally-assi... [more] |
VLD2010-46 pp.25-30 |
ISEC |
2010-09-10 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Extension of Rank Attacks to MPKC Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44 |
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more] |
ISEC2010-44 pp.35-40 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 16:35 |
Aomori |
Hirosaki University |
Cost Estimates of CNTW Attack against EMV Signatures Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2010-36 SITE2010-32 ICSS2010-42 |
Specification of EMV signatures is an ISO/IEC 9796-2 compliant format with extra redundancy, and used for certifying cre... [more] |
ISEC2010-36 SITE2010-32 ICSS2010-42 pp.195-201 |