Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 |
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] |
ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 pp.45-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 |
Classical polynomial-time algorithms for solving the discrete logarithm problem (DLP) over a prime field have not been f... [more] |
ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 pp.119-126 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
ISEC |
2018-05-16 10:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature Masaaki Shirase (FUN) ISEC2018-1 |
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] |
ISEC2018-1 pp.1-8 |
COMP, ISEC |
2016-12-22 13:00 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015) Taechan Kim (NTT) ISEC2016-84 COMP2016-45 |
In this invited talk, we introduce the paper, "Extended tower number field sieve: A new complexity for the medium prime ... [more] |
ISEC2016-84 COMP2016-45 p.75 |
IT |
2014-07-18 14:00 |
Hyogo |
Kobe University |
Note on attack for a public key agreement based on non-commutative algebra Takaaki Miyamoto, Satoshi Iriyama (TUS) IT2014-33 |
Accardi, Ohya devised a (QP-KEX) public key sharing scheme based on a noncommutative algebra.
This is configured with ... [more] |
IT2014-33 pp.123-125 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 15:20 |
Shizuoka |
Shizuoka University |
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II) Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs) ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 |
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem
to find a positive integer $\alpha$ from e... [more] |
ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 pp.151-158 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72 |
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] |
IT2010-93 ISEC2010-97 WBS2010-72 pp.151-157 |
IT, ISEC, WBS |
2010-03-04 17:00 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate) IT2009-79 ISEC2009-87 WBS2009-58 |
The security of DSA and Diffie-Hellman key exchange is based on the
difficulty of the discrete logarithm problems (DLP)... [more] |
IT2009-79 ISEC2009-87 WBS2009-58 pp.53-60 |
IT, ISEC, WBS |
2010-03-05 16:10 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.) IT2009-129 ISEC2009-137 WBS2009-108 |
In this paper a probabilistic algorithm to solve the ECDLP is presented. This scheme uses the symmetry of the elliptic c... [more] |
IT2009-129 ISEC2009-137 WBS2009-108 pp.373-380 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori Yuji Nishigaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) IT2008-127 ISEC2008-185 WBS2008-140 |
In this paper we investigate the computational complexity of the discrete logarithm problem over algebraic tori (TDLP).
... [more] |
IT2008-127 ISEC2008-185 WBS2008-140 pp.545-550 |
ISEC |
2008-09-12 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Parameter Generation with Security and Efficiency -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67 |
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] |
ISEC2008-67 pp.25-32 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:55 |
Iwate |
Iwate Prefectural University |
Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme -- Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Sc... [more] |
ISEC2005-44 pp.9-16 |