IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 76 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Generation Methods of Secret Sharing QR Codes
Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] EMM2014-92
pp.91-96
RCS, SR, SRW
(Joint)
2015-03-06
11:40
Tokyo Tokyo Institute of Technology Secret Key Agreement Scheme Based on Pre-measurement of Radio Wave Propagation Characteristics
Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2014-358
In recent years, for the technology of physical layer security, there has been increasing interest in secret key agreeme... [more] RCS2014-358
pp.339-344
ISEC, IT, WBS 2015-03-02
15:35
Fukuoka The University of Kitakyushu (k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks
Wataru Nakamura, Hirosuke Yamamoto (UTokyo) IT2014-79 ISEC2014-92 WBS2014-71
This paper treats $(k,n)$-threshold secret sharing schemes to detect substitution attacks. First a symbolwise coding sch... [more] IT2014-79 ISEC2014-92 WBS2014-71
pp.111-116
IT 2014-09-19
10:15
Chiba   A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] IT2014-44
pp.19-24
EMM 2014-05-15
14:30
Tokyo   Secret Sharing based on Image Representation using Compressed Sensing
Michiharu Niimi, Shinya Isaki, Hideki Noda (KIT) EMM2014-2
Due to the development of information technology, many types of data including documents, image and audio, etc. is digit... [more] EMM2014-2
pp.5-10
ISEC, IT, WBS 2014-03-11
14:35
Aichi Nagoya Univ., Higashiyama Campus On a secret sharing scheme with systematic Reed-Solomon codes and its applications
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] IT2013-88 ISEC2013-117 WBS2013-77
pp.215-220
SIS 2013-12-13
13:10
Tottori Torigin Bunka Kaikan (Tottori) A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] SIS2013-51
pp.131-136
QIT
(2nd)
2013-11-19
15:10
Tokyo Waseda Univ. Relation between information and disturbance in Semi-Quantum Secret Sharing
Ryoma Fujinoi, Takayuki Miyadera (Kyoto Univ.)
Li et al (2013 J. Phys. A: Math. Theor. 46 045304) proposed a semi-quantum secret sharing protocol. The purpose of this ... [more]
SIS, IPSJ-AVM 2013-09-13
11:35
Tokyo Waseda Univ. A study on encoding scheme of secret sharing information
Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) SIS2013-26
A secret sharing is attracting attention as an algorithm in cryptography. It is a method in which the source data is div... [more] SIS2013-26
pp.77-82
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more]
IT2012-91 ISEC2012-109 WBS2012-77
pp.181-188
SIP, RCS 2013-02-01
11:40
Hiroshima Viewport-Kure-Hotel (Kure) A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming
Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] SIP2012-118 RCS2012-275
pp.219-224
EMM 2013-01-30
11:10
Miyagi Tohoku Univ. A Secret Sharing Method for String Data Incorporating Their Transformation
Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more]
EMM2012-100
pp.53-58
QIT
(2nd)
2012-11-27
11:20
Kanagawa Keio Univ. Hiyoshi Campus A Quantum Relay using Quantum Scret Sharing
Takashi Suzuki, Akihisa Tomita (Hokkaido Univ)
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more]
ISEC, LOIS 2012-11-22
13:15
Shizuoka Shizuoka City Industry-University Exchange Center Secret sharing using the Chinese remainder theorem and its application
Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.) ISEC2012-66 LOIS2012-41
This paper presents a method of secret sharing using Chinese remainder theorem. In particular, we develop a system whic... [more] ISEC2012-66 LOIS2012-41
pp.61-68
EMM 2012-10-04
14:00
Chiba Makuhari Messe Secret Sharing Suitable for Cloud Computing
Satoshi Takahashi, Keiichi Iwamura (TUS) EMM2012-57
Recently, secret sharing has been attracting attention of applying to loud computing. For this reason is secret sharing ... [more] EMM2012-57
pp.11-16
IT, ISEC, WBS 2012-03-01
14:20
Kanagawa   Consideration for IT-secure password protected secret sharing
Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] IT2011-52 ISEC2011-79 WBS2011-53
pp.41-43
ISEC, LOIS 2011-11-15
11:25
Osaka Osaka Electro-Communication University Secure and Effective Password Management System
Ryo Hirano, Masakatu Morii (Kobe Univ.) ISEC2011-53 LOIS2011-47
Secure authentication schemes are being widely investigated
in order to avoid many risks on the internet. It is
necess... [more]
ISEC2011-53 LOIS2011-47
pp.129-134
IA, ICSS 2011-06-17
10:25
Fukuoka Kyushu Institute of Technology Secure and Traceable Online Image Sharing Scheme for Service Providers
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2011-8 ICSS2011-8
We propose a scheme for application service providers to provide a secure and traceable online image sharing service. To... [more] IA2011-8 ICSS2011-8
pp.41-46
IT 2011-05-20
13:55
Osaka Osaka City University Access Structure of Secret Sharing Scheme based on Second-Degree Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ.) IT2011-4
Shamir's polynomial interpolation scheme is a secret sharing scheme
with univariate polynomial.
In this study, we inve... [more]
IT2011-4
pp.19-24
RCS 2011-04-21
14:20
Kanagawa Keio University Secret Key Agreement for Multiple Terminals Based on Radio Propagation Characteristics in Wireless Relaying Systems
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2011-7
We consider secret key agreement for multiple terminals based on radio propagation characteristics in a wireless relayin... [more] RCS2011-7
pp.35-40
 Results 41 - 60 of 76 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan