Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2020-12-01 13:50 |
Online |
Online |
[Invited Talk]
Recent Progress in Visual Cryptography Hiroki Koga (Univ. Tsukuba) IT2020-25 |
Visual cryptography is one of secret sharing schemes for digital images. More than 25 years have passed from the proposa... [more] |
IT2020-25 pp.7-12 |
CS, IN, NS, NV (Joint) |
2020-09-11 15:10 |
Online |
Online |
A study of steganography based on error correction code and secret sharing scheme Kaito Onuma, Sumiko Miyata (SIT) CS2020-44 |
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] |
CS2020-44 pp.47-52 |
ISEC |
2020-05-20 13:30 |
Online |
Online |
[Invited Talk]
Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme (from CANDAR 2019) Tomoki Agematsu (NEC), Satoshi Obana (Hosei univ) ISEC2020-6 |
In this research, we consider a strong ramp secret sharing scheme (SSS for short) that can detect cheating. A cheating-d... [more] |
ISEC2020-6 p.27 |
RCS, SR, SRW (Joint) |
2020-03-05 15:50 |
Tokyo |
Tokyo Institute of Technology (Cancelled but technical report was issued) |
Cherishing Old Knowledge concerning Turing Machine and Information Theory for Acquiring New Knowledge concerning Mind-Reading Machine
-- Anti-Personnel Radar Applied to Brain-Machine Interface -- Makoto Koike (MK Microwave) RCS2019-372 |
Let Turing Machine be a model of a human brain, its Universal Turing machine serves as a model of mind-reading machine. ... [more] |
RCS2019-372 pp.269-274 |
ICSS, IPSJ-SPT |
2020-03-02 10:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Information Rates for Multiple Assignment Schemes on Five Participants Yutaro Shimma, Kouya Tochikubo (Nihon Univ.) ICSS2019-70 |
In 1988, Ito et al. proposed a multiple assignment secret sharing scheme. Their scheme can realize an arbitrary access s... [more] |
ICSS2019-70 pp.13-18 |
CPSY, DC, IPSJ-ARC [detail] |
2019-07-26 18:00 |
Hokkaido |
Kitami Civic Hall |
A Theoretical Study of a Composite Fail-safe Design with Secret Sharing Schemes for Railway Signalling Systems Takashi Toyama (RTRI) CPSY2019-39 DC2019-39 |
As well-known, fail-safe computers are used in railway signalling systems. The fail-safe computers have functions to un... [more] |
CPSY2019-39 DC2019-39 pp.235-240 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:25 |
Kochi |
Kochi University of Technology |
A simulation of a 3-D visual cryptography using holography Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 |
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] |
ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 pp.187-192 |
WBS, MICT |
2019-07-16 12:30 |
Ibaraki |
Ibaraki University(Mito Campus) |
[Poster Presentation]
A Study of Data Transmission Scheme in Interference Area of VN-CSK Illumination Light Communication Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2019-13 MICT2019-14 |
The Variable N-parallel code-shift-keying (VN-CSK) system has been proposed for solving the dimming control problem and ... [more] |
WBS2019-13 MICT2019-14 pp.17-22 |
EMM, IT |
2019-05-24 10:35 |
Hokkaido |
Asahikawa International Conference Hall |
Searchable Image Encryption using Secret Sharing Scheme Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9 |
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] |
IT2019-9 EMM2019-9 pp.43-48 |
EA, SIP, SP |
2019-03-14 13:30 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
[Poster Presentation]
Steganographic Audio Secret Sharing Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70 |
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] |
EA2018-108 SIP2018-114 SP2018-70 pp.55-60 |
EMM |
2019-03-14 11:05 |
Okinawa |
TBD |
Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114 |
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] |
EMM2018-114 pp.123-128 |
IT, ISEC, WBS |
2019-03-08 11:40 |
Tokyo |
University of Electro-Communications |
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121 |
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] |
IT2018-120 ISEC2018-126 WBS2018-121 pp.275-280 |
IT, ISEC, WBS |
2019-03-08 13:30 |
Tokyo |
University of Electro-Communications |
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123 |
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more] |
IT2018-122 ISEC2018-128 WBS2018-123 pp.285-290 |
RCS, SIP, IT |
2019-01-31 15:15 |
Osaka |
Osaka University |
[Invited Talk]
Security Enhancement Approaches to Wireless Communications by Secret Sharing and Signal Processing in Physical Layer Shoichiro Yamasaki, Tomoko K. Matsushima (PTU) IT2018-50 SIP2018-80 RCS2018-257 |
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares,
an... [more] |
IT2018-50 SIP2018-80 RCS2018-257 pp.85-90 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2018-12-06 09:50 |
Hiroshima |
Satellite Campus Hiroshima |
Secure PUF Authentication Method against Machine Learning Attack Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35 |
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] |
VLD2018-49 DC2018-35 pp.77-82 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
QIT (2nd) |
2018-06-04 13:20 |
Hiroshima |
ICCH Ran |
[Poster Presentation]
Proposal of simple authentication and secret-key-sharing system using a threshold-type single photon detector Shin Arahira, Hitoshi Murai (OKI) |
We report a quantum-mechanics-based authentication and secret-key-sharing system using intensity modulated light pulses ... [more] |
|
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88 |
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] |
IT2017-107 ISEC2017-95 WBS2017-88 pp.25-30 |
WBS, IT, ISEC |
2018-03-08 11:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89 |
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more] |
IT2017-108 ISEC2017-96 WBS2017-89 pp.31-36 |
WBS, IT, ISEC |
2018-03-08 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99 |
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] |
IT2017-118 ISEC2017-106 WBS2017-99 pp.81-88 |