IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 131 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT 2020-12-01
13:50
Online Online [Invited Talk] Recent Progress in Visual Cryptography
Hiroki Koga (Univ. Tsukuba) IT2020-25
Visual cryptography is one of secret sharing schemes for digital images. More than 25 years have passed from the proposa... [more] IT2020-25
pp.7-12
CS, IN, NS, NV
(Joint)
2020-09-11
15:10
Online Online A study of steganography based on error correction code and secret sharing scheme
Kaito Onuma, Sumiko Miyata (SIT) CS2020-44
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] CS2020-44
pp.47-52
ISEC 2020-05-20
13:30
Online Online [Invited Talk] Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme (from CANDAR 2019)
Tomoki Agematsu (NEC), Satoshi Obana (Hosei univ) ISEC2020-6
In this research, we consider a strong ramp secret sharing scheme (SSS for short) that can detect cheating. A cheating-d... [more] ISEC2020-6
p.27
RCS, SR, SRW
(Joint)
2020-03-05
15:50
Tokyo Tokyo Institute of Technology
(Cancelled but technical report was issued)
Cherishing Old Knowledge concerning Turing Machine and Information Theory for Acquiring New Knowledge concerning Mind-Reading Machine -- Anti-Personnel Radar Applied to Brain-Machine Interface --
Makoto Koike (MK Microwave) RCS2019-372
Let Turing Machine be a model of a human brain, its Universal Turing machine serves as a model of mind-reading machine. ... [more] RCS2019-372
pp.269-274
ICSS, IPSJ-SPT 2020-03-02
10:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Information Rates for Multiple Assignment Schemes on Five Participants
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.) ICSS2019-70
In 1988, Ito et al. proposed a multiple assignment secret sharing scheme. Their scheme can realize an arbitrary access s... [more] ICSS2019-70
pp.13-18
CPSY, DC, IPSJ-ARC [detail] 2019-07-26
18:00
Hokkaido Kitami Civic Hall A Theoretical Study of a Composite Fail-safe Design with Secret Sharing Schemes for Railway Signalling Systems
Takashi Toyama (RTRI) CPSY2019-39 DC2019-39
As well-known, fail-safe computers are used in railway signalling systems. The fail-safe computers have functions to un... [more] CPSY2019-39 DC2019-39
pp.235-240
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
pp.187-192
WBS, MICT 2019-07-16
12:30
Ibaraki Ibaraki University(Mito Campus) [Poster Presentation] A Study of Data Transmission Scheme in Interference Area of VN-CSK Illumination Light Communication
Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2019-13 MICT2019-14
The Variable N-parallel code-shift-keying (VN-CSK) system has been proposed for solving the dimming control problem and ... [more] WBS2019-13 MICT2019-14
pp.17-22
EMM, IT 2019-05-24
10:35
Hokkaido Asahikawa International Conference Hall Searchable Image Encryption using Secret Sharing Scheme
Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] IT2019-9 EMM2019-9
pp.43-48
EA, SIP, SP 2019-03-14
13:30
Nagasaki i+Land nagasaki (Nagasaki-shi) [Poster Presentation] Steganographic Audio Secret Sharing
Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] EA2018-108 SIP2018-114 SP2018-70
pp.55-60
EMM 2019-03-14
11:05
Okinawa TBD Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels
Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] EMM2018-114
pp.123-128
IT, ISEC, WBS 2019-03-08
11:40
Tokyo University of Electro-Communications On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] IT2018-120 ISEC2018-126 WBS2018-121
pp.275-280
IT, ISEC, WBS 2019-03-08
13:30
Tokyo University of Electro-Communications Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more]
IT2018-122 ISEC2018-128 WBS2018-123
pp.285-290
RCS, SIP, IT 2019-01-31
15:15
Osaka Osaka University [Invited Talk] Security Enhancement Approaches to Wireless Communications by Secret Sharing and Signal Processing in Physical Layer
Shoichiro Yamasaki, Tomoko K. Matsushima (PTU) IT2018-50 SIP2018-80 RCS2018-257
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares,
an... [more]
IT2018-50 SIP2018-80 RCS2018-257
pp.85-90
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
09:50
Hiroshima Satellite Campus Hiroshima Secure PUF Authentication Method against Machine Learning Attack
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] VLD2018-49 DC2018-35
pp.77-82
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
QIT
(2nd)
2018-06-04
13:20
Hiroshima ICCH Ran [Poster Presentation] Proposal of simple authentication and secret-key-sharing system using a threshold-type single photon detector
Shin Arahira, Hitoshi Murai (OKI)
We report a quantum-mechanics-based authentication and secret-key-sharing system using intensity modulated light pulses ... [more]
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more]
IT2017-108 ISEC2017-96 WBS2017-89
pp.31-36
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
pp.81-88
 Results 21 - 40 of 131 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan