Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2018-03-08 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99 |
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] |
IT2017-118 ISEC2017-106 WBS2017-99 pp.81-88 |
ISEC, COMP |
2017-12-21 14:10 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
[Invited Talk]
Foundations and practical studies of secure computation Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32 |
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] |
ISEC2017-78 COMP2017-32 p.41 |
IT |
2017-09-08 11:15 |
Yamaguchi |
Centcore Yamaguchi Hotel |
A Strongly Secure Secret Sharing Scheme with Ramp Threshold Forms a Maximum Distance Separable Code Mikihiko Nishiara (Shinshu Univ.) IT2017-43 |
It is known that ideal secret sharing schemes can be constructed from MDS (maximum distance separable) codes on a finite... [more] |
IT2017-43 pp.27-30 |
ISEC |
2017-09-04 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Stabilizer Based Quantum Secret Sharing Constructed from Algebraic Curves Cheng Wang (Saitama Univ.), Takeshi Koshiba (Waseda Univ.) ISEC2017-44 |
In this paper we proposed a quantum secret sharing scheme constructed from algebraic curves and the stabilizer quantum e... [more] |
ISEC2017-44 pp.23-28 |
IT |
2017-07-13 10:40 |
Chiba |
Chiba University |
Study on Secret Sharing Scheme for Distributed Storage System Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2017-18 pp.11-14 |
EMM, IT |
2017-05-23 14:50 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-15 EMM2017-15 |
In the $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS for short), a secret black-white image is encoded to $n... [more] |
IT2017-15 EMM2017-15 pp.85-90 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing Ryutaroh Matsumoto (Tokyo Tech.) IT2016-132 ISEC2016-122 WBS2016-108 |
We show a simple example of a secret sharing scheme
encoding classical secret to quantum shares
that can realize an ac... [more] |
IT2016-132 ISEC2016-122 WBS2016-108 pp.215-216 |
IT, SIP, RCS |
2017-01-19 13:05 |
Osaka |
Osaka City Univ. |
A study on application of one time pad to enhance information secrecy in wireless distributed transmission Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250 |
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] |
IT2016-60 SIP2016-98 RCS2016-250 pp.81-86 |
IA, IN (Joint) |
2016-12-15 16:45 |
Hiroshima |
Hiroshima city university |
The Reconstruction System of Partial Information by using Partial Restoring Method in Secret Sharing Scheme Asami Tanaka, Masahiro Fukumoto (KUT) IA2016-70 |
Recently to prevent medical data from loss and leak, there is the distributed backup project using secret sharing scheme... [more] |
IA2016-70 pp.41-46 |
IA |
2016-11-09 13:35 |
Hokkaido |
Onuma International Seminar Hous |
Design of a Threshold-based Authentication System Which Provides Attributes Using Secret Sharing Tomohiro Ito, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2016-57 |
In identity federation, each service provider verifies the identity of a user based on authentication performed by an au... [more] |
IA2016-57 pp.7-12 |
RCS |
2016-10-20 11:35 |
Kanagawa |
YRP (Yokosuka) |
Study on Secret Information Sharing with Propagation Coefficient and Public Transmission of Antenna Weight Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2016-164 |
In recent years, as a countermeasure against eavesdropping in wireless communication, physical layer security draw atten... [more] |
RCS2016-164 pp.65-70 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 11:10 |
Yamaguchi |
|
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] |
ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 pp.137-143 |
ICSS, IA |
2016-06-06 15:40 |
Saga |
Saga University |
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4 |
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] |
IA2016-4 ICSS2016-4 pp.19-24 |
IT, EMM |
2016-05-19 14:05 |
Hokkaido |
Otaru Economic Center |
An Optimal Construction of Visual Secret Sharing Schemes for General Access Structures Using Integer Programming and its Application Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2016-6 EMM2016-6 |
In a visual secret sharing scheme for black-white images, a secret image is encoded to $n$ shares by using $n times m$ B... [more] |
IT2016-6 EMM2016-6 pp.31-36 |
SAT, WBS (Joint) |
2016-05-19 11:45 |
Aichi |
Nagoya Institute of Technology |
A Study on Multi-hop/Multi-route Network Systems using Visual Secret Sharing Scheme with Polar Signaling Liyuan Chen, Hiromasa Habuchi (Ibaraki Univ.) WBS2016-3 |
The visual secret sharing scheme is using non-negative signal, like 0 and 1, to show message data. So, it always has no ... [more] |
WBS2016-3 pp.13-16 |
IN, IA (Joint) |
2015-12-17 16:10 |
Hiroshima |
Hiroshima City University |
Neighbor-Disjoint Multi-Route Avoidance Routing Tetsuya Kanachi, Hiroaki Higaki (Tokyo Denki Univ.) IN2015-79 |
This paper proposes a novel routing protocol called neighbor-disjoint routing protocol in wireless multihop networks for... [more] |
IN2015-79 pp.49-54 |
IN, IA (Joint) |
2015-12-17 16:10 |
Hiroshima |
Hiroshima City University |
The Reconstruction of Partial Information by using Partial Restoring Method in Secret Sharing Scheme Asami Tanaka, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2015-74 |
Recently the medical data which backup and distributed in outside area using the secret sharing scheme (SSS) when the di... [more] |
IA2015-74 pp.31-36 |
IT |
2015-07-13 13:00 |
Tokyo |
Tokyo Institute of Technology |
Proposal of a Visual Secret Sharing Scheme Based on a Access Structure with Multiple Thresholds and Its Extensions Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2015-21 |
The visual secret sharing scheme is a nonconventional secret sharing scheme for digital images in which a secret image i... [more] |
IT2015-21 pp.23-28 |
RCS, IN (Joint) |
2015-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Using Signal Strength to prevent sessinon hijacking in IEEE 802.11 Nariaki Tamaki, Takehiro Kawata (NTT) IN2015-12 |
We propose a method for detecting malicious frames used to disconnect legitimate sessions, and preventing session hijack... [more] |
IN2015-12 pp.55-60 |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |