Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Generation Methods of Secret Sharing QR Codes Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92 |
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] |
EMM2014-92 pp.91-96 |
ISEC, IT, WBS |
2015-03-02 15:35 |
Fukuoka |
The University of Kitakyushu |
(k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks Wataru Nakamura, Hirosuke Yamamoto (UTokyo) IT2014-79 ISEC2014-92 WBS2014-71 |
This paper treats $(k,n)$-threshold secret sharing schemes to detect substitution attacks. First a symbolwise coding sch... [more] |
IT2014-79 ISEC2014-92 WBS2014-71 pp.111-116 |
IT |
2014-09-19 10:15 |
Chiba |
|
A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44 |
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] |
IT2014-44 pp.19-24 |
IT |
2014-07-17 13:25 |
Hyogo |
Kobe University |
Coding Theoretic Construction of Quantum Ramp Secret Sharing Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2014-17 |
We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Sufficient conditions... [more] |
IT2014-17 pp.31-35 |
CAS, SIP, MSS, VLD, SIS [detail] |
2014-07-11 14:30 |
Hokkaido |
Hokkaido University |
Tamper resistance PUF ID based on secret sharing schemes Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42 |
In recently years, semiconductor counterfeiting has become a serious problem. To prevent the problem, Physical Unclonabl... [more] |
CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42 pp.225-230 |
SWIM |
2014-05-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4 |
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] |
SWIM2014-4 pp.19-24 |
EMM |
2014-05-15 14:30 |
Tokyo |
|
Secret Sharing based on Image Representation using Compressed Sensing Michiharu Niimi, Shinya Isaki, Hideki Noda (KIT) EMM2014-2 |
Due to the development of information technology, many types of data including documents, image and audio, etc. is digit... [more] |
EMM2014-2 pp.5-10 |
EMM |
2014-05-16 13:30 |
Tokyo |
|
[Tutorial Lecture]
Secret Sharing Schemes and Visual Secret Sharing Schemes
-- What is in common and what is different? -- Mitsugu Iwamoto (UEC) EMM2014-7 |
A Secret sharing scheme is one of the most fundamental primitives in cryptography and has a lot of applications. A visu... [more] |
EMM2014-7 pp.35-40 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2013-88 ISEC2013-117 WBS2013-77 pp.215-220 |
LOIS |
2014-03-07 14:00 |
Okinawa |
|
On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT) LOIS2013-61 |
When one treats confidential data such as personal information on a life log or an office information system, fulfilling... [more] |
LOIS2013-61 pp.41-46 |
NS |
2014-01-23 13:10 |
Okinawa |
Univ. of the Ryukyus |
[Invited Talk]
R&D of a High Secure Disaster Recovery Technology Noriharu Miyaho (Tokyo Denki Univ.) NS2013-163 |
In the present advanced information society, the social activities are supported by the electronic data infrastructure. ... [more] |
NS2013-163 pp.1-6 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
QIT (2nd) |
2013-11-19 15:10 |
Tokyo |
Waseda Univ. |
Relation between information and disturbance in Semi-Quantum Secret Sharing Ryoma Fujinoi, Takayuki Miyadera (Kyoto Univ.) |
Li et al (2013 J. Phys. A: Math. Theor. 46 045304) proposed a semi-quantum secret sharing protocol. The purpose of this ... [more] |
|
SIS, IPSJ-AVM |
2013-09-13 11:35 |
Tokyo |
Waseda Univ. |
A study on encoding scheme of secret sharing information Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) SIS2013-26 |
A secret sharing is attracting attention as an algorithm in cryptography. It is a method in which the source data is div... [more] |
SIS2013-26 pp.77-82 |
LOIS |
2013-03-07 14:30 |
Okinawa |
|
Medical Consumer Controllable Information Disclosing Method by Secret Sharing for Personal Health Record Wataru Mizoguchi, Taichi Tatsuda, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-81 |
There is a need for self-management of medical and health information by medical consumers themselves using PHR(Personal... [more] |
LOIS2012-81 pp.71-76 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77 |
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more] |
IT2012-91 ISEC2012-109 WBS2012-77 pp.181-188 |
SIP, RCS |
2013-02-01 11:40 |
Hiroshima |
Viewport-Kure-Hotel (Kure) |
A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275 |
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] |
SIP2012-118 RCS2012-275 pp.219-224 |
EMM |
2013-01-30 11:10 |
Miyagi |
Tohoku Univ. |
A Secret Sharing Method for String Data Incorporating Their Transformation Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100 |
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more] |
EMM2012-100 pp.53-58 |
QIT (2nd) |
2012-11-27 11:20 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
A Quantum Relay using Quantum Scret Sharing Takashi Suzuki, Akihisa Tomita (Hokkaido Univ) |
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more] |
|