Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2014-09-05 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Class of Multivariate Public Key Cryptosystem, K(X)RSE(2)PKC and K_M(X)RSE(2)PKC Constructed based on Reed-Solomon Code, along with K(XI)RSE(2)PKC. Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-47 |
[more] |
ISEC2014-47 pp.1-7 |
ISEC |
2014-09-05 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution: Part II Takehisa Iwakoshi (Tamagawa Univ.) ISEC2014-48 |
Quantum Key Distribution (QKD) has been attracting attention as an important technique to share a provably secure key un... [more] |
ISEC2014-48 pp.9-11 |
ISEC |
2014-09-05 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fail-Stop Signature Scheme with TTP and Its UC-Security Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49 |
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] |
ISEC2014-49 pp.13-20 |
ISEC |
2014-09-05 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System Shahidatul Sadiah (Okayama Univ.), Toru Nakanishi (Hiroshima Univ.), Nobuo Funabiki (Okayama Univ.) ISEC2014-50 |
An anonymous credential system on attributes allows a user to convince a service provider anonymously that he/she owns t... [more] |
ISEC2014-50 pp.21-26 |
ISEC |
2014-09-05 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Computer Simulation of Garbled Searchable Symmetric Encryption Scheme Keisuke Sasaki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2014-51 |
In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which ... [more] |
ISEC2014-51 pp.27-34 |
ISEC |
2014-09-05 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
GPU implementation of Ciphers using Schematic to Program Translator(SPT) Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-52 |
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it is not easy to develop... [more] |
ISEC2014-52 pp.35-42 |
ISEC |
2014-09-05 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on EUROCRYPT 2014 Ryotaro Hayashi (Toshiba) ISEC2014-53 |
The annual international cryptology conference EUROCRYPT 2014 was held on May 11th - 15th, 2014, at Copenhagen, Denmark ... [more] |
ISEC2014-53 pp.43-45 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |
ISEC |
2014-09-05 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Kazuhiko Minematsu (NEC) ISEC2014-55 |
This paper proposes a new authenticated encryption (AE) scheme, called OTR for Offset Two-Round, which can be realized a... [more] |
ISEC2014-55 p.49 |