Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
ISEC |
2017-05-12 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fully Secure Oblivious Keyword Search Kaoru Kurosawa, Yuuki Nemoto (Ibaraki Univ.) ISEC2017-2 |
Oblivious keyword search (OKS) is a secure two party protocol such that the server has ( Data={(x_i,m_i)} ), and the cli... [more] |
ISEC2017-2 pp.7-14 |
ISEC |
2017-05-12 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on the Numbers of Cards Required to Make Copied Commitments Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3 |
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] |
ISEC2017-3 pp.15-22 |
ISEC |
2017-05-12 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Size-Hiding Computation for Multiple Parties
-- from ASIACRYPT 2016 -- Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Koji Nuida (AIST/PRESTO), Takashi Nishide (Univ. of Tsukuba), Goichiro Hanaoka (AIST), Eiji Okamoto (Univ. of Tsukuba) ISEC2017-4 |
[more] |
ISEC2017-4 p.23 |
ISEC |
2017-05-12 12:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
How to circumvent the two-ciphertext lower bound for linear gabling schemes
-- from ASIACRYPT 2016 -- Ryo Kikuchi (NTT) ISEC2017-5 |
At EUROCRYPT 2015, Zahur et al. argued that all linear, and thus, efficient, garbling schemes need at least two $k$-bit ... [more] |
ISEC2017-5 p.25 |
ISEC |
2017-05-12 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Experiences of Data Preprocessing Approach for Network Security Event Analytics Masayoshi Mizutani (IBM, Japan) ISEC2017-6 |
[more] |
ISEC2017-6 pp.27-33 |
ISEC |
2017-05-12 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Edge-side Threat Detection and Reaction Framework for Multiple IoT Use Models Takuya Mishina, Naoto Sato, Fumiko Satoh (IBM) ISEC2017-7 |
[more] |
ISEC2017-7 pp.35-42 |
ISEC |
2017-05-12 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
SandVeil: A Tool for Improving Sandbox Resilience to Evasion Rui Tanabe, Atsushi Yahata, Kou Ishii, Akira Yokoyama, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2017-8 |
Malware sandbox is an essential tool for malware analysis and detection. However, many sandbox detection methods have be... [more] |
ISEC2017-8 pp.43-49 |
ISEC |
2017-05-12 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability Keita Emura (NICT) ISEC2017-9 |
[more] |
ISEC2017-9 pp.51-57 |
ISEC |
2017-05-12 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
-- from ASIACRYPT 2016 -- Keita Xagawa (NTT) ISEC2017-10 |
[more] |
ISEC2017-10 p.59 |
ISEC |
2017-05-12 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Shuichi Katsumata (Univ. of Tokyo), Shota Yamada (AIST) ISEC2017-11 |
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing prope... [more] |
ISEC2017-11 p.61 |
ISEC |
2017-05-12 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones Yuyu Wang (Tokyo Tech/AIST), Zongyang Zhang (Beihang University), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2017-12 |
In this paper, we bridge the gap between structure-preserving signatures (SPSs) and fully structure-preserving signature... [more] |
ISEC2017-12 p.63 |