Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
IT, ISEC, WBS |
2013-03-07 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Consideration on Security Requirements of Fail-stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53 |
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] |
IT2012-67 ISEC2012-85 WBS2012-53 pp.31-38 |
ISEC |
2012-12-12 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2012-74 |
There is a strong demand on enhancing the security of Controller Area Network (CAN) known as a major in-vehicle network.... [more] |
ISEC2012-74 pp.15-22 |
QIT (2nd) |
2012-11-27 11:20 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
A Quantum Relay using Quantum Scret Sharing Takashi Suzuki, Akihisa Tomita (Hokkaido Univ) |
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more] |
|
ISEC |
2012-05-18 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Incompleteness of the criterion for information theoretically key agreement Osamu Hirota (Tamagawa Univ.) ISEC2012-2 |
Despite theoretical haughty claim on the security of quantum key distribution (QKD), even the security for the basic mod... [more] |
ISEC2012-2 pp.5-10 |
ICSS |
2012-03-16 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47 |
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] |
ICSS2011-47 pp.49-54 |
IT |
2011-11-29 14:05 |
Iwate |
HOTEL MORI NO KAZE |
[Invited Talk]
The Practical Value of Information-Theoretic Security Technologies Tsutomu Matsumoto (YNU) IT2011-35 |
It is often recognized that information-theoretic security technologies are good in security but not practically appeari... [more] |
IT2011-35 pp.1-5 |
NLP |
2011-11-09 17:20 |
Okinawa |
Miyako Island Marine Terminal |
Secure key distribution using correlated randomness in optical devices Kazuyuki Yoshimura, Jun Muramatsu (NTT), Peter Davis (Telecognix), Atsushi Uchida (Saitama Univ.), Takahisa Harayama (Toyo Univ.) NLP2011-106 |
We propose a secure key distribution scheme based on correlated physical randomness in remote opticalscramblers driven b... [more] |
NLP2011-106 pp.81-84 |
NLP |
2011-11-09 17:45 |
Okinawa |
Miyako Island Marine Terminal |
Experiment on secure key distribution using correlated random phenomenon in semiconductor lasers Hayato Koizumi, Shinichiro Morikatsu, Hiroki Aida, Masaya Arahata, Atsushi Uchida (Saitama Univ.), Kazuyuki Yoshimura, Jun Muramatsu, Peter Davis (NTT) NLP2011-107 |
Recently it has been proposed that optical devices can be used to generate correlated random bit sequences and that secu... [more] |
NLP2011-107 pp.85-90 |
ISEC, IT, WBS |
2011-03-03 13:00 |
Osaka |
Osaka University |
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
IT2010-72 ISEC2010-76 WBS2010-51 pp.31-36 |
ISEC, IT, WBS |
2011-03-04 13:25 |
Osaka |
Osaka University |
Secure Multiplex Coding with a Common Message Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS) IT2010-111 ISEC2010-115 WBS2010-90 |
We determine the capacity region of the secure multiplex coding
with a common message, improve the exponent of mutual i... [more] |
IT2010-111 ISEC2010-115 WBS2010-90 pp.283-287 |
IT, ISEC, WBS |
2010-03-05 14:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-111 ISEC2009-119 WBS2009-90 |
Although the evaluation of biometric systems is often focusing on the
high performance matching approaches, it is not a... [more] |
IT2009-111 ISEC2009-119 WBS2009-90 pp.261-268 |
IT, ISEC, WBS |
2010-03-05 16:35 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Construction of wiretap codes from ordinary channel codes Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2009-144 ISEC2009-152 WBS2009-123 |
From an arbitrary given channel code over a discrete or Gaussian
memoryless channel, we construct a wiretap code with t... [more] |
IT2009-144 ISEC2009-152 WBS2009-123 pp.461-465 |
IT |
2009-12-01 14:40 |
Yamaguchi |
Yamaguchi-Yuda-Onsen Hotel Kamefuku |
[Invited Talk]
History and Perspective of Coding Problem for Interference Channel Kingo Kobayashi (NICT) IT2009-48 |
Recently, many young researchers of communication technology in the world
have a lot of interests to apply theoretical... [more] |
IT2009-48 pp.9-16 |
AP |
2009-06-11 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Modeling and Verification of Secret Key Agreement System Using Variable Directional Antenna Masahiko Maeda (ATR/Univ. of Hyogo), Takayuki Umaba (ATR), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-43 |
This paper describes modeling and verification of the mutual information shared by the wireless secret key agreement sys... [more] |
AP2009-43 pp.37-42 |
COMP |
2009-05-26 10:40 |
Saitama |
Saitama Univ. |
Strengthening the Security of Distributed Oblivious Transfer Kai Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama (Saitama Univ.) COMP2009-11 |
We study the distributed oblivious transfer first proposed by Naor and Pinkas in ASIACRYPT 2000, and generalized by Blun... [more] |
COMP2009-11 pp.13-19 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103 |
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] |
IT2008-90 ISEC2008-148 WBS2008-103 pp.301-306 |
RCS, AN, MoNA, SR (Joint) |
2009-03-06 10:35 |
Kanagawa |
YRP |
The Two-Way MIMO Wire-Tap Channel Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273 |
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] |
RCS2008-273 pp.361-366 |
SIP, RCS |
2009-01-23 11:45 |
Kumamoto |
Kumamoto University |
Directivity Set Selection to Improve Imac (Information mutual anti-tapping condition) for Wireless Secret Key Generator Exploiting ESPAR Antennas Taku Hasegawa, Jouji Narita, Hideyuki Uehara, Takashi Ohira (Toyohashi Univ. of Tech.) SIP2008-151 RCS2008-199 |
As an information-theoretically secure key distribution system for wireless communication, a secret key agreement system... [more] |
SIP2008-151 RCS2008-199 pp.161-166 |