IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 76 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2019-03-14
11:05
Okinawa TBD Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels
Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] EMM2018-114
pp.123-128
IT, ISEC, WBS 2019-03-08
11:40
Tokyo University of Electro-Communications On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] IT2018-120 ISEC2018-126 WBS2018-121
pp.275-280
IT, ISEC, WBS 2019-03-08
13:30
Tokyo University of Electro-Communications Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more]
IT2018-122 ISEC2018-128 WBS2018-123
pp.285-290
RCS, SIP, IT 2019-01-31
15:15
Osaka Osaka University [Invited Talk] Security Enhancement Approaches to Wireless Communications by Secret Sharing and Signal Processing in Physical Layer
Shoichiro Yamasaki, Tomoko K. Matsushima (PTU) IT2018-50 SIP2018-80 RCS2018-257
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares,
an... [more]
IT2018-50 SIP2018-80 RCS2018-257
pp.85-90
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more]
IT2017-108 ISEC2017-96 WBS2017-89
pp.31-36
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
pp.81-88
IT 2017-09-08
11:15
Yamaguchi Centcore Yamaguchi Hotel A Strongly Secure Secret Sharing Scheme with Ramp Threshold Forms a Maximum Distance Separable Code
Mikihiko Nishiara (Shinshu Univ.) IT2017-43
It is known that ideal secret sharing schemes can be constructed from MDS (maximum distance separable) codes on a finite... [more] IT2017-43
pp.27-30
ISEC 2017-09-04
14:30
Tokyo Kikai-Shinko-Kaikan Bldg. Stabilizer Based Quantum Secret Sharing Constructed from Algebraic Curves
Cheng Wang (Saitama Univ.), Takeshi Koshiba (Waseda Univ.) ISEC2017-44
In this paper we proposed a quantum secret sharing scheme constructed from algebraic curves and the stabilizer quantum e... [more] ISEC2017-44
pp.23-28
IT 2017-07-13
10:40
Chiba Chiba University Study on Secret Sharing Scheme for Distributed Storage System
Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] IT2017-18
pp.11-14
EMM, IT 2017-05-23
14:50
Yamagata Yamagata University(Yonezawa Campus) A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality
Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-15 EMM2017-15
In the $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS for short), a secret black-white image is encoded to $n... [more] IT2017-15 EMM2017-15
pp.85-90
ISEC, WBS, IT 2017-03-10
14:35
Tokyo TOKAI University Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh Matsumoto (Tokyo Tech.) IT2016-132 ISEC2016-122 WBS2016-108
We show a simple example of a secret sharing scheme
encoding classical secret to quantum shares
that can realize an ac... [more]
IT2016-132 ISEC2016-122 WBS2016-108
pp.215-216
IT, SIP, RCS 2017-01-19
13:05
Osaka Osaka City Univ. A study on application of one time pad to enhance information secrecy in wireless distributed transmission
Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] IT2016-60 SIP2016-98 RCS2016-250
pp.81-86
ICSS, IA 2016-06-06
15:40
Saga Saga University Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN
Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] IA2016-4 ICSS2016-4
pp.19-24
IT, EMM 2016-05-19
14:05
Hokkaido Otaru Economic Center An Optimal Construction of Visual Secret Sharing Schemes for General Access Structures Using Integer Programming and its Application
Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2016-6 EMM2016-6
In a visual secret sharing scheme for black-white images, a secret image is encoded to $n$ shares by using $n times m$ B... [more] IT2016-6 EMM2016-6
pp.31-36
IN, IA
(Joint)
2015-12-17
16:10
Hiroshima Hiroshima City University Neighbor-Disjoint Multi-Route Avoidance Routing
Tetsuya Kanachi, Hiroaki Higaki (Tokyo Denki Univ.) IN2015-79
This paper proposes a novel routing protocol called neighbor-disjoint routing protocol in wireless multihop networks for... [more] IN2015-79
pp.49-54
AP, RCS, WPT, SAT
(Joint)
2015-11-04
10:50
Okinawa Okinawa Prefectural Museum & Art Museum Secret Key Agreement Scheme Using Random Number Transmission over a Public Channel and Partial Sequence Selection Based on Radio Propagation Characteristics
Tatsuya Matsumoto, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2015-192
As a countermeasure against eavesdropping in wireless communications secret key agreement based on radio propagation cha... [more] RCS2015-192
pp.13-18
IT 2015-07-13
13:00
Tokyo Tokyo Institute of Technology Proposal of a Visual Secret Sharing Scheme Based on a Access Structure with Multiple Thresholds and Its Extensions
Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2015-21
The visual secret sharing scheme is a nonconventional secret sharing scheme for digital images in which a secret image i... [more] IT2015-21
pp.23-28
EMM, IT 2015-05-22
13:40
Kyoto Kyoto International Community House An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] IT2015-14 EMM2015-14
pp.75-80
 Results 21 - 40 of 76 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan