Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Generation Methods of Secret Sharing QR Codes Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92 |
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] |
EMM2014-92 pp.91-96 |
RCS, SR, SRW (Joint) |
2015-03-06 11:40 |
Tokyo |
Tokyo Institute of Technology |
Secret Key Agreement Scheme Based on Pre-measurement of Radio Wave Propagation Characteristics Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2014-358 |
In recent years, for the technology of physical layer security, there has been increasing interest in secret key agreeme... [more] |
RCS2014-358 pp.339-344 |
ISEC, IT, WBS |
2015-03-02 15:35 |
Fukuoka |
The University of Kitakyushu |
(k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks Wataru Nakamura, Hirosuke Yamamoto (UTokyo) IT2014-79 ISEC2014-92 WBS2014-71 |
This paper treats $(k,n)$-threshold secret sharing schemes to detect substitution attacks. First a symbolwise coding sch... [more] |
IT2014-79 ISEC2014-92 WBS2014-71 pp.111-116 |
IT |
2014-09-19 10:15 |
Chiba |
|
A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44 |
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] |
IT2014-44 pp.19-24 |
EMM |
2014-05-15 14:30 |
Tokyo |
|
Secret Sharing based on Image Representation using Compressed Sensing Michiharu Niimi, Shinya Isaki, Hideki Noda (KIT) EMM2014-2 |
Due to the development of information technology, many types of data including documents, image and audio, etc. is digit... [more] |
EMM2014-2 pp.5-10 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2013-88 ISEC2013-117 WBS2013-77 pp.215-220 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
QIT (2nd) |
2013-11-19 15:10 |
Tokyo |
Waseda Univ. |
Relation between information and disturbance in Semi-Quantum Secret Sharing Ryoma Fujinoi, Takayuki Miyadera (Kyoto Univ.) |
Li et al (2013 J. Phys. A: Math. Theor. 46 045304) proposed a semi-quantum secret sharing protocol. The purpose of this ... [more] |
|
SIS, IPSJ-AVM |
2013-09-13 11:35 |
Tokyo |
Waseda Univ. |
A study on encoding scheme of secret sharing information Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) SIS2013-26 |
A secret sharing is attracting attention as an algorithm in cryptography. It is a method in which the source data is div... [more] |
SIS2013-26 pp.77-82 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77 |
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more] |
IT2012-91 ISEC2012-109 WBS2012-77 pp.181-188 |
SIP, RCS |
2013-02-01 11:40 |
Hiroshima |
Viewport-Kure-Hotel (Kure) |
A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275 |
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] |
SIP2012-118 RCS2012-275 pp.219-224 |
EMM |
2013-01-30 11:10 |
Miyagi |
Tohoku Univ. |
A Secret Sharing Method for String Data Incorporating Their Transformation Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100 |
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more] |
EMM2012-100 pp.53-58 |
QIT (2nd) |
2012-11-27 11:20 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
A Quantum Relay using Quantum Scret Sharing Takashi Suzuki, Akihisa Tomita (Hokkaido Univ) |
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more] |
|
ISEC, LOIS |
2012-11-22 13:15 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Secret sharing using the Chinese remainder theorem and its application Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.) ISEC2012-66 LOIS2012-41 |
This paper presents a method of secret sharing using Chinese remainder theorem. In particular, we develop a system whic... [more] |
ISEC2012-66 LOIS2012-41 pp.61-68 |
EMM |
2012-10-04 14:00 |
Chiba |
Makuhari Messe |
Secret Sharing Suitable for Cloud Computing Satoshi Takahashi, Keiichi Iwamura (TUS) EMM2012-57 |
Recently, secret sharing has been attracting attention of applying to loud computing. For this reason is secret sharing ... [more] |
EMM2012-57 pp.11-16 |
IT, ISEC, WBS |
2012-03-01 14:20 |
Kanagawa |
|
Consideration for IT-secure password protected secret sharing Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53 |
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] |
IT2011-52 ISEC2011-79 WBS2011-53 pp.41-43 |
ISEC, LOIS |
2011-11-15 11:25 |
Osaka |
Osaka Electro-Communication University |
Secure and Effective Password Management System Ryo Hirano, Masakatu Morii (Kobe Univ.) ISEC2011-53 LOIS2011-47 |
Secure authentication schemes are being widely investigated
in order to avoid many risks on the internet. It is
necess... [more] |
ISEC2011-53 LOIS2011-47 pp.129-134 |
IA, ICSS |
2011-06-17 10:25 |
Fukuoka |
Kyushu Institute of Technology |
Secure and Traceable Online Image Sharing Scheme for Service Providers Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2011-8 ICSS2011-8 |
We propose a scheme for application service providers to provide a secure and traceable online image sharing service. To... [more] |
IA2011-8 ICSS2011-8 pp.41-46 |
IT |
2011-05-20 13:55 |
Osaka |
Osaka City University |
Access Structure of Secret Sharing Scheme based on Second-Degree Bivariate Polynomial Interpolation Scheme Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ.) IT2011-4 |
Shamir's polynomial interpolation scheme is a secret sharing scheme
with univariate polynomial.
In this study, we inve... [more] |
IT2011-4 pp.19-24 |
RCS |
2011-04-21 14:20 |
Kanagawa |
Keio University |
Secret Key Agreement for Multiple Terminals Based on Radio Propagation Characteristics in Wireless Relaying Systems Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2011-7 |
We consider secret key agreement for multiple terminals based on radio propagation characteristics in a wireless relayin... [more] |
RCS2011-7 pp.35-40 |