Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, RCS (Joint) |
2010-12-17 15:30 |
Okayama |
Okayama Univ. |
A Study on Parameter Controls of Transmit Antenna Directivity for Secure Wireless Link Creation based on Secret Sharing Method Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.), Norihiko Morinaga (Hiroshima International Univ.) RCS2010-196 |
The authors have proposed a secure wireless communication scheme by producing shared information by secret sharing metho... [more] |
RCS2010-196 pp.221-226 |
AN, USN, SR, RCS (Joint) |
2010-10-28 09:30 |
Osaka |
Osaka University |
Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22 |
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] |
RCS2010-116 SR2010-49 AN2010-26 USN2010-22 pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN) |
ISEC |
2010-09-10 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A general construction method of visual secret sharing scheme with share rotations Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49 |
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] |
ISEC2010-49 pp.67-74 |
IT, ISEC, WBS |
2010-03-05 15:20 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ) IT2009-141 ISEC2009-149 WBS2009-120 |
Shamir’s polynomial interpolation scheme is a secret sharing scheme with univariate polynomial.
In this study, we inve... [more] |
IT2009-141 ISEC2009-149 WBS2009-120 pp.445-448 |
RCS |
2009-06-25 16:00 |
Aichi |
Nagoya University |
Position Dependence of Key Capacity in Secret Key Agreement Scheme Using ESPAR Antenna Shunichi Kawamura, Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2009-34 |
As a countermeasure for eavesdropping in wireless communication, a new secret key agreement scheme using a variable dire... [more] |
RCS2009-34 pp.37-42 |
AP |
2009-06-11 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Modeling and Verification of Secret Key Agreement System Using Variable Directional Antenna Masahiko Maeda (ATR/Univ. of Hyogo), Takayuki Umaba (ATR), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-43 |
This paper describes modeling and verification of the mutual information shared by the wireless secret key agreement sys... [more] |
AP2009-43 pp.37-42 |
ISEC |
2009-05-22 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5 |
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] |
ISEC2009-5 pp.29-36 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC) |
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] |
ISEC2008-42 pp.53-60 |
ISEC |
2007-09-07 10:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
visual cryptography schemes with tree access structure for many images Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-77 |
Let $T$ be a tree with order $n$ and maximum degree three.
We construct a
visual cryptography sharing scheme with $T$... [more] |
ISEC2007-77 pp.25-31 |
IT |
2007-07-20 09:30 |
Hyogo |
Kobe Univ. |
Proposal of a (2,2)-threshold visual secret sharing scheme for many images Taishi Sakamoto, Hiroki Koga (Univ. of Tsukuba) IT2007-15 |
The $(k,n)$-visual secret sharing scheme
(hereafter, the $(k,n)$-VSSS for short)
is a unconventional secret sharing ... [more] |
IT2007-15 pp.1-6 |
ISEC |
2007-05-18 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Visual Cryptography Schemes with Cyclic Structure for Many Images Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-12 |
We consider a visual cryptography sharing scheme with
cyclic access structure
for $n$ secret images and $n$ shares,
... [more] |
ISEC2007-12 pp.77-84 |
IT, ISEC, WBS |
2007-03-16 13:00 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Share selectable secret sharing scheme on inefficiency concentrated for particular user Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST) |
On Shamir threshold scheme, a participant's share is randomly given.\
The usability can be improved if share is select... [more] |
IT2006-114 ISEC2006-169 WBS2006-111 pp.173-178 |
MSS |
2006-07-26 10:25 |
Kyoto |
Kyoto Institute of Technology |
An Optimal Share Transfer Problem on Secret Sharing Storage Systems Toshiyuki Miyamoto, Sadatoshi Kumagai (Osaka Univ.) |
We have been proposing and developing a secure and reliable distributed storage system, which uses the secret sharing sc... [more] |
CST2006-11 pp.7-12 |
WBS, IT, ISEC |
2006-03-17 13:50 |
Aichi |
Nagoya Univ. |
A study on authentic method using a scheme of secret key agreement based on the radio channel characteristics Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
Eavesdropping and unauthorized use have become serious problems in Wireless Local Area Network (WLAN). They are more ess... [more] |
IT2005-117 ISEC2005-174 WBS2005-131 pp.129-134 |
RCS, AP, WBS, SR, MW, MoNA (Joint) |
2006-03-03 15:40 |
Kanagawa |
YRP |
A scheme of Private Key Agreement Based on Fluctuations of BER in Land Mobile Radio Takayasu Kitano, Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
This paper proposes a private key sharing scheme using the fluctuations of BER (Bit Error Rate). It utilizes the receive... [more] |
RCS2005-217 pp.235-240 |