IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
10:45
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
LOIS, SITE, ISEC 2023-11-10
11:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] ISEC2023-66 SITE2023-60 LOIS2023-24
pp.78-85
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
15:10
Hokkaido Hokkaido Jichiro Kaikan Extended $k^m$-anonymity for randomization
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
pp.255-260
RCC, ISEC, IT, WBS 2023-03-15
14:55
Yamaguchi
(Primary: On-site, Secondary: Online)
Experiments on pre-image computation time in Keccak[r = 40, c = 160, nr = 2]
Xinyu Qi, Atsushi Fujioka (Kanagawa Univ), Kazumaro Aoki (BUNKYO Univ) IT2022-131 ISEC2022-110 WBS2022-128 RCC2022-128
Keccak is the technology behind the cryptographic hash function selected by the National Institute of Standards and Tech... [more] IT2022-131 ISEC2022-110 WBS2022-128 RCC2022-128
pp.398-403
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
15:50
Online Online Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure
Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35
pp.118-123
SITE, ISEC, LOIS 2021-11-12
13:50
Online Online Security notions of decryption-controllable identity-based encryption
Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] ISEC2021-43 SITE2021-37 LOIS2021-26
pp.13-17
LOIS, ISEC, SITE 2020-11-06
11:45
Online Online Encodings and Numbers of Ciphertexts in Garbled Circuits on Three-valued Logic
Shunsuke Hayashi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2020-35 SITE2020-32 LOIS2020-15
Reducing the number of ciphertexts in a garbled circuit, a realization
method of secure computation, has been researche... [more]
ISEC2020-35 SITE2020-32 LOIS2020-15
pp.19-25
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
WBS, IT, ISEC 2018-03-08
09:00
Tokyo Katsusika Campas, Tokyo University of Science Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-117 ISEC2017-105 WBS2017-98
This paper examines randomizing components in Minalpher, where the randomizing components are Shift Rows (SR) and Mix C... [more] IT2017-117 ISEC2017-105 WBS2017-98
pp.73-79
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more]
IT2017-125 ISEC2017-113 WBS2017-106
pp.129-135
WBS, IT, ISEC 2018-03-09
09:00
Tokyo Katsusika Campas, Tokyo University of Science A Note on Security Notions of Anonymity in Identity-Based Encryption -- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] IT2017-139 ISEC2017-127 WBS2017-120
pp.213-218
WBS, IT, ISEC 2018-03-09
09:25
Tokyo Katsusika Campas, Tokyo University of Science On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] IT2017-140 ISEC2017-128 WBS2017-121
pp.219-223
ISEC, COMP 2017-12-22
10:40
Kochi Eikokuji Campus, Kochi University of Technology A Note on Security Notions of Anonymity in Identity-Based Encryption -- Relationship between LOR security and SW security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] ISEC2017-85 COMP2017-39
pp.89-94
COMP, ISEC 2016-12-21
09:50
Hiroshima Hiroshima University A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] ISEC2016-71 COMP2016-32
pp.9-13
COMP, ISEC 2016-12-22
09:30
Hiroshima Hiroshima University Effect on Mix Columns to the Security of Minalpher
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) ISEC2016-80 COMP2016-41
This article is about Mix Columns in Minalpher. SPN strcture have Mix Columns. Mix Columns have an influence on sa... [more] ISEC2016-80 COMP2016-41
pp.59-62
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan