IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 66  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2022-05-18
16:00
Online Online [Invited Talk] Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022)
Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] ISEC2022-6
p.21
CQ, IMQ, MVE, IE
(Joint) [detail]
2022-03-11
14:15
Online Online (Zoom) A morphing-based web conference system for promoting turning on the video
Shunsuke Yoshitsugu, Ryota Mima, Keita Kobayashi, Taro Obayashi, Tomoko Yonezawa (Kansai Univ.) IMQ2021-60 IE2021-122 MVE2021-89
(To be available after the conference date) [more] IMQ2021-60 IE2021-122 MVE2021-89
pp.261-265
ICSS 2021-11-29
13:00
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Current status, issues, and research trends of user authentication in mobile networks
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] ICSS2021-46
pp.1-6
ICSS 2021-11-29
14:15
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Ring Signature scheme based on prime-order bilinear group
Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] ICSS2021-49
pp.19-24
HCS, HIP, HI-SIGCE [detail] 2021-05-25
15:20
Online Online Prevention of extremist opinions through breaking entitativity in online communication
Masato Kondo (Nagoya Univ.), Sachiko Kiyokawa (Univ. of Tokyo), Jiro Takai (Nagoya Univ.) HCS2021-15 HIP2021-15
People tend to conform to the majority opinion in an anonymous situation. This tendency may lead to undesirable result l... [more] HCS2021-15 HIP2021-15
pp.75-80
WBS, IT, ISEC 2021-03-05
09:00
Online Online Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] IT2020-143 ISEC2020-73 WBS2020-62
pp.187-194
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Consideration on the mechanism of identifying and tracking Bitcoin users
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] ICSS2020-44
pp.108-113
QIT
(2nd)
2020-12-10
17:30
Online Online Quantum anonymous senser which hides positions of magnetic fields
Hiroto Kasai (Univ of Tsukuba/AIST), Yuki Takeuchi (NTT), Hideaki Hakoshima, Yuichiro Matsuzaki (AIST), Yasuhiro Tokura (Univ of Tsukuba)
A lot of attention has been paid to a quantum sensing network for detecting magnetic fields in different positions.
Her... [more]

ISEC 2020-05-20
15:30
Online Online An Anonymous Trust-Marking Scheme on NEM Blockchain Systems
Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] ISEC2020-11
pp.47-54
NS, IN
(Joint)
2020-03-06
09:10
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
A k-anonymity based Scheme for Private Location-related Content Retrieval in NDN
Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-108
We have proposed a location-based forwarding scheme for Named Data Networking, in which consumers retrieve content from ... [more] IN2019-108
pp.177-182
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
IT, ISEC, WBS 2019-03-08
16:10
Tokyo University of Electro-Communications Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more]
IT2018-114 ISEC2018-120 WBS2018-115
pp.243-248
IA, IN
(Joint)
2018-12-14
11:10
Hiroshima Hiroshima Univ. Privacy Protection against a Semi-honest Anonymizer for Location-Based Services
Kentaro Kita, Yoshiki Kurihara, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2018-67
Location-based services, which provide content based on locations which are specified by users, are becoming essential f... [more] IN2018-67
pp.49-54
WBS, IT, ISEC 2018-03-09
09:00
Tokyo Katsusika Campas, Tokyo University of Science A Note on Security Notions of Anonymity in Identity-Based Encryption -- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] IT2017-139 ISEC2017-127 WBS2017-120
pp.213-218
ISEC, COMP 2017-12-21
16:15
Kochi Eikokuji Campus, Kochi University of Technology Blacklistable Anonymous Credential System with Reputation Using Accumulator
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] ISEC2017-81 COMP2017-35
pp.59-65
ISEC, COMP 2017-12-22
10:40
Kochi Eikokuji Campus, Kochi University of Technology A Note on Security Notions of Anonymity in Identity-Based Encryption -- Relationship between LOR security and SW security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] ISEC2017-85 COMP2017-39
pp.89-94
IA, IN
(Joint)
2017-12-15
15:00
Hiroshima Hiroshima City Univ. A Study on Location Privacy for Multicast-Based Services
Kentaro Kita, Kai Ryu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2017-63
Since Internet of Things (IoT) data generally correlates with its location where it is sensed, location-based forwarding... [more] IN2017-63
pp.103-108
EMM 2017-11-06
17:05
Kagoshima Kagoshima Univ. (Inamori Academy) An algorithm to reduce information loss by swapping data in k-anonymous partitions
Kodai Shigeoka (Osaka Univ.), Hiroko Akiyama (NIT,Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-60
Given a dataset consisting of multidimensional numerical vectors, we consider $k$-anonymization by first dividing the da... [more] EMM2017-60
pp.27-31
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2017-11-08
12:30
Kumamoto Kumamoto-Kenminkouryukan Parea Application of blind watermarking method for secondary use on smart community
Yuta Ohno, Akira Niwa, Hiroaki Nishi (Keio Univ.) VLD2017-58 DC2017-64
The smart community aims to enrich people's livelihood by secondary use of personal data such as home electric power and... [more] VLD2017-58 DC2017-64
pp.191-196
COMP, ISEC 2016-12-21
09:50
Hiroshima Hiroshima University A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] ISEC2016-71 COMP2016-32
pp.9-13
 Results 1 - 20 of 66  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan