Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2022-05-18 16:00 |
Online |
Online |
[Invited Talk]
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022) Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6 |
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] |
ISEC2022-6 p.21 |
CQ, IMQ, MVE, IE (Joint) [detail] |
2022-03-11 14:15 |
Online |
Online (Zoom) |
A morphing-based web conference system for promoting turning on the video Shunsuke Yoshitsugu, Ryota Mima, Keita Kobayashi, Taro Obayashi, Tomoko Yonezawa (Kansai Univ.) IMQ2021-60 IE2021-122 MVE2021-89 |
(To be available after the conference date) [more] |
IMQ2021-60 IE2021-122 MVE2021-89 pp.261-265 |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
ICSS |
2021-11-29 14:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Ring Signature scheme based on prime-order bilinear group Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49 |
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] |
ICSS2021-49 pp.19-24 |
HCS, HIP, HI-SIGCE [detail] |
2021-05-25 15:20 |
Online |
Online |
Prevention of extremist opinions through breaking entitativity in online communication Masato Kondo (Nagoya Univ.), Sachiko Kiyokawa (Univ. of Tokyo), Jiro Takai (Nagoya Univ.) HCS2021-15 HIP2021-15 |
People tend to conform to the majority opinion in an anonymous situation. This tendency may lead to undesirable result l... [more] |
HCS2021-15 HIP2021-15 pp.75-80 |
WBS, IT, ISEC |
2021-03-05 09:00 |
Online |
Online |
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62 |
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] |
IT2020-143 ISEC2020-73 WBS2020-62 pp.187-194 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Consideration on the mechanism of identifying and tracking Bitcoin users Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44 |
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] |
ICSS2020-44 pp.108-113 |
QIT (2nd) |
2020-12-10 17:30 |
Online |
Online |
Quantum anonymous senser which hides positions of magnetic fields Hiroto Kasai (Univ of Tsukuba/AIST), Yuki Takeuchi (NTT), Hideaki Hakoshima, Yuichiro Matsuzaki (AIST), Yasuhiro Tokura (Univ of Tsukuba) |
A lot of attention has been paid to a quantum sensing network for detecting magnetic fields in different positions.
Her... [more] |
|
ISEC |
2020-05-20 15:30 |
Online |
Online |
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11 |
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] |
ISEC2020-11 pp.47-54 |
NS, IN (Joint) |
2020-03-06 09:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A k-anonymity based Scheme for Private Location-related Content Retrieval in NDN Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-108 |
We have proposed a location-based forwarding scheme for Named Data Networking, in which consumers retrieve content from ... [more] |
IN2019-108 pp.177-182 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
IT, ISEC, WBS |
2019-03-08 16:10 |
Tokyo |
University of Electro-Communications |
Non-interactive Proof Systems for Group-Dependent Bundled Languages Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115 |
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more] |
IT2018-114 ISEC2018-120 WBS2018-115 pp.243-248 |
IA, IN (Joint) |
2018-12-14 11:10 |
Hiroshima |
Hiroshima Univ. |
Privacy Protection against a Semi-honest Anonymizer for Location-Based Services Kentaro Kita, Yoshiki Kurihara, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2018-67 |
Location-based services, which provide content based on locations which are specified by users, are becoming essential f... [more] |
IN2018-67 pp.49-54 |
WBS, IT, ISEC |
2018-03-09 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120 |
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] |
IT2017-139 ISEC2017-127 WBS2017-120 pp.213-218 |
ISEC, COMP |
2017-12-21 16:15 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Blacklistable Anonymous Credential System with Reputation Using Accumulator Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35 |
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] |
ISEC2017-81 COMP2017-35 pp.59-65 |
ISEC, COMP |
2017-12-22 10:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39 |
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] |
ISEC2017-85 COMP2017-39 pp.89-94 |
IA, IN (Joint) |
2017-12-15 15:00 |
Hiroshima |
Hiroshima City Univ. |
A Study on Location Privacy for Multicast-Based Services Kentaro Kita, Kai Ryu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2017-63 |
Since Internet of Things (IoT) data generally correlates with its location where it is sensed, location-based forwarding... [more] |
IN2017-63 pp.103-108 |
EMM |
2017-11-06 17:05 |
Kagoshima |
Kagoshima Univ. (Inamori Academy) |
An algorithm to reduce information loss by swapping data in k-anonymous partitions Kodai Shigeoka (Osaka Univ.), Hiroko Akiyama (NIT,Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-60 |
Given a dataset consisting of multidimensional numerical vectors, we consider $k$-anonymization by first dividing the da... [more] |
EMM2017-60 pp.27-31 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2017-11-08 12:30 |
Kumamoto |
Kumamoto-Kenminkouryukan Parea |
Application of blind watermarking method for secondary use on smart community Yuta Ohno, Akira Niwa, Hiroaki Nishi (Keio Univ.) VLD2017-58 DC2017-64 |
The smart community aims to enrich people's livelihood by secondary use of personal data such as home electric power and... [more] |
VLD2017-58 DC2017-64 pp.191-196 |
COMP, ISEC |
2016-12-21 09:50 |
Hiroshima |
Hiroshima University |
A note on security notions of anonymity in Identity-based encryption Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32 |
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] |
ISEC2016-71 COMP2016-32 pp.9-13 |