Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 11:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
Construction GKW Transformation for Arithmetic Circuits Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 |
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] |
IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 pp.31-37 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:40 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018) Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 |
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] |
ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 p.91 |
LOIS |
2017-03-03 14:15 |
Okinawa |
N.Ohama Memorial Hall |
A study on availability of attribute on smart device management system with functional encryption Makiko Aoyagi, Sakurako Tamura, Sakae Chikara, Hiroaki Isaka (NTT) LOIS2016-96 |
The Smart Device Management System provides access control for applications and contents by attribute information specif... [more] |
LOIS2016-96 pp.189-194 |
ISEC, LOIS, SITE |
2016-11-08 10:50 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) ISEC2016-62 SITE2016-52 LOIS2016-40 |
The Smart Device Management System provides access control for applications and contents by the specified parameters of ... [more] |
ISEC2016-62 SITE2016-52 LOIS2016-40 pp.69-74 |
ISEC |
2016-05-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3 |
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] |
ISEC2016-3 p.13 |
IT, ISEC, WBS |
2016-03-11 10:25 |
Tokyo |
The University of Electro-Communications |
Expressive Attribute-Based Encryption with Fast Decryption Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115 |
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] |
IT2015-132 ISEC2015-91 WBS2015-115 pp.189-195 |
IT, ISEC, WBS |
2016-03-11 13:05 |
Tokyo |
The University of Electro-Communications |
[Invited Talk]
A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119 |
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] |
IT2015-136 ISEC2015-95 WBS2015-119 p.219 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |
IT, ISEC, WBS |
2013-03-07 16:35 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
[Invited Talk]
Road of IT security standard
-- From cryptography to cloud and M2M security -- Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74 |
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] |
IT2012-88 ISEC2012-106 WBS2012-74 p.167 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
An ID-Based 2-Functional Proxy Cryptosystem Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143 |
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] |
IT2008-130 ISEC2008-188 WBS2008-143 pp.563-568 |