IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
11:00
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
p.265
IT, ISEC, RCC, WBS 2022-03-10
09:40
Online Online Construction GKW Transformation for Arithmetic Circuits
Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63
pp.31-37
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:40
Hokkaido Sapporo Convention Center [Invited Talk] Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
p.91
LOIS 2017-03-03
14:15
Okinawa N.Ohama Memorial Hall A study on availability of attribute on smart device management system with functional encryption
Makiko Aoyagi, Sakurako Tamura, Sakae Chikara, Hiroaki Isaka (NTT) LOIS2016-96
The Smart Device Management System provides access control for applications and contents by attribute information specif... [more] LOIS2016-96
pp.189-194
ISEC, LOIS, SITE 2016-11-08
10:50
Fukui Community Hall & AOSSA Mall, Fukui An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption
Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) ISEC2016-62 SITE2016-52 LOIS2016-40
The Smart Device Management System provides access control for applications and contents by the specified parameters of ... [more] ISEC2016-62 SITE2016-52 LOIS2016-40
pp.69-74
ISEC 2016-05-19
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] ISEC2016-3
p.13
IT, ISEC, WBS 2016-03-11
10:25
Tokyo The University of Electro-Communications Expressive Attribute-Based Encryption with Fast Decryption
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] IT2015-132 ISEC2015-91 WBS2015-115
pp.189-195
IT, ISEC, WBS 2016-03-11
13:05
Tokyo The University of Electro-Communications [Invited Talk] A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools
Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] IT2015-136 ISEC2015-95 WBS2015-119
p.219
ISEC 2014-09-05
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Dual System Encryption via Doubly Selective Security -- A Generic Framework for Fully-Secure Predicate Encryption --
Nuttapong Attrapadung (AIST) ISEC2014-54
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] ISEC2014-54
p.47
IT, ISEC, WBS 2013-03-07
16:35
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus [Invited Talk] Road of IT security standard -- From cryptography to cloud and M2M security --
Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] IT2012-88 ISEC2012-106 WBS2012-74
p.167
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. An ID-Based 2-Functional Proxy Cryptosystem
Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] IT2008-130 ISEC2008-188 WBS2008-143
pp.563-568
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan