|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, IT, RCS |
2024-01-18 09:30 |
Miyagi |
(Primary: On-site, Secondary: Online) |
A Fundamental Study on Group Key Distribution Using Error Correction Coding Based on Wireless Physical Layer Secret Key Agreement Seiju Yoshida, Hideichi Sasaoka, Hisato Iwai, Ibi Shinsuke (Doshisha) IT2023-30 SIP2023-63 RCS2023-205 |
Group secret key agreement methods in the wireless physical layer include group key distribution using a one-time pad ch... [more] |
IT2023-30 SIP2023-63 RCS2023-205 pp.1-6 |
NS, RCS (Joint) |
2019-12-19 11:30 |
Tokushima |
Tokushima Univ. |
Study on correction method of key disagreement for group secret key agreement based on radio propagation characteristics in wireless networks Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2019-242 |
Secret key agreement based on radio propagation characteristics attracts attention as physical layer security, but there... [more] |
RCS2019-242 pp.31-36 |
ISEC, IT, WBS |
2011-03-04 10:25 |
Osaka |
Osaka University |
Performance Evaluations of Robust Group Key Exchange Protocols Takashi Sato, Atsuko Miyaji (JAIST) IT2010-95 ISEC2010-99 WBS2010-74 |
Group Key Exchange (GKE) allows a large group of $n$ parties to share a common secret key over insecure channels.
As t... [more] |
IT2010-95 ISEC2010-99 WBS2010-74 pp.167-175 |
ISEC, LOIS |
2008-11-13 16:05 |
Aichi |
Nagoya Noh Theater |
A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-80 OIS2008-56 |
Group signature scheme is one of signature schemes which keep signer’s identity information secret. To prevent a problem... [more] |
ISEC2008-80 OIS2008-56 pp.47-54 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Ring Authenticated Group Key Establishment with Member Repudiation Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo) ISEC2008-56 |
In this paper, we first extend the Deniable Ring Authentication Protocol proposed by M. Naor to include key establishmen... [more] |
ISEC2008-56 pp.155-162 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:45 |
Hokkaido |
Future University-Hakodate |
Efficient Group Signature Scheme based on the DDH Problem Takuya Yoshida, Koji Okada (Toshiba Solutions) ISEC2007-66 |
We propose an efficient group signature scheme, which is based on the DDH problem. A group signature scheme can be used ... [more] |
ISEC2007-66 pp.141-146 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications) |
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] |
ISEC2005-43 pp.1-8 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|