Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2024-05-15 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
(To be available after the conference date) [more] |
|
RCC, ISEC, IT, WBS |
2024-03-13 10:45 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
An Identity Management System using Group Signatures with Message-Dependent Opening Yuto Imura, Keita Emura (Kanazawa Univ.) IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 |
Isshiki et al. (ACM DRM 2006) proposed a privacy-preserving ID management system using group signatures (Isshiki system)... [more] |
IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 pp.267-272 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Encrypted data sharing system based on IBE secure against the KGC Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 |
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] |
IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 pp.273-278 |
LOIS, SITE, ISEC |
2023-11-10 11:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24 |
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] |
ISEC2023-66 SITE2023-60 LOIS2023-24 pp.78-85 |
AP |
2023-09-01 13:00 |
Tokyo |
KOZO KEIKAKU ENGINEERING Inc. (Primary: On-site, Secondary: Online) |
Validation of a Pseudo-Scale Model by Evaluating Electromagnetic Fields Using the Sommerfeld Integral for the Air-Sea Two-Layer Problem Nozomu Ishii, Takanobu Watanabe (Niigata Univ.) AP2023-76 |
In this report, the numerical convergence of the Sommerfeld integral (SI) is investigated by using Sommerfeld's identity... [more] |
AP2023-76 pp.55-60 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Hierarchical Identity-based Matchmaking Encryption Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 |
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] |
ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 pp.60-67 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Identity-based Signature Scheme with Tight Security Reduction Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 |
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] |
ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 pp.97-104 |
RCC, ISEC, IT, WBS |
2023-03-14 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Identity-based Matchmaking Encryption Secure against the KGC Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 |
Identity-based matchmaking encryption (IB-ME) is an extention of identity-based encryption (IBE) where both the sender a... [more] |
IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 pp.179-186 |
RCC, ISEC, IT, WBS |
2023-03-15 13:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A proposal of an attribute protection scheme in self-sovereign identity systems with shared terminals Wataru Nakamura, Kenta Takahashi (Hitachi) IT2022-127 ISEC2022-106 WBS2022-124 RCC2022-124 |
The concept of Self-Sovereign Identity (SSI), which states that users' identity information should be controlled by them... [more] |
IT2022-127 ISEC2022-106 WBS2022-124 RCC2022-124 pp.372-377 |
SIS |
2023-03-02 14:10 |
Chiba |
Chiba Institute of Technology (Primary: On-site, Secondary: Online) |
Timeout ciphers based on ID-based cryptography Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45 |
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] |
SIS2022-45 pp.27-32 |
HCGSYMPO (2nd) |
2022-12-14 - 2022-12-16 |
Kagawa |
Onsite (Sunport Takamatsu) and Online (Primary: On-site, Secondary: Online) |
Proposal of Place Sameness and a realization trial with virtual reality Saizo Aoyagi (Komazawa Univ.), Satoshi Fukumori (Kagawa Univ.) |
In this paper, a concept of Place Sameness is proposed. which is the property of feeling that a reproduction of a place ... [more] |
|
BioX |
2022-10-03 17:00 |
Okinawa |
|
Unsolved problems in self-sovereign identity
-- A study on SSI using biometrics (Part 1) -- Kenta Takahashi (Hitachi) BioX2022-60 |
The concept of Self-sovereign identity (SSI), which states that users should be able to manage their own identity inform... [more] |
BioX2022-60 pp.26-31 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:55 |
Online |
Online |
Mutual Secrecy of Attributes and Authorization Policies in Identity Federation Satsuki Nishioka, Yasuo Okabe (Kyoto Univ.) SITE2020-53 IA2020-49 |
In modern Web services, authentication federation that separates the Identity Provider (IdP), which centrally manages au... [more] |
SITE2020-53 IA2020-49 pp.93-100 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
IA, IN (Joint) |
2020-12-15 11:15 |
Online |
Online |
Network Control in a Cloud Platform Using Identities of Workloads and It's Application to Packet Filtering Kentaro Ohnishi, Daisuke Kotani (Kyoto Univ.), Hirofumi Ichihara, Yohei Kanemaru (LINE), Yasuo Okabe (Kyoto Univ.) IA2020-30 |
Conventional network controls use IP addresses and port numbers (Locators) as identifiers of Workloads like processes an... [more] |
IA2020-30 pp.22-29 |