Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 |
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] |
IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 pp.49-53 |
RCC, ISEC, IT, WBS |
2023-03-14 15:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Attribute-based encryption with keyword search Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 |
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] |
IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 pp.163-170 |
ICSS, IPSJ-SPT |
2023-03-13 17:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) ICSS2022-71 |
We have researched Learning with Errors(LWE) problem and Ring-LWE problem. Module-LWE problem is a version of RLWE probl... [more] |
ICSS2022-71 pp.139-144 |
ISEC, SITE, LOIS |
2022-11-18 17:20 |
Online |
Online |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29 |
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] |
ISEC2022-45 SITE2022-49 LOIS2022-29 pp.92-99 |
IT, ISEC, RCC, WBS |
2022-03-10 14:40 |
Online |
Online |
Crypto Analysis for Ring-LWE Problem on Subfield in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji (OU) IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 |
Since the proposal of the quantum computer, steady progress has been made toward its practical use. It has been reported... [more] |
IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 pp.138-144 |
HWS, ICD [detail] |
2021-10-19 13:30 |
Online |
Online |
Design of NTT Hardware Based on K-RED for Lattice-Based Cryptography Yuma Itabashi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-46 ICD2021-20 |
This paper presents an efficient hardware that efficiently performs Number Theoretic Transform(NTT) which is a dominant ... [more] |
HWS2021-46 ICD2021-20 pp.26-31 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 16:55 |
Online |
Online |
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 |
Many biometric template protection systems have been proposed to perform biometric authentication while keeping the biom... [more] |
ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 pp.68-73 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
HWS, ICD |
2018-10-29 13:50 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Hardware Design of High Precision Discrete Gaussian Sampler for Lattice-based Cryptography Keitaro Koga (UTokyo), Awano Hiromitsu (VDEC), Ikeda Makoto (UTokyo) HWS2018-49 ICD2018-41 |
Since quantum computer is developed to be more practical, Post-Quantum Cryptography (PQC) that is not solved with quantu... [more] |
HWS2018-49 ICD2018-41 pp.13-18 |
HWS, ICD |
2018-10-29 15:20 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44 |
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] |
HWS2018-52 ICD2018-44 pp.31-34 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
LOIS, ISEC, SITE |
2017-11-10 16:10 |
Kyoto |
|
Revocable Hierarchical Identity-Based Encryption based on LWE Assumption Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST) ISEC2017-71 SITE2017-53 LOIS2017-48 |
Revocable hierarchical identity-based encryption~(RHIBE) is an advanced form of standard identity-based encryption. RHIB... [more] |
ISEC2017-71 SITE2017-53 LOIS2017-48 pp.129-136 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:00 |
Yamaguchi |
|
Efficient Discrete Gaussian Sampling on Constrained Devices Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 |
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] |
ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 pp.169-175 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |