Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 15:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Threshold ring signature based on isogeny Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 |
RippleSign is the first $T$-out-of-$N$ threshold ring signature scheme based on isogeny,which has an issue that the sign... [more] |
ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 pp.72-79 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
RCC, ISEC, IT, WBS |
2023-03-14 14:55 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Forward-Secure for Claimable/Repudiable Ring Signature Scheme Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ) IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 |
web3.0 is a network of independent users directly connected to each other in a decentralized manner using the characteri... [more] |
IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 pp.155-162 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] |
IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 pp.171-178 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures Ryunosuke Higashi, Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (OU) ICSS2022-72 |
The ring signature proposed by Rivest et al. does not assume the existence of an administrator, so the signer cannot be ... [more] |
ICSS2022-72 pp.145-150 |
ICSS |
2021-11-29 14:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Ring Signature scheme based on prime-order bilinear group Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49 |
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] |
ICSS2021-49 pp.19-24 |
SITE, ISEC, LOIS |
2021-11-12 13:00 |
Online |
Online |
A Revocable Anonymous Reputation System for Crowd Sensing Haruki Kobayashi, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2021-41 SITE2021-35 LOIS2021-24 |
In crowdsensing, since the data gathered by the server includes user's GPS locations and moving paths, the anonymity of ... [more] |
ISEC2021-41 SITE2021-35 LOIS2021-24 pp.1-6 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
HWS |
2021-04-12 11:15 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
An Implementation of a Pairing on Cocks-Pinch Curve with Embedding Degree 6 Zihao Song, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2021-4 |
In recent years, with the proliferation of IoT devices and computer performance improvement, there are increasing expect... [more] |
HWS2021-4 pp.19-24 |
LOIS, ISEC, SITE |
2020-11-06 11:20 |
Online |
Online |
Speeding Up a Revocable Group Signature Scheme for Crowdsensing Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) ISEC2020-34 SITE2020-31 LOIS2020-14 |
In crowdsensing, many users carrying mobile terminals send environmental data and congestion status to the server togeth... [more] |
ISEC2020-34 SITE2020-31 LOIS2020-14 pp.13-18 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:10 |
Online |
Online |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 |
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] |
ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 pp.53-60 |
ISEC |
2020-05-20 09:45 |
Online |
Online |
Isogeny based ring signature from CSIDH Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1 |
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] |
ISEC2020-1 pp.1-6 |
ISEC |
2020-05-20 15:30 |
Online |
Online |
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11 |
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] |
ISEC2020-11 pp.47-54 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) ISEC2019-22 SITE2019-16 BioX2019-14 HWS2019-17 ICSS2019-20 EMM2019-25 |
In crowdsensing, many users carrying mobile terminals send environmental data and congestion status to the server togeth... [more] |
ISEC2019-22 SITE2019-16 BioX2019-14 HWS2019-17 ICSS2019-20 EMM2019-25 pp.107-112 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:50 |
Kochi |
Kochi University of Technology |
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 |
Expectations for "Advanced Cryptography" are increasing in order to enhance the security of cyber physical systems and c... [more] |
ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 pp.157-162 |
IT, ISEC, WBS |
2019-03-07 14:30 |
Tokyo |
University of Electro-Communications |
A study on dimming control scheme for visible-light communication using modified prime sequence codes Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2018-97 ISEC2018-103 WBS2018-98 |
Synchronous optical code-division multiplexing (CDM) incorporated with an adequate interference canceller is suitable to... [more] |
IT2018-97 ISEC2018-103 WBS2018-98 pp.131-136 |
ICSS, IPSJ-SPT |
2018-03-08 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77 |
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] |
ICSS2017-77 pp.157-160 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
On the Ring Signature Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85 |
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] |
ICSS2017-85 pp.215-220 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 14:15 |
Tokyo |
|
Zynq-based Coprocessor Development Environment for Cryptography with Advanced Functionality and Its Evaluation Takanori Miyoshi, Tsutomu Matsumoto (YNU) ISEC2017-37 SITE2017-29 ICSS2017-36 EMM2017-40 |
Bilinear pairing has a potential to produce a lot of new cryptographic protocols enabling advanced functionalities such ... [more] |
ISEC2017-37 SITE2017-29 ICSS2017-36 EMM2017-40 pp.275-280 |