IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
DE 2019-06-22
10:50
Tokyo   Efficient Similar Document Search over Encrypted Data On the Cloud
Daisuke Aritomo (Univ. of Tsukuba), Chiemi Watanabe (NTUT) DE2019-7
More and more data owners are building information retrieval systems on cloud computing platforms, which provides scalab... [more] DE2019-7
pp.29-34
WBS, IT, ISEC 2018-03-09
09:25
Tokyo Katsusika Campas, Tokyo University of Science On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] IT2017-140 ISEC2017-128 WBS2017-121
pp.219-223
ISEC 2017-05-12
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Key-Updatable Searchable Encryption -- Applying Proxy Re-Encryption with Keyword Search --
Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more]
ISEC2017-1
pp.1-6
ISEC, WBS, IT 2017-03-10
14:10
Tokyo TOKAI University A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104
(To be available after the conference date) [more] IT2016-128 ISEC2016-118 WBS2016-104
pp.187-193
ISEC, WBS, IT 2017-03-10
14:35
Tokyo TOKAI University Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] IT2016-129 ISEC2016-119 WBS2016-105
pp.195-202
ICSS, IPSJ-SPT 2016-03-04
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Privacy-enhanced Similarity Search Scheme for Cloud Image Databases
Hao Liu, Hideaki Goto (Tohoku Univ.) ICSS2015-68
With the increasing use of Cloud Service in recent years, its security vulnerabilities becomes a bigger concern, for one... [more] ICSS2015-68
pp.129-133
IN 2015-10-15
15:55
Osaka Osaka University [Invited Talk] Data Secrecy in the Cloud Era
Yasunori Ishihara (Osaka Univ.) IN2015-56
In the Cloud Era, third parties are required to process data without knowing the content of the data. In this talk, we f... [more] IN2015-56
pp.19-24
IA, IPSJ-IOT, SITE [detail] 2015-03-06
14:20
Fukushima   Fast Searchable Encryption Scheme Using Single Bloom Filter and Its Evalustion
Shunsuke Kimura, Hiroyuki Inaba (KIT) SITE2014-79 IA2014-111
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more]
SITE2014-79 IA2014-111
pp.227-232
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] ICSS2014-92
pp.175-179
ISEC 2014-09-05
15:10
Tokyo Kikai-Shinko-Kaikan Bldg. Computer Simulation of Garbled Searchable Symmetric Encryption Scheme
Keisuke Sasaki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2014-51
In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which ... [more] ISEC2014-51
pp.27-34
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:50
Hokkaido San-Refure Hakodate Proposal on Fast Searchable Encryption Scheme Using Bloom Filter
Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more]
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40
pp.281-286
IT, ISEC, WBS 2013-03-08
14:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Security Definitions for Public Key Encryption with Keyword Search Revisited
Hirokazu Tagai, Junji Shikata (Yokohama National Univ.) IT2012-104 ISEC2012-122 WBS2012-90
Public Key Encryption with Keyword Search (PEKS) is a cryptographic primitive imparting the keyword search function with... [more] IT2012-104 ISEC2012-122 WBS2012-90
pp.263-270
IT, ISEC, WBS 2013-03-08
15:35
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Toward Practical Application of Searchable Encryption
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric) IT2012-106 ISEC2012-124 WBS2012-92
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] IT2012-106 ISEC2012-124 WBS2012-92
pp.279-283
IT, ISEC, WBS 2012-03-02
09:00
Kanagawa   Searchable Symmetric Encryption with small information leakage in index update
Toshinori Araki (NEC) IT2011-67 ISEC2011-94 WBS2011-68
Searchable symmetric encryption(SSE) has been used for privacy preserving keyword search. Although the importance for pr... [more] IT2011-67 ISEC2011-94 WBS2011-68
pp.129-134
ISEC, IT, WBS 2011-03-03
10:00
Osaka Osaka University Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] IT2010-68 ISEC2010-72 WBS2010-47
pp.1-6
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan