IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 45  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, ICTSSL, NWS 2020-10-22
15:25
Online Online [Invited Talk] Secure Data Utilization using Multi-Party Computation
Takao Takenouchi (Digital Garage) IN2020-32
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] IN2020-32
pp.12-17
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
ISEC, IT, WBS 2020-03-11
12:10
Hyogo University of Hyogo A Construction Method of Garbled Circuits for ZDD
Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2019-114 ISEC2019-110 WBS2019-63
Kruger et al proposed a new method to construct Garbled Circuits for BDD, which gives a compression expression of logic... [more] IT2019-114 ISEC2019-110 WBS2019-63
pp.167-170
SP, EA, SIP 2020-03-02
15:10
Okinawa Okinawa Industry Support Center A Pattern Recognition Method Using Secure Sparse Representations in L0 Norm Minimization
Takayuki Nakachi, Yitu Wang (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EA2019-130 SIP2019-132 SP2019-79
In this paper, we propose a privacy-preserving pattern recognition method using encrypted sparse representations in L0 n... [more] EA2019-130 SIP2019-132 SP2019-79
pp.169-174
ITE-BCT, SIS 2019-10-25
11:10
Fukui Fukui International Activities Plaza Image Compression in Encryption-then-Compression System Using Secure Sparse Representations
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] SIS2019-21
pp.77-82
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] 2019-09-19
15:10
Niigata Tokimeito, Niigata University Secure sparse representations in L0 norm minimization
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2019-11 IE2019-24 EMM2019-68
In this paper, we propose a method to estimate secure sparse representations in L0 norm minimization, and evaluate the e... [more] LOIS2019-11 IE2019-24 EMM2019-68
pp.25-30
CPSY, DC, IPSJ-ARC [detail] 2019-07-26
17:00
Hokkaido Kitami Civic Hall Secure Distributed Computing using Blockchain
Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] CPSY2019-37 DC2019-37
pp.223-227
ISEC 2019-05-17
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018)
Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] ISEC2019-11
p.49
EMM 2019-03-14
11:30
Okinawa TBD Image Patch Modeling using Secure Computation of Sparse Dictionary Learning
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-115
With the advent of the big data era, digital content continues to increase.
Sparse coding is attracting attention as an... [more]
EMM2018-115
pp.129-134
SIS 2019-03-06
15:10
Tokyo Tokyo Univ. Science, Katsushika Campus Secure Computation of Sparse Dictionary Learning
Takayuki Nakachi, Yukihiro Bandoh (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-43
With the advent of the big data era, all digital contents continue to increase. Sparse modeling is drawing attention as ... [more] SIS2018-43
pp.35-40
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2019-02-20
14:45
Hokkaido Hokkaido Univ. Encrypted Image Classification by Using Secure OMP Computation
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) ITS2018-84 IE2018-105
Currently, huge amounts of image/video are being recorded and uploaded every day by surveillance systems or SNS services... [more] ITS2018-84 IE2018-105
pp.227-232
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] 2018-09-27
13:50
Oita Beppu Int'l Convention Ctr. aka B-CON Plaza Image Patch Modeling in Encrypted Domain using Sparse Coding
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2018-12 IE2018-32 EMM2018-51
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] LOIS2018-12 IE2018-32 EMM2018-51
pp.13-18
ISEC 2018-09-07
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
Ryo Kikuchi (NTT) ISEC2018-54
In this invited talk, we introduce the paper ``Fast Large-Scale Honest-Majority MPC for Malicious Adversaries'' by Koji ... [more] ISEC2018-54
p.25
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:15
Hokkaido Sapporo Convention Center Secure Multiparty Computation of Ranking Using a Deck of Cards
Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
(To be available after the conference date) [more] ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
pp.163-169
SIS, IPSJ-AVM, ITE-3DIT [detail] 2018-06-07
10:20
Hokkaido Jozankei View Hotel Secure Computation of Sparse Coding for Privacy Protection
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-2
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] SIS2018-2
pp.7-12
ISEC 2018-05-16
11:30
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] The Minimum Number of Cards in Practical Card-Based Protocols (from ASIACRYPT 2017)
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-4
In this invited talk, we introduce the paper ``The Minimum Number of Cards in Practical Card-Based Protocols'' by J. Kas... [more] ISEC2018-4
p.25
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] IT2017-124 ISEC2017-112 WBS2017-105
pp.121-128
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more]
IT2017-125 ISEC2017-113 WBS2017-106
pp.129-135
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
ISEC 2017-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] ISEC2017-42
pp.7-14
 Results 1 - 20 of 45  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan