IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 108件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS, SR, SRW
(Joint)
2020-03-05
15:50
Tokyo Tokyo Institute of Technology Cherishing Old Knowledge concerning Turing Machine and Information Theory for Acquiring New Knowledge concerning Mind-Reading Machine -- Anti-Personnel Radar Applied to Brain-Machine Interface --
Makoto Koike (MK Microwave) RCS2019-372
Let Turing Machine be a model of a human brain, its Universal Turing machine serves as a model of mind-reading machine. ... [more] RCS2019-372
pp.269-274
ICSS, IPSJ-SPT 2020-03-02
10:40
Okinawa Okinawa-Ken-Seinen-Kaikan Information Rates for Multiple Assignment Schemes on Five Participants
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.) ICSS2019-70
In 1988, Ito et al. proposed a multiple assignment secret sharing scheme. Their scheme can realize an arbitrary access s... [more] ICSS2019-70
pp.13-18
CPSY, DC, IPSJ-ARC [detail] 2019-07-26
18:00
Hokkaido Kitami Civic Hall A Theoretical Study of a Composite Fail-safe Design with Secret Sharing Schemes for Railway Signalling Systems
Takashi Toyama (RTRI) CPSY2019-39 DC2019-39
As well-known, fail-safe computers are used in railway signalling systems. The fail-safe computers have functions to un... [more] CPSY2019-39 DC2019-39
pp.235-240
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
pp.187-192
WBS, MICT 2019-07-16
12:30
Ibaraki Ibaraki University(Mito Campus) [Poster Presentation] A Study of Data Transmission Scheme in Interference Area of VN-CSK Illumination Light Communication
Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2019-13 MICT2019-14
The Variable N-parallel code-shift-keying (VN-CSK) system has been proposed for solving the dimming control problem and ... [more] WBS2019-13 MICT2019-14
pp.17-22
EMM, IT 2019-05-24
10:35
Hokkaido Asahikawa International Conference Hall Searchable Image Encryption using Secret Sharing Scheme
Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] IT2019-9 EMM2019-9
pp.43-48
EA, SIP, SP 2019-03-14
13:30
Nagasaki i+Land nagasaki (Nagasaki-shi) [Poster Presentation] Steganographic Audio Secret Sharing
Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] EA2018-108 SIP2018-114 SP2018-70
pp.55-60
EMM 2019-03-14
11:05
Okinawa TBD Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels
Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] EMM2018-114
pp.123-128
IT, ISEC, WBS 2019-03-08
11:40
Tokyo University of Electro-Communications On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] IT2018-120 ISEC2018-126 WBS2018-121
pp.275-280
IT, ISEC, WBS 2019-03-08
13:30
Tokyo University of Electro-Communications Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more]
IT2018-122 ISEC2018-128 WBS2018-123
pp.285-290
RCS, SIP, IT 2019-01-31
15:15
Osaka Osaka University [Invited Talk] Security Enhancement Approaches to Wireless Communications by Secret Sharing and Signal Processing in Physical Layer
Shoichiro Yamasaki, Tomoko K. Matsushima (PTU) IT2018-50 SIP2018-80 RCS2018-257
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares,
an... [more]
IT2018-50 SIP2018-80 RCS2018-257
pp.85-90
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
09:50
Hiroshima Satellite Campus Hiroshima Secure PUF Authentication Method against Machine Learning Attack
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] VLD2018-49 DC2018-35
pp.77-82
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
QIT
(2nd)
2018-06-04
13:20
Hiroshima ICCH Ran [Poster Presentation] Proposal of simple authentication and secret-key-sharing system using a threshold-type single photon detector
Shin Arahira, Hitoshi Murai (OKI)
We report a quantum-mechanics-based authentication and secret-key-sharing system using intensity modulated light pulses ... [more]
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more]
IT2017-108 ISEC2017-96 WBS2017-89
pp.31-36
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
pp.81-88
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
IT 2017-09-08
11:15
Yamaguchi Centcore Yamaguchi Hotel A Strongly Secure Secret Sharing Scheme with Ramp Threshold Forms a Maximum Distance Separable Code
Mikihiko Nishiara (Shinshu Univ.) IT2017-43
It is known that ideal secret sharing schemes can be constructed from MDS (maximum distance separable) codes on a finite... [more] IT2017-43
pp.27-30
ISEC 2017-09-04
14:30
Tokyo Kikai-Shinko-Kaikan Bldg. Stabilizer Based Quantum Secret Sharing Constructed from Algebraic Curves
Cheng Wang (Saitama Univ.), Takeshi Koshiba (Waseda Univ.) ISEC2017-44
In this paper we proposed a quantum secret sharing scheme constructed from algebraic curves and the stabilizer quantum e... [more] ISEC2017-44
pp.23-28
 108件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : 以上の論文すべての著作権はIEICEに帰属します.(許諾番号:10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan