IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (2017)

Chair: Shiho Moriai (NICT)
Vice Chair: Shoichi Hirose (Univ. of Fukui), Tetsuya Izu (Fujitsu Labs.)
Secretary: Keita Emura (NICT), Kazunari Omote (Tsukuba Univ.)
Assistant: Dai Yamamoto (Fujitsu Labs.), Yuuji Suga (IIJ)

Search Results: Keywords 'from:2017-05-12 to:2017-05-12'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 12件中 1~12件目  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2017-05-12
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Key-Updatable Searchable Encryption -- Applying Proxy Re-Encryption with Keyword Search --
Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more]
ISEC2017-1
pp.1-6
ISEC 2017-05-12
10:25
Tokyo Kikai-Shinko-Kaikan Bldg. Fully Secure Oblivious Keyword Search
Kaoru Kurosawa, Yuuki Nemoto (Ibaraki Univ.) ISEC2017-2
Oblivious keyword search (OKS) is a secure two party protocol such that the server has ( Data={(x_i,m_i)} ), and the cli... [more] ISEC2017-2
pp.7-14
ISEC 2017-05-12
10:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Note on the Numbers of Cards Required to Make Copied Commitments
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] ISEC2017-3
pp.15-22
ISEC 2017-05-12
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Size-Hiding Computation for Multiple Parties -- from ASIACRYPT 2016 --
Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Koji Nuida (AIST/PRESTO), Takashi Nishide (Univ. of Tsukuba), Goichiro Hanaoka (AIST), Eiji Okamoto (Univ. of Tsukuba) ISEC2017-4
 [more] ISEC2017-4
p.23
ISEC 2017-05-12
12:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] How to circumvent the two-ciphertext lower bound for linear gabling schemes -- from ASIACRYPT 2016 --
Ryo Kikuchi (NTT) ISEC2017-5
At EUROCRYPT 2015, Zahur et al. argued that all linear, and thus, efficient, garbling schemes need at least two $k$-bit ... [more] ISEC2017-5
p.25
ISEC 2017-05-12
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. Experiences of Data Preprocessing Approach for Network Security Event Analytics
Masayoshi Mizutani (IBM, Japan) ISEC2017-6
 [more] ISEC2017-6
pp.27-33
ISEC 2017-05-12
14:25
Tokyo Kikai-Shinko-Kaikan Bldg. Edge-side Threat Detection and Reaction Framework for Multiple IoT Use Models
Takuya Mishina, Naoto Sato, Fumiko Satoh (IBM) ISEC2017-7
 [more] ISEC2017-7
pp.35-42
ISEC 2017-05-12
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. SandVeil: A Tool for Improving Sandbox Resilience to Evasion
Rui Tanabe, Atsushi Yahata, Kou Ishii, Akira Yokoyama, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2017-8
Malware sandbox is an essential tool for malware analysis and detection. However, many sandbox detection methods have be... [more] ISEC2017-8
pp.43-49
ISEC 2017-05-12
15:15
Tokyo Kikai-Shinko-Kaikan Bldg. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability
Keita Emura (NICT) ISEC2017-9
 [more] ISEC2017-9
pp.51-57
ISEC 2017-05-12
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions -- from ASIACRYPT 2016 --
Keita Xagawa (NTT) ISEC2017-10
 [more] ISEC2017-10
p.59
ISEC 2017-05-12
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Shuichi Katsumata (Univ. of Tokyo), Shota Yamada (AIST) ISEC2017-11
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing prope... [more] ISEC2017-11
p.61
ISEC 2017-05-12
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
Yuyu Wang (Tokyo Tech/AIST), Zongyang Zhang (Beihang University), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2017-12
In this paper, we bridge the gap between structure-preserving signatures (SPSs) and fully structure-preserving signature... [more] ISEC2017-12
p.63
 12件中 1~12件目  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan