Information and Systems-Image Engineering(Date:2017/05/12)

Presentation
Fully Secure Oblivious Keyword Search

Kaoru Kurosawa(Ibaraki Univ.),  Yuuki Nemoto(Ibaraki Univ.),  

[Date]2017-05-12
[Paper #]ISEC2017-2
[Invited Talk] Size-Hiding Computation for Multiple Parties

Kazumasa Shinagawa(Tokyo Inst. of Tech./AIST),  Koji Nuida(AIST/PRESTO),  Takashi Nishide(Univ. of Tsukuba),  Goichiro Hanaoka(AIST),  Eiji Okamoto(Univ. of Tsukuba),  

[Date]2017-05-12
[Paper #]ISEC2017-4
A Proposal on Key-Updatable Searchable Encryption

Natsume Matsuzaki(Univ. of Nagasaki),  Hiroaki Anada(Univ. of Nagasaki),  Yohei Watanabe(Univ. of Nagasaki),  

[Date]2017-05-12
[Paper #]ISEC2017-1
[Invited Talk] Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps

Shuichi Katsumata(Univ. of Tokyo),  Shota Yamada(AIST),  

[Date]2017-05-12
[Paper #]ISEC2017-11
SandVeil: A Tool for Improving Sandbox Resilience to Evasion

Rui Tanabe(YNU),  Atsushi Yahata(YNU),  Kou Ishii(YNU),  Akira Yokoyama(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2017-05-12
[Paper #]ISEC2017-8
[Invited Talk] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

Keita Xagawa(NTT),  

[Date]2017-05-12
[Paper #]ISEC2017-10
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability

Keita Emura(NICT),  

[Date]2017-05-12
[Paper #]ISEC2017-9
A Note on the Numbers of Cards Required to Make Copied Commitments

Daiki Miyahara(Tohoku Univ.),  Yu-ichi Hayashi(NAIST),  Takaaki Mizuki(Tohoku Univ.),  Hideaki Sone(Tohoku Univ.),  

[Date]2017-05-12
[Paper #]ISEC2017-3
Experiences of Data Preprocessing Approach for Network Security Event Analytics

Masayoshi Mizutani(IBM, Japan),  

[Date]2017-05-12
[Paper #]ISEC2017-6
Edge-side Threat Detection and Reaction Framework for Multiple IoT Use Models

Takuya Mishina(IBM),  Naoto Sato(IBM),  Fumiko Satoh(IBM),  

[Date]2017-05-12
[Paper #]ISEC2017-7
[Invited Talk] How to circumvent the two-ciphertext lower bound for linear gabling schemes

Ryo Kikuchi(NTT),  

[Date]2017-05-12
[Paper #]ISEC2017-5
[Invited Talk] How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones

Yuyu Wang(Tokyo Tech/AIST),  Zongyang Zhang(Beihang University),  Takahiro Matsuda(AIST),  Goichiro Hanaoka(AIST),  Keisuke Tanaka(Tokyo Tech),  

[Date]2017-05-12
[Paper #]ISEC2017-12