Information and Systems-Life Intelligence and Office Information Systems(Date:2022/11/18)

Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y00 quantum stream cipher

Shigeo Tsuii(Chuo Univ.),  Osamu Hirota(Chuo Univ.),  

[Paper #]ISEC2022-31,SITE2022-35,LOIS2022-15
Analysis of International Activity Toward Practical Applications of Y-00 Quantum Cryptography

Shigeo Tsujii(Chuo Univ.),  Kentaro Kato(Tamagawa Univ.),  Osamu Hirota(Chuo Univ.),  

[Paper #]ISEC2022-30,SITE2022-34,LOIS2022-14
On the CEN Workshop Agreement (CWA) concerning the trust and trustworthiness of Journalism

Takushi Otani(Kibi International Univ.),  

[Paper #]
Efficient workers' behavior segmentation with GP-HSMM

Toshiyuki Hatta(Mitsubishi Electric Corp.),  Tsubasa Tomoda(Mitsubishi Electric Corp.),  Tetsuya Tamaki(Mitsubishi Electric Corp.),  Shotaro Miwa(Mitsubishi Electric Corp.),  

[Paper #]ISEC2022-43,SITE2022-47,LOIS2022-27
Investigating the Use of Latent Representations in Federated Learning Using Normalizing Flow and Optimal Transport Algorithms

Motonobu Uchikoshi(JRI),  Takeshi Mori(JRI),  

[Paper #]ISEC2022-35,SITE2022-39,LOIS2022-19
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing

Atsuki Iriboshi(Hiroshima Univ.),  Toru Nakanishi(Hiroshima Univ.),  Katsunobu Imai(Hiroshima Univ.),  

[Paper #]ISEC2022-44,SITE2022-48,LOIS2022-28
On the difficulty of the 2nd MeDLP

Masaaki Shirase(FUN),  

[Paper #]ISEC2022-37,SITE2022-41,LOIS2022-21
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures

Kai Kimura(Hiroshima Univ.),  Toru Nakanishi(Hiroshima Univ.),  Teruaki Kitasuka(Hiroshima Univ.),  

[Paper #]ISEC2022-41,SITE2022-45,LOIS2022-25
Aggregate Entity Authentication with Group Testing

Shoichi Hirose(Univ. Fukui/Japan Datacom),  Junji Shikata(Yokohama National Univ./Japan Datacom),  

[Paper #]ISEC2022-46,SITE2022-50,LOIS2022-30
Token-Controlled Token Circulation

Ko Fujimura(Otsuma Univ.),  

[Paper #]ISEC2022-42,SITE2022-46,LOIS2022-26
Secure Computation of Symmetric Functions Using Four Types of Cards

Hayato Shikata(Tohoku Univ.),  Takaaki Mizuki(Tohoku Univ.),  

[Paper #]ISEC2022-40,SITE2022-44,LOIS2022-24
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function

Masaya Okazaki(Nagoya Univ.),  Tetsu Iwata(Nagoya Univ.),  

[Paper #]ISEC2022-36,SITE2022-40,LOIS2022-20
Development of QR Code with superimposed Kanji font

Naoya Tahara(Ehime Univ.),  Hiroshi Kai(Ehime Univ.),  Masakatu Morii(Kobe Univ.),  

[Paper #]ISEC2022-38,SITE2022-42,LOIS2022-22
[Invited Talk] Artificiality, Complexity and Feasibility of The Right to Be Forgotten

Akiyoshi Kabeya(Toyo Eiwa Univ.),  

[Paper #]ISEC2022-33,SITE2022-37,LOIS2022-17
[Invited Talk] Quantum Computation and Cryptography

Takashi Yamakawa(NTT),  

[Paper #]ISEC2022-34,SITE2022-38,LOIS2022-18
A Study on Document Classification of National Nursing Examination Using BERT

Takao Nishi(Nagasaki Univ.),  Yu Ichifuji(Nagasaki Univ.),  

[Paper #]ISEC2022-39,SITE2022-43,LOIS2022-23
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme

Yuichi Hasegawa(Yokohama National Univ.),  Shingo Sato(Yokohama National Univ.),  Junji Shikata(Yokohama National Univ.),  

[Paper #]ISEC2022-45,SITE2022-49,LOIS2022-29
[Invited Talk] About "Ctrl + Z: Right to be forgotten" (2)

Naonori Kato(KDDI RI/NFI),  

[Paper #]
[Invited Talk] About "Ctrl + Z: Right to be forgotten"(1)

Hideyuki Fujii(NRI Secure),  

[Paper #]
[Invited Talk] Two-Layered QR Codes and Their Principles

Masakatsu Morii(Kobe University),  

[Paper #]
12>> 1-20hit(21hit)