Keiichi Iwamura

According to our database1, Keiichi Iwamura authored at least 108 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy preserving multi-party multiplication of polynomials based on (k,n) threshold secret sharing.
ICT Express, October, 2023

Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing.
IEEE Access, 2023

TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
A Communication-Efficient Secure Routing Protocol for IoT Networks.
Sensors, 2022

TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server.
IEEE Access, 2022

Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System.
IEEE Access, 2022

Improvement of Privacy Prevented Person Tracking System using Artificial Fiber Pattern.
Proceedings of the 19th International Conference on Signal Processing and Multimedia Applications, 2022

Collusion Resistant Watermarking for Deep Learning Models Protection.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Round Color 2D Symbol with Display Area and Secret Data Area for Business-to-Consumer Applications.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

A Decentralized Machine Learning Scheme with Input Perturbation-Based Differential Privacy.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Performance of Federated Learning with Local Differential Privacy: Federation or Individualƒ.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords.
J. Inf. Secur. Appl., 2021

Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N=k Servers (Revised Version).
IACR Cryptol. ePrint Arch., 2021

Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper).
IACR Cryptol. ePrint Arch., 2021

(Server-Aided) Two-Party Multiplication of Encrypted Shares Using (k, n) Threshold Secret Sharing With N ≥ k Servers.
IEEE Access, 2021

High-speed Retrieval and Authenticity Judgment using Unclonable Printed Code.
Proceedings of the 18th International Conference on Signal Processing and Multimedia Applications, 2021

Secure Computation by Secret Sharing using Input Encrypted with Random Number.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Supply Chain Management System to Prevent Counterfeiting and Trace Different Transactions Instead of using PUF Device.
Proceedings of the 18th International Conference on e-Business, 2021

2020
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Secure Comparison and Interval Test Protocols based on Three-party MPC.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

New Approach to Dishonest-Majority Secure Multiparty Computation for Malicious Adversaries when n < 2k - 1.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Data Augmentation For Deep Learning Using Generative Adversarial Networks.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Secure and Efficient Outsourcing of Matrix Multiplication based on Secret Sharing Scheme using only One Server.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

An AODV-Based Communication-Efficient Secure Routing Protocol for Large Scale Ad-Hoc Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Secure Pairwise Key Sharing using Geometric Group Key Sharing Method.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Video Tampering Detection based on High-Frequency Features using Machine Learning.
Proceedings of the AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, 2020

Detecting Discrete Cosine Transform-Based Digital Watermarking Insertion Area Using Deep Learning.
Proceedings of the AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, 2020

2019
Foreword.
IEICE Trans. Inf. Syst., 2019

Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper).
IACR Cryptol. ePrint Arch., 2019

Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2019

Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Efficient Geometric Group Key-sharing Scheme.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Content Protection Method to Control Editing by Billing.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Geometric Pairwise Key-Sharing Scheme.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

New Approach for Embedding Secret Information into Fiber Materials.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Detection of Human Motion Gestures Using Machine Learning for Actual Emergency Situations.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

2017
Provably Secure Structured Signature Schemes with Tighter Reductions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Information Hiding and Its Criteria for Evaluation.
IEICE Trans. Inf. Syst., 2017

Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper).
IACR Cryptol. ePrint Arch., 2017

Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Deployment of Contents Protection Scheme using Digital Signature.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

Geometric group key-sharing scheme using euclidean distance.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Searchable encryption of image based on secret sharing scheme.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Security Evaluation on Secret Computation without Changing the Polynomial Degree.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

Image watermarking using the differences between two wavelet filters.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Privacy-protected video surveillance in crowded environments using robust watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Best embedding direction for spread spectrum-based video watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Proactive secret sharing scheme suitable for asymmetric secret sharing scheme.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Geometric group key-sharing scheme.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition.
Entropy, 2015

Mosaic-based Privacy-protection with Reversible Watermarking.
Proceedings of the SIGMAP 2015, 2015

Audio Watermarking Using Different Wavelet Filters.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Content Control Scheme to Realize Right Succession and Edit Control.
Proceedings of the ICE-B 2015, 2015

Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Anti-counterfeiting Using Irregularities of Magnetic Flux Density.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Evaluation of a Zero-Watermarking-Type Steganography.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Surveillance Camera System to Achieve Privacy Protection and Crime Prevention.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Image Protection System with Steganography and Authentication.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A New Approach to Reversible Watermarking.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Zero-Watermarking-Like Steganography and Potential Applications.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
Content Approval Systems with Expansions of a New Pair-Connected-Structured Aggregate Signature Scheme.
Int. J. E Entrepreneurship Innov., 2013

Secret sharing scheme for cloud computing using IDs.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

A storage-saving secret sharing scheme suitable for sensor networks.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

Secret Sharing Scheme Suitable for Cloud Computing.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Identifier Migration for Identity Continuance in Single Sign-On.
J. Information Security, 2012

A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

An improvement of insertion/deletion/substitution error correction capabilities of LDPC codes using slide decoding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Proposal of a watermarking scheme using winding number and unneeded synchronism.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Identity Continuance in Single Sign-On with Authentication Server Failure.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Identifier Migration in OpenID.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Information Hiding Based on a Single Dot Pattern Method with Improved Extraction and Robustness against Foreground Objects.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Information Hiding Based on the Artificial Fiber Pattern with Improved Robustness against Foregound Objects.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block Cipher.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Key Management Scheme Applicable to Various Topologies of Sensor Networks.
Proceedings of the Sixth International Conference on Availability, 2011

Fast Implementation of the Advanced Encryption Standard Using Atmega1281.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Scalable authentication for various representations of JPEG 2000 images.
Proceedings of the International Conference on Image Processing, 2010

A New Fragile Watermarking Scheme and Its Security Evaluation.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern.
Proceedings of the ARES 2010, 2010

A Consideration of the Reliability of Registration and Attribute Exchange.
Proceedings of the ARES 2010, 2010

2008
A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile Sizes.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed Documents.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Development of Benchmark Tool for Digital Watermarking.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

1995
A Design of Reed-Solomon Decoder with Systolic Array Structure.
IEEE Trans. Computers, 1995

1992
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

High-Speed Implementation Methods for RSA Scheme.
Proceedings of the Advances in Cryptology, 1992


  Loading...