Session 1.
09:30 - 10:00 Collision Attack on Double-Block-Length Compression Function Using Lightweight Block Cipher PRESENT
・Shoichi Hirose (University of Fukui)
(Keywords: hash function, double-block-length compression function, collision attack, lightweight block cipher)
10:00 - 11:00 Secure and Efficient Use of Confidential Data Based on Secure Function Evaluation - Theory and Practice
・Koji Chida (NTT Secure Platform Laboratories)
(Keywords: Secure Function Evaluation, Secure Multi-Party Computation, Secret Sharing)
11:00 - 11:15 Coffee Break(15min)
Session 2.
11:15 - 11:45 On the Security of Dynamic Group Signatures:Preventing Signature Hijacking
・Goichiro Hanaoka (AIST)
(Keywords: public-key cryptography, group signature)
11:45 - 12:45 Consideration on safety information management towards the secondary use of medical information
・Kazuyuki Nakayasu (MHLW / Hokkaido University)
(Keywords: Authentication, Non-Repudiation, Anonymization, raceability, Privacy)
12:45 - 13:45 Lunch Time(60 min)
Session 3.
13:45 - 14:15 How to Enhance the Security on Elliptic Curve Scalar Multiplication
・Atsuko Miyaji (JAIST)
(Keywords: side chanel attack,scalar multiplication,Montgomery ladder, secure)
14:15 - 15:15 Privacy-preserving data mining using homomorphic encryption and itsdevelopment framework Fairy Ring
・Jun Sakuma (University of Tsukuba)
(Keywords: privacy, homomorphic encryption, data mining, cryptographic protocol)
15:15 - 15:30 Coffee Break(15min)
Session 4.
15:30 - 16:00 Efficient Algorithm for Tate Pairing of Composite Order
・Tsuyoshi Takagi (Kyusyu University)
(Keywords: Composite order pairing, Miller's Algorithm, NAF, w-HBTF)
16:00 - 17:00 Design of the Artificial Based on Everyday Life Informatics
・Yoshifumi Nishida (AIST)
(Keywords: Everyday Life Informatics, Injury Prevention, Product Safety, Social System, Multi multidisciplinary Cooperation)
17:00 - 17:10 Coffee Break (10min)
17:10 - 18:30 Discussion