default search action
Keiichi Iwamura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j15]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing. IEEE Access 11: 51166-51184 (2023) - [j14]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Privacy preserving multi-party multiplication of polynomials based on (k,n) threshold secret sharing. ICT Express 9(5): 875-881 (2023) - [c90]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing. ICISSP 2023: 442-449 - 2022
- [j13]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System. IEEE Access 10: 76794-76804 (2022) - [j12]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server. IEEE Access 10: 120503-120513 (2022) - [j11]Yuma Shibasaki, Keiichi Iwamura, Koya Sato:
A Communication-Efficient Secure Routing Protocol for IoT Networks. Sensors 22(19): 7503 (2022) - [c89]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal, Masaki Inamura:
TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server. AsiaCCS 2022: 1243-1245 - [c88]Yuta Kakizaki, Koya Sato, Keiichi Iwamura:
Performance of Federated Learning with Local Differential Privacy: Federation or Individualƒ. CCNC 2022: 737-738 - [c87]Masakazu Okamoto, Koya Sato, Keiichi Iwamura:
A Decentralized Machine Learning Scheme with Input Perturbation-Based Differential Privacy. CCNC 2022: 739-740 - [c86]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Round Color 2D Symbol with Display Area and Secret Data Area for Business-to-Consumer Applications. GCCE 2022: 793-797 - [c85]Yunosuke Noso, Keiichi Iwamura, Masaki Inamura:
Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers. CANDARW 2022: 344-350 - [c84]Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura:
Collusion Resistant Watermarking for Deep Learning Models Protection. ICACT 2022: 40-43 - [c83]Yoshi Michael Cho, Hiroyuki Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura:
Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning. ICACT 2022: 307-312 - [c82]Hiroki Urakawa, Kitahiro Kaneda, Keiichi Iwamura:
Improvement of Privacy Prevented Person Tracking System using Artificial Fiber Pattern. SIGMAP 2022: 78-85 - 2021
- [j10]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
(Server-Aided) Two-Party Multiplication of Encrypted Shares Using (k, n) Threshold Secret Sharing With N ≥ k Servers. IEEE Access 9: 113117-113129 (2021) - [j9]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords. J. Inf. Secur. Appl. 59: 102824 (2021) - [c81]Yusuke Abe, Kosei Arisaka, Kitahiro Kaneda, Keiichi Iwamura:
A Supply Chain Management System to Prevent Counterfeiting and Trace Different Transactions Instead of using PUF Device. ICE-B 2021: 101-108 - [c80]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers. ICISSP 2021: 77-88 - [c79]Nozomi Nagashima, Masaki Inamura, Keiichi Iwamura:
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures. ICISSP 2021: 485-491 - [c78]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Computation by Secret Sharing using Input Encrypted with Random Number. SECRYPT 2021: 540-547 - [c77]Kazuaki Sugai, Kitahiro Kaneda, Keiichi Iwamura:
High-speed Retrieval and Authenticity Judgment using Unclonable Printed Code. SIGMAP 2021: 57-64 - [i5]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N=k Servers (Revised Version). IACR Cryptol. ePrint Arch. 2021: 113 (2021) - [i4]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper). IACR Cryptol. ePrint Arch. 2021: 548 (2021) - 2020
- [j8]Keiichi Iwamura:
Foreword. IEICE Trans. Inf. Syst. 103-D(1): 1 (2020) - [c76]Hiroki Ueda, Hyunho Kang, Keiichi Iwamura:
Video Tampering Detection based on High-Frequency Features using Machine Learning. AICCC 2020: 19-24 - [c75]Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura, Naoto Kawamura:
Detecting Discrete Cosine Transform-Based Digital Watermarking Insertion Area Using Deep Learning. AICCC 2020: 25-30 - [c74]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells. APSIPA 2020: 1392-1399 - [c73]Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method. CCNC 2020: 1-2 - [c72]Yuma Shibasaki, Koya Sato, Keiichi Iwamura:
An AODV-Based Communication-Efficient Secure Routing Protocol for Large Scale Ad-Hoc Networks. CCNC 2020: 1-6 - [c71]Masashi Yamane, Keiichi Iwamura:
Secure and Efficient Outsourcing of Matrix Multiplication based on Secret Sharing Scheme using only One Server. CCNC 2020: 1-6 - [c70]Daiki Yorioka, Hyunho Kang, Keiichi Iwamura:
Data Augmentation For Deep Learning Using Generative Adversarial Networks. GCCE 2020: 516-518 - [c69]Shogo Ochiai, Keiichi Iwamura:
New Approach to Dishonest-Majority Secure Multiparty Computation for Malicious Adversaries when n < 2k - 1. CANDAR (Workshops) 2020: 355-361 - [c68]Tomohiro Kobayashi, Keiichi Iwamura, Masaki Inamura:
A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature. ICETE (3) 2020: 98-109 - [c67]Wataru Fujii, Keiichi Iwamura, Masaki Inamura:
Secure Comparison and Interval Test Protocols based on Three-party MPC. ICISSP 2020: 698-704 - [c66]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells. IMIS 2020: 624-638
2010 – 2019
- 2019
- [j7]Keiichi Iwamura:
Foreword. IEICE Trans. Inf. Syst. 102-D(1): 1 (2019) - [c65]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching. DASC/PiCom/DataCom/CyberSciTech 2019: 149-156 - [c64]Takato Imai, Keiichi Iwamura:
Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme. ICETE (1) 2019: 178-185 - [c63]Tomohiro Kobayashi, Keiichi Iwamura, Masaki Inamura:
Content Protection Method to Control Editing by Billing. ICETE (1) 2019: 202-214 - [c62]Koki Nishigami, Keiichi Iwamura:
Efficient Geometric Group Key-sharing Scheme. ICETE (1) 2019: 215-220 - [c61]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding. IMIS 2019: 466-476 - [i3]Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper). IACR Cryptol. ePrint Arch. 2019: 1258 (2019) - [i2]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2019: 1280 (2019) - 2018
- [c60]Ryohei Niiuchi, Hyunho Kang, Keiichi Iwamura:
Detection of Human Motion Gestures Using Machine Learning for Actual Emergency Situations. GCCE 2018: 492-496 - [c59]Naoya Noguchi, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
New Approach for Embedding Secret Information into Fiber Materials. GCCE 2018: 658-660 - [c58]Koki Nishigami, Keiichi Iwamura:
Geometric Pairwise Key-Sharing Scheme. SecITC 2018: 518-528 - 2017
- [j6]Keiichi Iwamura, Masaki Kawamura, Minoru Kuribayashi, Motoi Iwata, Hyunho Kang, Seiichi Gohshi, Akira Nishimura:
Information Hiding and Its Criteria for Evaluation. IEICE Trans. Inf. Syst. 100-D(1): 2-12 (2017) - [j5]Naoto Yanai, Tomoya Iwasaki, Masaki Inamura, Keiichi Iwamura:
Provably Secure Structured Signature Schemes with Tighter Reductions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1870-1881 (2017) - [c57]Naoto Kaneko, Keiichi Iwamura:
Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme. AINA Workshops 2017: 13-18 - [c56]Ken Aoi, Takeshi Shingu, Keiichi Iwamura:
Security Evaluation on Secret Computation without Changing the Polynomial Degree. AINA Workshops 2017: 56-61 - [c55]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura, Hyunho Kang:
Searchable encryption of image based on secret sharing scheme. APSIPA 2017: 1495-1503 - [c54]Jun Hamasaki, Keiichi Iwamura:
Geometric group key-sharing scheme using euclidean distance. CCNC 2017: 1004-1005 - [c53]Masataka Ikeda, Hyunho Kang, Keiichi Iwamura:
Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection. GCCE 2017: 1-2 - [c52]Daichi Tanaka, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda:
Deployment of Contents Protection Scheme using Digital Signature. ICE-B 2017: 130-137 - [c51]Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. IIH-MSP (1) 2017: 370-380 - [c50]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper). PST 2017: 225-232 - [i1]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper). IACR Cryptol. ePrint Arch. 2017: 718 (2017) - 2016
- [c49]Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura:
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption. AINA 2016: 669-676 - [c48]Jun Hamasaki, Ryo Kaneko, Keiichi Iwamura:
Geometric group key-sharing scheme. GCCE 2016: 1-2 - [c47]Naoto Kaneko, Keiichi Iwamura:
Proactive secret sharing scheme suitable for asymmetric secret sharing scheme. GCCE 2016: 1-2 - [c46]Natsuki Kokui, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Best embedding direction for spread spectrum-based video watermarking. GCCE 2016: 1-3 - [c45]Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Privacy-protected video surveillance in crowded environments using robust watermarking. GCCE 2016: 1-2 - [c44]YuFeng Yan, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Image watermarking using the differences between two wavelet filters. GCCE 2016: 1-3 - [c43]Takeshi Shingu, Keiichi Iwamura, Kitahiro Kaneda:
Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme. DCNET 2016: 89-94 - [c42]Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura:
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control. ICE-B 2016: 116-123 - [c41]Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura:
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control. ICETE (Selected Papers) 2016: 124-138 - [c40]Shinichi Goto, Keiichi Iwamura, Yuji Suga, Kitahiro Kaneda:
Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks. WINSYS 2016: 172-180 - 2015
- [j4]Hyunho Kang, Keiichi Iwamura:
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition. Entropy 17(3): 1218-1235 (2015) - [c39]Hyunho Kang, Keiichi Iwamura:
Anti-counterfeiting Using Irregularities of Magnetic Flux Density. CIT/IUCC/DASC/PICom 2015: 1325-1329 - [c38]Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura:
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. CANDAR 2015: 457-462 - [c37]Kent Kobayashi, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use. ICE-B 2015: 41-48 - [c36]Katsuma Koga, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura:
Content Control Scheme to Realize Right Succession and Edit Control. ICE-B 2015: 249-256 - [c35]Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Audio Watermarking Using Different Wavelet Filters. IWDW 2015: 312-320 - [c34]Yuichi Kusama, Hyunho Kang, Keiichi Iwamura:
Mosaic-based Privacy-protection with Reversible Watermarking. SIGMAP 2015: 98-103 - 2014
- [c33]Hyunho Kang, Keiichi Iwamura:
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code. IWIHC@AsiaCCS 2014: 9-17 - [c32]Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
A New Approach to Reversible Watermarking. IIH-MSP 2014: 455-458 - [c31]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
A Zero-Watermarking-Like Steganography and Potential Applications. IIH-MSP 2014: 459-462 - [c30]Kento Kobayashi, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Surveillance Camera System to Achieve Privacy Protection and Crime Prevention. IIH-MSP 2014: 463-466 - [c29]Hyunho Kang, Keiichi Iwamura:
Image Protection System with Steganography and Authentication. IIH-MSP 2014: 467-470 - [c28]Kitahiro Kaneda, Hiroyasu Kitazawa, Keiichi Iwamura, Isao Echizen:
A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code. IIH-MSP 2014: 497-501 - [c27]Kitahiro Kaneda, Tomoki Inui, Keiichi Iwamura, Isao Echizen:
Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera. IIH-MSP 2014: 502-506 - [c26]Kitahiro Kaneda, Kenta Kawabata, Keiichi Iwamura, Isao Echizen:
Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns. IIH-MSP 2014: 507-511 - [c25]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
Evaluation of a Zero-Watermarking-Type Steganography. IWDW 2014: 613-624 - [e1]Keiichi Iwamura, Ki-Ryong Kwon, Seiichi Gohshi, Minoru Kuribayashi:
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, IWIHC 2014, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2803-6 [contents] - 2013
- [j3]Masaki Inamura, Keiichi Iwamura:
Content Approval Systems with Expansions of a New Pair-Connected-Structured Aggregate Signature Scheme. Int. J. E Entrepreneurship Innov. 4(2): 15-37 (2013) - [c24]Satoshi Takahashi, Keiichi Iwamura:
Secret Sharing Scheme Suitable for Cloud Computing. AINA 2013: 530-537 - [c23]Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura, Isao Echizen:
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number. AINA Workshops 2013: 877-882 - [c22]Satoshi Takahashi, Shiro Kobayashi, Hyunho Kang, Keiichi Iwamura:
Secret sharing scheme for cloud computing using IDs. GCCE 2013: 528-529 - [c21]Yoshihide Nagai, Hyunho Kang, Keiichi Iwamura:
A storage-saving secret sharing scheme suitable for sensor networks. GCCE 2013: 534-535 - 2012
- [j2]Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:
Identifier Migration for Identity Continuance in Single Sign-On. J. Information Security 3(4): 307-313 (2012) - [c20]Tooru Shigehiro, Hirohisa Yabe, Keiichi Iwamura:
An improvement of insertion/deletion/substitution error correction capabilities of LDPC codes using slide decoding. ISITA 2012: 216-220 - [c19]Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura:
Proposal of a watermarking scheme using winding number and unneeded synchronism. ISITA 2012: 802-805 - [c18]Hiroki Nishikawa, Shingo Kuse, Keiichi Iwamura, Isao Echizen:
A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks. NBiS 2012: 777-781 - 2011
- [c17]Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura:
Fast Implementation of the Advanced Encryption Standard Using Atmega1281. ARES 2011: 342-346 - [c16]Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura:
Key Management Scheme Applicable to Various Topologies of Sensor Networks. ARES 2011: 448-453 - [c15]Hiroki Ikeda, Keiichi Iwamura:
Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block Cipher. AINA Workshops 2011: 593-600 - [c14]Kitahiro Kaneda, Yuta Kito, Keiichi Iwamura:
Information Hiding Based on the Artificial Fiber Pattern with Improved Robustness against Foregound Objects. IIH-MSP 2011: 322-329 - [c13]Kitahiro Kaneda, Yoshiaki Tachibana, Keiichi Iwamura:
Information Hiding Based on a Single Dot Pattern Method with Improved Extraction and Robustness against Foreground Objects. IIH-MSP 2011: 330-335 - [c12]Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:
Identity Continuance in Single Sign-On with Authentication Server Failure. IMIS 2011: 597-602 - [c11]Maeda Kazunari, Yoshio Kakizaki, Keiichi Iwamura:
Identifier Migration in OpenID. IMIS 2011: 612-617 - [c10]Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka:
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. SECRYPT 2011: 362-369 - 2010
- [c9]Yoshio Kakizaki, Keiichi Iwamura:
A Consideration of the Reliability of Registration and Attribute Exchange. ARES 2010: 574-579 - [c8]Kitahiro Kaneda, Yuki Fujii, Keiichi Iwamura, Seiichiro Hangai:
An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern. ARES 2010: 608-612 - [c7]Hajime Kubota, Keiichi Iwamura:
A New Fragile Watermarking Scheme and Its Security Evaluation. CCNC 2010: 1-5 - [c6]Masafumi Koide, Keiichi Iwamura:
Scalable authentication for various representations of JPEG 2000 images. ICIP 2010: 985-988
2000 – 2009
- 2008
- [c5]Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai:
Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed Documents. IIH-MSP 2008: 319-322 - [c4]Kitahiro Kaneda, Fumiya Nagai, Keiichi Iwamura, Seiichiro Hangai:
A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile Sizes. IIH-MSP 2008: 323-326 - [c3]Kosuke Kamiya, Takuma Mori, Keiichi Iwamura:
Development of Benchmark Tool for Digital Watermarking. IIH-MSP 2008: 327-330
1990 – 1999
- 1995
- [j1]Keiichi Iwamura, Yasunori Dohi, Hideki Imai:
A Design of Reed-Solomon Decoder with Systolic Array Structure. IEEE Trans. Computers 44(1): 118-122 (1995) - 1992
- [c2]Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai:
High-Speed Implementation Methods for RSA Scheme. EUROCRYPT 1992: 221-238 - [c1]Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai:
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). EUROCRYPT 1992: 477-481