Institute of Mathematics for Industry

Workshops & Conferences



List of workshops & conferences

Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling


Hold Date 2017-06-12 10:00~2017-06-13 16:00

Place Seminar Room, 2F, Industry-University-Government Collaboration Innovation Plaza, Academic Research and Industrial Collaboration Management Office of Kyushu University

Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling
 [Japanese Version]

: IMI Workshop of the Joint Research Projects
 

[Online registration] is now available.

[Program] is now available.
 
 Date & Time
 
 June 12(Mon)10:00 - 13(Tue)16:00, 2017
 
 Venue
 
 AirIMaQ, Momochi:
 Seminar Room, 2F, Industry-University-Government Collaboration Innovation Plaza
 Academic Research and Industrial Collaboration Management Office of Kyushu University
 3-8-34 Momochihama Sawara-ku Fukuoka 814-0001, JAPAN
 Access
 
 Speakers &
 Titles
 
 Yvo Desmedt (The University of Texas at Dallas, USA)
    Human Recomputable Secret Shares and their Applications in E-Voting
 Amos Beimel (Ben-Gurion University, Israel)
    Graph Secret Sharing
 Eyal Kushilevitz (Technion, Israel)
    Ad-hoc MPC
 Takeshi Koshiba (Waseda University, Japan)
    Secure Message Transmission against Rational Adversaries
 Mitsugu Iwamoto (The University of Electro-Communications, Japan)
    Secret Sharing Schemes under Guessing Secrecy
 Ryo Kikuchi (NIPPON TELEGRAPH AND TELEPHONE CORPORATION, Japan)
    Key components in MEVAL
 Kazuma Ohara (NEC Corporation, Japan)
    Optimized Honest-Majority MPC for Malicious Adversaries
    - Breaking the 1 Billion-Gate Per Second Barrier

 Naruhiro Kurokawa (Bank of Japan)
    Function Secret Sharing Using Fourier Basis
 
 Organizing
 Committee
 
 Kirill Morozov (Tokyo Institute of Technology)
 Yuji Suga (Internet Initiative Japan Inc.)
 Hiroaki Anada (University of Nagasaki)
 
 Registration  Free
 
 Contact  ct-sns-info[at]imi.kyushu-u.ac.jp (convert [at] into @)
 
Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling