IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 118, Number 477

Information Theory

Workshop Date : 2019-03-07 - 2019-03-08 / Issue Date : 2019-02-28

[PREV] [NEXT]

[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2018-75
Password for Prevention of Shoulder Surfing by Rear-Facing Camera
Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.)
pp. 1 - 6

IT2018-76
Exploring Malicious URL in Dark Web Using Tor Crawler
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.)
pp. 7 - 12

IT2018-77
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research)
pp. 13 - 19

IT2018-78
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 21 - 26

IT2018-79
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 27 - 32

IT2018-80
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme
Bagus Santoso (UEC)
pp. 33 - 38

IT2018-81
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.
Kaoru Takemure, Bagus Santoso (UEC)
pp. 39 - 44

IT2018-82
Steganography for character strings by using deep learning
Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.)
pp. 45 - 49

IT2018-83
Steganography for images by using deep learning
Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ)
pp. 51 - 55

IT2018-84
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.)
pp. 57 - 64

IT2018-85
String commitment with output locality
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU)
pp. 65 - 70

IT2018-86
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University)
pp. 71 - 76

IT2018-87
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.)
pp. 77 - 82

IT2018-88
[Invited Talk] Deepning and evolution of Deep learning technology
Hayaru Shouno (UEC)
p. 83

IT2018-89
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source -- When the Statewise Alphabets are Unknown --
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.)
pp. 85 - 90

IT2018-90
On Multiterminal Hypothesis Testing Problem
Yasutada Oohama (UEC)
pp. 91 - 96

IT2018-91
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence
Ryo Nomura (Senshu Univ.)
pp. 97 - 102

IT2018-92
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set
Mitsuharu Arimnura (Shonan Inst. Tech.)
pp. 103 - 108

IT2018-93
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources
Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.)
pp. 109 - 114

IT2018-94
A New Variation of Asymmetric Numeral Systems
Qi Xin, Hidetoshi Yokoo (Gunma Univ.)
pp. 115 - 120

IT2018-95
[Encouragement Talk] A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN
Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.)
pp. 121 - 126

IT2018-96
[Encouragement Talk] A Study of Signal Transmission Forms of Optical Wireless turbo Code system
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 127 - 130

IT2018-97
A study on dimming control scheme for visible-light communication using modified prime sequence codes
Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)
pp. 131 - 136

IT2018-98
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes
Masato Tajima
pp. 137 - 142

IT2018-99
Coded caching and a subspace based on the distribution of the number of requests
Masazumi Kurihara (UEC)
pp. 143 - 148

IT2018-100
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels
Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154

IT2018-101
History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.)
pp. 155 - 162

IT2018-102
Authenticated Encryption Scheme Secure Against Side Channel Attack
Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba)
pp. 163 - 167

IT2018-103
Proposal of Online Pachinko using smart contract
Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.)
pp. 169 - 174

IT2018-104
Secure Comparisonl based on Quasi-Cyclic Code
Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
pp. 175 - 180

IT2018-105
A Consideration of Computational Delay Time by Using MAC Implemented on CAN
Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech)
pp. 181 - 186

IT2018-106
A document-management scheme by using Git and Blockchain methods
Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 187 - 191

IT2018-107
Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2)
Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba)
pp. 193 - 200

IT2018-108
One-Time Program and Its Application to Schnorr Signature
Takashi Nishide (Univ. of Tsukuba)
pp. 201 - 208

IT2018-109
Non-interactive Reusable Private Comparison Output from MKFHE
Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba)
pp. 209 - 214

IT2018-110
Nonce-Based Hybrid Encryption
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.)
pp. 215 - 222

IT2018-111
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 223 - 228

IT2018-112
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.)
pp. 229 - 234

IT2018-113
Verifiable Delegated Private Bit Comparison
Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.)
pp. 235 - 242

IT2018-114
Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki)
pp. 243 - 248

IT2018-115
[Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC)
p. 249

IT2018-116
Equivalence theorem and comparison of optimal designs in qubit systems
Jun Suzuki (UEC)
pp. 251 - 256

IT2018-117
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence
Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.)
pp. 257 - 262

IT2018-118
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC)
pp. 263 - 268

IT2018-119
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba)
pp. 269 - 274

IT2018-120
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba)
pp. 275 - 280

IT2018-121
Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)
pp. 281 - 284

IT2018-122
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU)
pp. 285 - 290

IT2018-123
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling
Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 291 - 296

IT2018-124
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.)
pp. 297 - 302

IT2018-125
Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation
Tadatomo Sato (NIT, Hiroshima Coll.)
pp. 303 - 306

IT2018-126
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 307 - 312

IT2018-127
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code
Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.)
pp. 313 - 318

IT2018-128
Studies on Ordered Shuffled BP Decoding of LDPC Codes -- Based on the Loops and Weight Distributions of LDPC Codes --
Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC)
pp. 319 - 324

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan