IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Theory (IT)
Chair: Masayoshi Ohashi (Fukuoka Univ.) Vice Chair: Jun Muramatsu (NTT)
Secretary: Nariaki Kuzuoka (Wakayama Univ.), Takahiro Yoshida (Yokohama College of Commerce)
Assistant: Mitsugu Iwamoto (Univ. of Electro-Comm.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Masahiro Mambo (Kanazawa Univ.) Vice Chair: Kazuto Ogawa (NHK), Atsushi Fujioka (Kanagawa Univ.)
Secretary: Yuichi Komano (Toshiba), Takaaki Mizuki (Tohoku Univ.)
Assistant: Toshihiro Ohigashi (Tokai Univ.), Yuuji Suga (IIJ), Atsuo Inomata (Tokyo Denki Univ.)

===============================================
Technical Committee on Wideband System (WBS)
Chair: Fumiaki Maehara (Waseda Univ.) Vice Chair: Masanori Hamamura (Kochi Univ. of Tech.), Fumie Ono (NICT)
Secretary: Masatomo Sato (Tokyo City Univ.), Yasunori Nouda (Mitsubishi Electric)
Assistant: Yusuke Kozawa (Tokyo Univ. of Science), Akira Nakamura (Tokyo Univ. of Science), Ryohei Nakamura (National Defense Academy)

DATE:
Thu, Mar 9, 2017 10:25 - 17:40
Fri, Mar 10, 2017 09:35 - 17:25

PLACE:
Takanawa Campus, Tokai University(2-3-23, Takanawa, Minato-ku, Tokyo 108-8619. http://www.u-tokai.ac.jp/english/access.html#Anc_Takanawa. Junior Associate Prof. Toshihiro Ohigashi)

TOPICS:
joint meeting of IT, ISEC, and WBS

----------------------------------------
Thu, Mar 9 ISEC (1) (10:25 - 11:15)
Chair: Atsushi Fujioka (Kanagawa Univ.)
----------------------------------------

(1) 10:25 - 10:50
A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.)

(2) 10:50 - 11:15
The Security of 3-Round RSA-OAEP against Related-Key Attacks
Gembu Ito, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 9 Invited Talk (1) (11:25 - 12:15)
Chair: Masahiro Mambo (Kanazawa Univ.)
----------------------------------------

(3) 11:25 - 12:15
[Invited Talk]
Recent Advances in Whitebox Cryptgraphy
-- Efficient and Robust Constructions and New Attacks --
Takanori Isobe (Sony Global M&O Corp.)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Thu, Mar 9 ISEC (2) (13:35 - 14:50)
Chair: Eiichiro Fujisaki (NTT)
----------------------------------------

(4) 13:35 - 14:00
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm
Yohei Maezawa, Munetoshi Iwakiri (NDA)

(5) 14:00 - 14:25
Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo)

(6) 14:25 - 14:50
Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II
Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.)

----------------------------------------
Thu, Mar 9 IT (1) (13:35 - 14:50)
----------------------------------------

(7) 13:35 - 14:00
On the Design of Locally Repairable Codes Based on Code Modification
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)

(8) 14:00 - 14:25
Sphere packing bound and Gilbert-Varshamov bound for b-symbol read channels
Seunghoan Song, Toru Fujiwara (Osaka Univ.)

(9) 14:25 - 14:50
Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences
Masato Tajima

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 9 ISEC (3) (15:00 - 16:40)
Chair: Masaaki Shirase (FUN)
----------------------------------------

(10) 15:00 - 15:25
Security evaluation of elliptic curve cryptosystems with special addition formula(2)
Ryohei Morishima (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)

(11) 15:25 - 15:50
Security evaluation of elliptic curve cryptosystems with special addition formula
Kodera Kenta (Osaka Univ.), Miyaji Atsuko (Osaka Univ./JAIST), Cheng Chen-Mou (Osaka Univ.)

(12) 15:50 - 16:15
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.)

(13) 16:15 - 16:40
Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic.
Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)

----------------------------------------
Thu, Mar 9 WBS (1) (15:00 - 16:40)
----------------------------------------

(14) 15:00 - 15:25
A study on delay profile measurements using MB-OFDM-UWB signal and cross-correlation
Takuya Okamoto, Tetsushi Ikegami (Meiji Univ.)

(15) 15:25 - 15:50
Multiuser Performance Evaluation on Square-law Detection DS-UWB-IR using Modified Pseudo-orthogonal M-sequence
Takuma Matsumura, Hiromasa Habuchi (Ibaraki Univ.)

(16) 15:50 - 16:15
PAPR Reduction Scheme for OFCDM Using Code Shift Keying
Yuki Hosokawa, Hiromasa Habuchi (Ibaraki Univ.)

(17) 16:15 - 16:40
Different Orthogonal Code DS/CDMA with High Spectral Efficiency and Evaluations by Interference Cancellation Using Indoor Radio Wave Intensity Distriburtion
Hirofumi Nakajo, Shin'ichi Tachikawa (NIT, Nagaoka)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 9 Invited Talk (2) (16:50 - 17:40)
----------------------------------------

(18) 16:50 - 17:40
[Invited Talk]
On the Wyner-Ziv Coding Problem with Delayed Side Information
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)

----------------------------------------
Fri, Mar 10 ISEC (4) (09:35 - 12:35)
Chair: Kazuto Ogawa (NHK)
----------------------------------------

(19) 09:35 - 10:00
Anonymous Oblivious RAM for Multi-user Environment
Satoru Takano, Su Chunhua, Atuko Miyaji (Osaka Univ.)

(20) 10:00 - 10:25
A study of secure multi-party set union protocol
Katsunari Shishido, Atsuko Miyaji (OU)

(21) 10:25 - 10:50
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation
Gavin Lynn Stewart (JAIST), Yuichi Futa (TUT), Atsuko Miyaji (JAIST/Osaka Univ.)

----- Break ( 30 min. ) -----

(22) 11:20 - 11:45
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU)

(23) 11:45 - 12:10
Diagonally Witness-Indistinguishable Proof Systems
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC)

(24) 12:10 - 12:35
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC)

----------------------------------------
Fri, Mar 10 IT (2) (10:55 - 12:35)
----------------------------------------

(25) 10:55 - 11:20
Studies on evaluationg system for q-ary linear block codes based on q-input r-output symmetric channels(2)
Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)

(26) 11:20 - 11:45
MRI Acceleration by Super Resolution
Ayaka Nakashima, Masanori Kawakita, Yutaka Jitsumatsu (Kyushu Univ.), Shigehide Kuhara (Kyorin Univ.), Jun'ichi Takeuchi (Kyushu Univ.)

(27) 11:45 - 12:10
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN
Norisato Suga, Naoto Egashira, Kazuto Yano, Tomoaki Kumagai (ATR)

(28) 12:10 - 12:35
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.)

----- Lunch Break ( 70 min. ) -----

----------------------------------------
Fri, Mar 10 ISEC (5) (13:45 - 15:00)
Chair: Ryuichi Sakai (OECU)
----------------------------------------

(29) 13:45 - 14:10
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC
Masao Kasahara (Waseda Univ.)

(30) 14:10 - 14:35
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC)

(31) 14:35 - 15:00
Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.)

----------------------------------------
Fri, Mar 10 IT (3) (13:45 - 15:00)
----------------------------------------

(32) 13:45 - 14:10
Index Coding with Information-Theoretic Secrecy for Unintended Message
Mami Takei, Hiroki Koga (Univ. Tsukuba)

(33) 14:10 - 14:35
Spectrum Sensing in Cooperative with Some Secondary Users
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)

(34) 14:35 - 15:00
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh Matsumoto (Tokyo Tech.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 10 ISEC (6) (15:10 - 16:25)
Chair: Yuuji Suga (IIJ)
----------------------------------------



(35) 15:35 - 16:00
Secret Sharing Schemes using Modulo-2^m Operations
Hidenori Kuwakado (Kansai Univ.)

(36) 16:00 - 16:25
Development of Security Incident Symptomatic Analysis function in SIAS
Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR)

----------------------------------------
Fri, Mar 10 WBS (2) (15:10 - 16:25)
----------------------------------------

(37) 15:10 - 15:35
Performance of Error Correcting Codes for RGB-LED Parallel Transmission
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)

(38) 15:35 - 16:00
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code
Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)

(39) 16:00 - 16:25
A Study on Relay Communication using UAV with Buffer
Higashi Takahiro, Ochiai Hideki (Yokohama National Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 10 Invited Talk (3) (16:35 - 17:25)
----------------------------------------

(40) 16:35 - 17:25
[Invited Talk]
A Survey on Space-, Time-, and Frequency-Domain Index Modulation
Shinya Sugiura (TUAT)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
Invited Talk will have 40 minutes for presentation and 10 minutes for discussion.

# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.


=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:

Mon, May 22, 2017 - Tue, May 23, 2017: Yamagata University(Yonezawa Campus) [Tue, Mar 21], Topics: Information Security, Information Theory, Information Hiding, etc.

# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Shigeaki Kuzuoka (Wakayama University)
Takahiro Yoshida (Yokohama College of Commerce)
Mitsugu Iwamoto (University of Electro-Communications)

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, May 12, 2017: Kikai-Shinko-Kaikan Bldg. [Fri, Mar 10]

# SECRETARY:
Takaaki Mizuki (Tohoku University)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:

Thu, May 25, 2017 - Fri, May 26, 2017: Utsunomiya Univ. Yoto Campus [Thu, Mar 16], Topics: Coding, Modulation, Demodulation, Signal Processing Technique, etc.

# SECRETARY:
Tadatomo Sato (Tokyo City University)
TEL 03-5707-0104 (ext. 2968), FAX 03-5707-2180
E-mail: ttcu


Last modified: 2017-03-06 17:17:49


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan