IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 118, Number 479

Wideband System

Workshop Date : 2019-03-07 - 2019-03-08 / Issue Date : 2019-02-28

[PREV] [NEXT]

[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

WBS2018-76
Password for Prevention of Shoulder Surfing by Rear-Facing Camera
Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.)
pp. 1 - 6

WBS2018-77
Exploring Malicious URL in Dark Web Using Tor Crawler
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.)
pp. 7 - 12

WBS2018-78
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research)
pp. 13 - 19

WBS2018-79
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 21 - 26

WBS2018-80
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 27 - 32

WBS2018-81
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme
Bagus Santoso (UEC)
pp. 33 - 38

WBS2018-82
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.
Kaoru Takemure, Bagus Santoso (UEC)
pp. 39 - 44

WBS2018-83
Steganography for character strings by using deep learning
Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.)
pp. 45 - 49

WBS2018-84
Steganography for images by using deep learning
Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ)
pp. 51 - 55

WBS2018-85
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.)
pp. 57 - 64

WBS2018-86
String commitment with output locality
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU)
pp. 65 - 70

WBS2018-87
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University)
pp. 71 - 76

WBS2018-88
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.)
pp. 77 - 82

WBS2018-89
[Invited Talk] Deepning and evolution of Deep learning technology
Hayaru Shouno (UEC)
p. 83

WBS2018-90
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source -- When the Statewise Alphabets are Unknown --
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.)
pp. 85 - 90

WBS2018-91
On Multiterminal Hypothesis Testing Problem
Yasutada Oohama (UEC)
pp. 91 - 96

WBS2018-92
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence
Ryo Nomura (Senshu Univ.)
pp. 97 - 102

WBS2018-93
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set
Mitsuharu Arimnura (Shonan Inst. Tech.)
pp. 103 - 108

WBS2018-94
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources
Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.)
pp. 109 - 114

WBS2018-95
A New Variation of Asymmetric Numeral Systems
Qi Xin, Hidetoshi Yokoo (Gunma Univ.)
pp. 115 - 120

WBS2018-96
[Encouragement Talk] A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN
Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.)
pp. 121 - 126

WBS2018-97
[Encouragement Talk] A Study of Signal Transmission Forms of Optical Wireless turbo Code system
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 127 - 130

WBS2018-98
A study on dimming control scheme for visible-light communication using modified prime sequence codes
Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)
pp. 131 - 136

WBS2018-99
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes
Masato Tajima
pp. 137 - 142

WBS2018-100
Coded caching and a subspace based on the distribution of the number of requests
Masazumi Kurihara (UEC)
pp. 143 - 148

WBS2018-101
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels
Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154

WBS2018-102
History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.)
pp. 155 - 162

WBS2018-103
Authenticated Encryption Scheme Secure Against Side Channel Attack
Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba)
pp. 163 - 167

WBS2018-104
Proposal of Online Pachinko using smart contract
Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.)
pp. 169 - 174

WBS2018-105
Secure Comparisonl based on Quasi-Cyclic Code
Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
pp. 175 - 180

WBS2018-106
A Consideration of Computational Delay Time by Using MAC Implemented on CAN
Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech)
pp. 181 - 186

WBS2018-107
A document-management scheme by using Git and Blockchain methods
Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 187 - 191

WBS2018-108
Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2)
Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba)
pp. 193 - 200

WBS2018-109
One-Time Program and Its Application to Schnorr Signature
Takashi Nishide (Univ. of Tsukuba)
pp. 201 - 208

WBS2018-110
Non-interactive Reusable Private Comparison Output from MKFHE
Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba)
pp. 209 - 214

WBS2018-111
Nonce-Based Hybrid Encryption
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.)
pp. 215 - 222

WBS2018-112
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 223 - 228

WBS2018-113
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.)
pp. 229 - 234

WBS2018-114
Verifiable Delegated Private Bit Comparison
Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.)
pp. 235 - 242

WBS2018-115
Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki)
pp. 243 - 248

WBS2018-116
[Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC)
p. 249

WBS2018-117
Equivalence theorem and comparison of optimal designs in qubit systems
Jun Suzuki (UEC)
pp. 251 - 256

WBS2018-118
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence
Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.)
pp. 257 - 262

WBS2018-119
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC)
pp. 263 - 268

WBS2018-120
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba)
pp. 269 - 274

WBS2018-121
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba)
pp. 275 - 280

WBS2018-122
Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)
pp. 281 - 284

WBS2018-123
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU)
pp. 285 - 290

WBS2018-124
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling
Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 291 - 296

WBS2018-125
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.)
pp. 297 - 302

WBS2018-126
Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation
Tadatomo Sato (NIT, Hiroshima Coll.)
pp. 303 - 306

WBS2018-127
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 307 - 312

WBS2018-128
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code
Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.)
pp. 313 - 318

WBS2018-129
Studies on Ordered Shuffled BP Decoding of LDPC Codes -- Based on the Loops and Weight Distributions of LDPC Codes --
Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC)
pp. 319 - 324

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan