Tue, Mar 14 AM WBS1(D21) 09:00 - 10:15 |
(1) |
09:00-09:25 |
Improvement of the meteor burst channel model and comparison with results of the experiment in Indonesia |
Hiroto Iwasaki, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.) |
(2) |
09:25-09:50 |
A Study on Application of Multi-Receiver System in Meteor Burst Communication |
Takumi Kayama, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.) |
(3) |
09:50-10:15 |
A Proposal of Visible Light Communication System using Image Classifier based on Imaginary Images |
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) |
|
10:15-10:30 |
Break ( 15 min. ) |
Tue, Mar 14 AM IT2(D21) Chair: Tetsuya Kojima (National Institute of Technology, Tokyo College) 10:30 - 11:20 |
(4) |
10:30-11:20 |
[Invited Talk]
Information-Theoretic Analyses for Two Problems Taking Security into Consideration
-- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem -- |
Shota Saito (Gunma Univ.) |
|
11:20-13:00 |
Break ( 100 min. ) |
Tue, Mar 14 AM ISEC1(D22) Chair: Kazuki Yoneyama (Ibaraki University) 09:00 - 10:15 |
(5) |
09:00-09:25 |
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication
-- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication -- |
Masaaki Shirase (FUN) |
(6) |
09:25-09:50 |
Security Anslysis of binary elliptic curve GLS254 |
Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) |
(7) |
09:50-10:15 |
Full key recovery of RSA secret key from noisy binary GCD operation sequences |
Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba) |
|
10:15-10:30 |
Break ( 15 min. ) |
Tue, Mar 14 AM ISEC2(D22) Chair: Yoshikazu Hanatani (Toshiba) 10:30 - 12:10 |
(8) |
10:30-10:55 |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field |
Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) |
(9) |
10:55-11:20 |
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field |
Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU) |
(10) |
11:20-11:45 |
An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography |
Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech) |
(11) |
11:45-12:10 |
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields |
Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) |
|
12:10-13:00 |
Break ( 50 min. ) |
Tue, Mar 14 AM IT1 (D12) Chair: Jun Suzuki (UEC) 09:25 - 10:15 |
(12) |
09:25-09:50 |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields |
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) |
(13) |
09:50-10:15 |
An information-spectrum approach to entanglement purification and distillation |
Motoki Achiwa, Tomohiro Ogawa (UEC) |
Tue, Mar 14 PM RCC1(D21) Chair: Kunihisa Okano (Ritsumeikan University) 13:00 - 14:15 |
(14) |
13:00-13:25 |
On Reward Distribution in Reinforcement Learning of Multi-Agent Surveillance Systems with Temporal Logic Specifications |
Keita Terashima, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) |
(15) |
13:25-13:50 |
Generation of GPS and QZSS Spoofing Signals |
Yuta Kawasaki, ishii koji (Kagawa Univ.) |
(16) |
13:50-14:15 |
Secure communication based on high precision space-time synchronization |
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) |
|
14:15-14:55 |
Break ( 40 min. ) |
Tue, Mar 14 PM WBS2(D21) 14:55 - 16:35 |
(17) |
14:55-15:20 |
A Study on Security Gap-Based Design of Polar Codes |
Hidetake Matsui, Toshiki Matsumine, Hideki Ochiai (Yokohama National Univ.) |
(18) |
15:20-15:45 |
High Speed Optical Wireless Uplink using MU-MIMO with Angle Diversity |
Xuejuan Zhu, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya Univ) |
(19) |
15:45-16:10 |
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication |
Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) |
(20) |
16:10-16:35 |
Performance Evaluation of Image Sensor Communication Using Propeller-Type Rotary LED Transmitter With Varying LED Installation Positions |
Kazuki Syakuda (Okayama Univ. of Sci.), Zhengqiang Tang (Nagoya Univ.), Shintaro Arai (Okayama Univ. of Sci.) |
|
16:35-16:50 |
Break ( 15 min. ) |
Tue, Mar 14 PM RCC2(D21) Chair: Ryosuke Adachi (Yamaguchi University) 16:50 - 17:40 |
(21) |
16:50-17:40 |
[Invited Talk]
Novel Wireless Communication System Realized by Mobile Terminal Collaboration using Higher-Frequency Bands |
Hidekazu Murata (Yamaguchi Univ.) |
Tue, Mar 14 PM ISEC3(D22) Chair: Atsushi Takayasu (The University of Tokyo) 13:00 - 14:40 |
(22) |
13:00-13:25 |
Multi-Authority Attribute Based Signatures from Lattice |
Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.) |
(23) |
13:25-13:50 |
Signature scheme based on OSIDH |
Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT) |
(24) |
13:50-14:15 |
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography |
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
(25) |
14:15-14:40 |
FPGA implementation of PQC Signature Algorithm QR-UOV using High Level Synthesis |
Kimihiro Yamakoshi, Tsunekaze Saito (NTT) |
|
14:40-14:55 |
Break ( 15 min. ) |
Tue, Mar 14 PM ISEC4(D22) Chair: Koichi Sakurai (Kyushu University) 14:55 - 16:35 |
(26) |
14:55-15:20 |
Forward-Secure for Claimable/Repudiable Ring Signature Scheme |
Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ) |
(27) |
15:20-15:45 |
Attribute-based encryption with keyword search |
Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) |
(28) |
15:45-16:10 |
Claimable Designated Verifier Signature |
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) |
(29) |
16:10-16:35 |
Identity-based Matchmaking Encryption Secure against the KGC |
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
|
16:35-16:50 |
Break ( 15 min. ) |
Tue, Mar 14 PM ISEC5(D22) Chair: Takahiro Matsuda (AIST) 16:50 - 18:05 |
(30) |
16:50-17:15 |
Proposal for a privacy-preserving frequency estimation method |
Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) |
(31) |
17:15-17:40 |
Local Differential Privacy mechanism for non-linear machine learning |
Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST), Tomoaki Mimoto (ATR) |
(32) |
17:40-18:05 |
Diversification of Personal Records using GAN |
Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) |
Tue, Mar 14 PM IT3 (D12) Chair: Shigeaki Kuzuoka (Wakayama Univ.) 13:00 - 14:40 |
(33) |
13:00-13:25 |
Exponential Strong Converse for Source Coding with Encoded Side Information
-- Comparison with Source Coding with Non-encoded Side Information -- |
Daisuke Takeuchi, Shun Watanabe (TUAT) |
(34) |
13:25-13:50 |
A Greedy Algorithm for the Minimum-Entropy Coupling Problem |
Taisei Shibata, Ken-ichi Iwata, Kengo Hashimoto (Univ. Fukui) |
(35) |
13:50-14:15 |
A Construction Method of Alphabetic Codes Allowing N-bit Decoding Delays |
Daichi Ueda, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(36) |
14:15-14:40 |
Construction of Grammar-Based Codes Using the LZ78 Code and Its Variants |
Mitsuharu Arimura (Shonan Inst. Tech.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Tue, Mar 14 PM IT4 (D12) Chair: Tomohiro Ogawa (UEC) 14:55 - 16:10 |
(37) |
14:55-15:20 |
|
Kaito Ootsu, Shan Lu, Hiroshi Kamabe (Gifu Univ) |
(38) |
15:20-15:45 |
Estimation Performance of Sparse Bayesian Linear Regression model with t-distribution |
Kazuaki Murayama (UEC) |
(39) |
15:45-16:10 |
Improvement of the Performance for Quantum Neural Network Classifiers based on Optimal Quantum Measurement Decoding |
Yusaku Yamada, Jun Suzuki (UEC) |
Wed, Mar 15 AM RCC3(D21) Chair: Koichi Kobayashi (Hokkaido University) 09:30 - 10:45 |
(40) |
09:30-09:55 |
Design Using Sparse Optimization of Consensus Dynamics in High-Order Multi-Agent Systems |
Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.) |
(41) |
09:55-10:20 |
Control of Multi-robot Systems Using A Future Map |
Aki Matsutaka (Nagoya Univ.), Shun-ichi Azuma (Kyoto Univ.), Ryo Ariizumi, Toru Asai (Nagoya Univ.) |
(42) |
10:20-10:45 |
Improvement of the Operability of Industrial Robot using Interpolation method under Imperfect Communication Constraints |
Yosuke Takagi, Ben Naila Chedlia, Hiraku Okada, Masaaki Katayama (Nagoya Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
Wed, Mar 15 AM WBS3(D21) 11:00 - 11:50 |
(43) |
11:00-11:50 |
[Invited Talk]
Virtualized terminal utilizing the terahertz band for high-capacity communications toward Beyond 5G/6G |
Takahiro Hayashi, Yoshio Kunisawa, Tatsuya Nagao, Kazuki Takezawa, Satoshi Ito, Hiromi Matsuno, Yoji Kishi (KDDI Research, Inc) |
|
11:50-13:00 |
Lunch ( 70 min. ) |
Wed, Mar 15 AM ISEC6(D22) Chair: Goichiro Hanaoka (AIST) 09:30 - 10:45 |
(44) |
09:30-09:55 |
Networks anomaly detection by VAE based on features extracted by CNN |
Higashihata Kazuki (Osaka Prefecture Univ.), Aoki Shigeki, Miyamoto Takao (Osaka Metropolitan Univ.) |
(45) |
09:55-10:20 |
A Consideration of Logfile Automatic Detection for Digital Forensics using Machine Learning |
Koudai Iwasaki (TUIS), Akira Orita, Shingo Sekiya, Shinta Nakano (HISYS), Masaki Hanada, Eiji Nunohiro, Yorinori Kishimoto (TUIS) |
(46) |
10:20-10:45 |
Designing for Supply Chain Network Model with Disruption Risks by Hybrid GA and Jaya Algorithm with Fuzzy Logic Controller |
Mitsuo Gen (FLSI), YoungSu Yun, Tserendulam Erdenebaatar (Chosun Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
Wed, Mar 15 AM ISEC7(D22) Chair: Masaaki Shirase (Future University Hakodate) 11:00 - 12:15 |
(47) |
11:00-11:25 |
Garbled Circuit Construction Method Using Linked List of Hash Functions |
Guangjian Liu, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) |
(48) |
11:25-11:50 |
Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input |
Yuji Suga (IIJ) |
(49) |
11:50-12:15 |
Steganography for Graphs using Graph Spectrum |
Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) |
|
12:15-13:00 |
Lunch ( 45 min. ) |
Wed, Mar 15 AM IT5 (D12) Chair: Gou Hosoya (Waseda Univ.) 09:30 - 10:45 |
(50) |
09:30-09:55 |
A Study on Systematic Design of Geometric Shaping for BICM Systems |
Eito Kurihara, Hideki Ochiai (YNU) |
(51) |
09:55-10:20 |
|
Hibiki Ogawa, Hiroshi Kamabe, Shan Lu (Gifu Univ) |
(52) |
10:20-10:45 |
Efficient composition of encoding polynomial in distributed coded computing scheme |
Daisuke Hibino, Tomoharu Shibuya (Sophia Univ.) |
Wed, Mar 15 PM WBS4(D21) 13:00 - 14:40 |
(53) |
13:00-13:25 |
Data Sharing Illumination Light Communications System using (k,n) Visual Secret Sharing Scheme |
Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(54) |
13:25-13:50 |
A Study of Individual FOV Optimization according to the placement of PDs for Underwater VLC using Angular Diversity Receiver |
Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ) |
(55) |
13:50-14:15 |
A Study on Average Bit Error Rate Analysis of Underwater Optical Camera Communication Using RGB-LED Array |
Kazune Yokoo, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.), Takao Sawa (JAMSTEC) |
(56) |
14:15-14:40 |
Frame Synchronization of Modified MPPM in RGB-LED based Parallel Transmission Scheme |
Hiromasa Habuchi, Jo Matsushima (Ibaraki Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Wed, Mar 15 PM WBS5(D21) 14:55 - 16:35 |
(57) |
14:55-15:45 |
[Invited Talk]
Terahertz Surface-Wave Resonators for Functional Devices |
Jun-ichi Shikata, Yuya Iwakawa (Nihon Univ.), Seigo Ohno (Tohoku Univ.) |
(58) |
15:45-16:10 |
Characterization of Effective Traffic Offloading with Predictive Drone Placement |
Sotaro Ichikawa, Osamu Takyu (Shinshu Univ) |
(59) |
16:10-16:35 |
Performance Improvements of Positioning Accuracy Based on Multiple Observations of Doppler shift for User Position Detection System Using Unmanned Aerial Vehicles |
Taiga Deguchi, Hiroyasu Ishikawa (Nihon Univ.) |
Wed, Mar 15 PM ISEC8(D22) Chair: Yuji Suga (IIJ) 13:00 - 14:40 |
(60) |
13:00-13:25 |
A proposal of an attribute protection scheme in self-sovereign identity systems with shared terminals |
Wataru Nakamura, Kenta Takahashi (Hitachi) |
(61) |
13:25-13:50 |
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher |
Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) |
(62) |
13:50-14:15 |
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution |
Sakae Chikara, Tsunekazu Saito (NTT) |
(63) |
14:15-14:40 |
Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token |
Kouichi Sakurai (Kyushu Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Wed, Mar 15 PM ISEC9(D22) Chair: Noboru Kunihiro (University of Tsukuba) 14:55 - 16:35 |
(64) |
14:55-15:20 |
Experiments on pre-image computation time in Keccak[r = 40, c = 160, nr = 2] |
Xinyu Qi, Atsushi Fujioka (Kanagawa Univ), Kazumaro Aoki (BUNKYO Univ) |
(65) |
15:20-15:45 |
Evaluation and Improvement of Related Key Differential Attack for the Block Cipher Midori |
Shion Hirao, Keigo Horibe, Kosei Sakamoto, Takanori Isobe (UOH) |
(66) |
15:45-16:10 |
New Differential Pair of Linear Differential Attack for Salsa |
Kunjo Ri, Atsuko Miyaji (Handai) |
(67) |
16:10-16:35 |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing |
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) |
Wed, Mar 15 PM IT6 (D12) Chair: Mitsuharu Arimura (Shonan Institute of Technology ) 13:00 - 14:40 |
(68) |
13:00-13:25 |
An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information |
Tetsunao Matsuta (Saitama Univ.) |
(69) |
13:25-13:50 |
On the Optimal Construction of a Ramp Secret Sharing Scheme Realizing a General Access Structure |
Shugo Kurokawa, Hiroki Koga (Univ Tsukuba) |
(70) |
13:50-14:15 |
Evaluation of the Optimal Relative Difference of Superimposed All the Shares for a (t,n)-Threshold Visual Cryptography Scheme |
Hiroki Koga (Univ. Tsuikuba) |
(71) |
14:15-14:40 |
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color |
Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) |