IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Theory (IT) [schedule] [select]
Chair Tomohiko Uematsu (Tokyo Inst. of Tech.)
Vice Chair Hiroshi Kamabe (Gifu Univ.)
Secretary Hidenori Kuwakado (Kobe Univ.), Hiroki Koga (Univ. of Tsukuba)
Assistant Masazumi Kurihara (Univ. of Electro-Comm.)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Toru Fujiwara (Osaka Univ.)
Vice Chair Naoya Torii (Fujitsu Labs.), Tsutomu Matsumoto (Yokohama National Univ.)
Secretary Katsuyuki Takashima (Mitsubishi Electric), Toru Nakanishi (Okayama Univ.)
Assistant Junji Shikata (Yokohama National Univ.)

Technical Committee on Wideband System (WBS) [schedule] [select]
Chair Makoto Itami (Tokyo Univ. of Science)
Vice Chair Hiromasa Habuchi (Ibaraki Univ.), Yukitoshi Sanada (Keio Univ.)
Secretary Masato Saito (Univ. of Ryukyus), Kenichi Takizawa (NICT)
Assistant Kohei Ono (Tokyo Univ. of Science), Nobuyoshi Komuro (Chiba Univ.)

Conference Date Thu, Mar 3, 2011 10:00 - 17:25
Fri, Mar 4, 2011 09:00 - 16:10
Topics  
Conference Place Graduate School of Infomation Science and Technology, Suita Campus, Osaka University 
Address 1-5 Yamadaoka, Suita-shi, 565-0871 Japan
Sponsors This conference is co-sponsored by IEEE IT Society Japan Chapter.

Thu, Mar 3 AM  ISEC(A110)
Chair: ISEC
10:00 - 11:40
(1) 10:00-10:25 Efficient Searchable Encryption Schemes Against Frequency Analysis Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications)
(2) 10:25-10:50 Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric)
(3) 10:50-11:15 Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.)
(4) 11:15-11:40 A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC)
  11:40-13:00 Lunch Break ( 80 min. )
Thu, Mar 3 PM  Invited Talk(A110)
13:00 - 16:00
(5) 13:00-14:00 [Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.)
(6) 14:00-15:00 [Invited Talk]
Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
(7) 15:00-16:00 [Invited Talk]
Linear Cryptanalysis
-- History and Open Problems --
Mitsuru Matsui (Mitsubishi Electric)
  16:00-16:10 Break ( 10 min. )
Thu, Mar 3 PM  ISEC(A110)
Chair: ISEC
16:10 - 17:25
(8) 16:10-16:35 Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics Tsutomu Matsumoto (Yokohama Nat Univ.)
(9) 16:35-17:00 RFID Identification Protocol with Reduced Reader Computational Cost Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.)
(10) 17:00-17:25 Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States Kazuho Kakiwaki, Atsuko Miyaji (JAIST)
Thu, Mar 3 AM  IT(B101)
Chair: IT
10:00 - 11:40
(11) 10:00-10:25 A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.)
(12) 10:25-10:50 Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric)
(13) 10:50-11:15 Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning Ken Enokizono, Hideki Ochiai (Yokohama National Univ.)
(14) 11:15-11:40 Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.)
  11:40-16:10 Lunch + Invited Talk + Break ( 270 min. )
Thu, Mar 3 PM  IT(B101)
Chair: IT
16:10 - 17:25
(15) 16:10-16:35 Han-Kobayashi Rate Region for Gray-Wyner Source Coding System Shigeaki Kuzuoka (Wakayama Univ.)
(16) 16:35-17:00 The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
(17) 17:00-17:25 A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property Takuya Koyama, Ken-ichi Iwata (Univ of Fukui)
Thu, Mar 3 AM  WBS(A109)
10:00 - 11:40
(18) 10:00-10:25 A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.)
(19) 10:25-10:50 A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.)
(20) 10:50-11:15 Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.)
(21) 11:15-11:40 A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.)
  11:40-16:10 Lunch + Invited Talk + Break ( 270 min. )
Thu, Mar 3 PM  WBS(A109)
16:10 - 17:25
(22) 16:10-16:35 Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.)
(23) 16:35-17:00 A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
(24) 17:00-17:25 Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.)
Fri, Mar 4 AM  ISEC(A110)
Chair: ISEC
09:00 - 10:15
(25) 09:00-09:25 Construction of non-hyperelliptic coverings for elliptic curves on extension fields Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
(26) 09:25-09:50 GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.)
(27) 09:50-10:15 Proposition of precomputation schemes considering memory Taiki Sasahara, Atsuko Miyaji (JAIST)
  10:15-10:25 Break ( 10 min. )
Fri, Mar 4 AM  ISEC(A110)
Chair: ISEC
10:25 - 11:40
(28) 10:25-10:50 Performance Evaluations of Robust Group Key Exchange Protocols Takashi Sato, Atsuko Miyaji (JAIST)
(29) 10:50-11:15 Verification Points of Security Against a Passive Attack for Key Exchange Protocols Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.)
(30) 11:15-11:40 Improved POSH scheme using hash chains among sensors Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.)
  11:40-13:25 Lunch Break ( 105 min. )
Fri, Mar 4 PM  ISEC(A110)
Chair: ISEC
13:25 - 14:40
(31) 13:25-13:50 An anomaly detection method using gamma-divergence and its application to system call sequence Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.)
(32) 13:50-14:15 Oblivious Symmetric Key Encryption and Its Application to IP-Traceback Ryo Nojima (NICT), Youki Kadobayashi (NAIST)
(33) 14:15-14:40 A Note on serviceability between personal certificate and server sertificate on PKI Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST)
  14:40-14:55 Break ( 15 min. )
Fri, Mar 4 PM  ISEC(A110)
Chair: ISEC
14:55 - 16:10
(34) 14:55-15:20 User Authentication Using Neural Network Based on Keystroke Characteristics Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.)
(35) 15:20-15:45 Robust image hashing against geometric attacks using image normalization and SVD decomposition Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX)
(36) 15:45-16:10 Visual Card Games for Boys and Girls Miyuki Uno, Mikio Kano (Ibaraki Univ.)
Fri, Mar 4 AM  IT(B101)
Chair: IT
09:00 - 10:15
(37) 09:00-09:25 An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo)
(38) 09:25-09:50 A Practical Algorithm of Universal Source Coding by the Most Frequent Substring Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech)
(39) 09:50-10:15 A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure
-- When Both Discrete and Continuous Data are Present --
Joe Suzuki (Osaka Univ.)
  10:15-10:25 Break ( 10 min. )
Fri, Mar 4 AM  IT(B101)
Chair: IT
10:25 - 12:05
(40) 10:25-10:50 Error exponent for channel coding with noisy feedback and bin coding Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
(41) 10:50-11:15 Rate-Splitting for Multiple Receiver Channels Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.)
(42) 11:15-11:40 Performance evaluation of MC-CDMA system which permits time and frequency offsets Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.)
(43) 11:40-12:05 Performance Evaluation of Non-binary LDPC Code with APSK Modulation Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.)
  12:05-13:25 Lunch ( 80 min. )
Fri, Mar 4 PM  IT+ISEC[Joint session](B101)
Chair: IT
13:25 - 14:40
(44) 13:25-13:50 Secure Multiplex Coding with a Common Message Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS)
(45) 13:50-14:15 A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
(46) 14:15-14:40 Dual universality of hash functions and its applications to quantum cryptography Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS)
  14:40-14:55 Break ( 15 min. )
Fri, Mar 4 PM  IT+ISEC[Joint session](B101)
Chair: IT
14:55 - 16:10
(47) 14:55-15:20 On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.)
(48) 15:20-15:45 A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks Kazuya Koyano, Hiroki Koga (Tsukuba Univ.)
(49) 15:45-16:10 Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane Yusuke Fujii, Hiroki Koga (Tsukuba Univ.)
Fri, Mar 4 AM  ISEC(A109)
Chair: ISEC
09:00 - 10:15
(50) 09:00-09:25 Efficient Privacy Amplification Algorithms for Quantum Key Distribution Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation)
(51) 09:25-09:50 New Differential Fault Analysis on Trivium Based on Setup-Time Violations Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm)
(52) 09:50-10:15 Higher Order Differential Attack on HyRAL Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
  10:15-10:25 Break ( 10 min. )
Fri, Mar 4 AM  ISEC+IT[Joint session](A109)
Chair: ISEC
10:25 - 12:05
(53) 10:25-10:50 A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics Masao Kasahara (O.G.U)
(54) 10:50-11:15 A Method of Fingerprint Authentication Using KSS(I) Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.)
(55) 11:15-11:40 Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
(56) 11:40-12:05 Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
  12:05-13:25 Lunch Break ( 80 min. )
Fri, Mar 4 PM  ISEC+IT[Joint session](A109)
Chair: ISEC
13:25 - 14:40
(57) 13:25-13:50 A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC Masao Kasahara (Osaka Gakuin Univ.)
(58) 13:50-14:15 Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC
-- Modification of K(VII)SE(1)PKC --
Masao Kasahara (Osaka Gakuin Univ.)
(59) 14:15-14:40 Proposal of Hidden Pair of Bijection Signature Scheme Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
  14:40-14:55 Break ( 15 min. )
Fri, Mar 4 PM  ISEC(A109)
Chair: ISEC
14:55 - 16:10
(60) 14:55-15:20 On the self-reducibility and the many-one-like reducibilities for multi-valued functions Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
(61) 15:20-15:45 On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo)
(62) 15:45-16:10 Symbolic Criterion for EUC Secure Authentication against Static Adversary Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.
Invited TalkEach speech will have 50 minutes for presentation and 10 minutes for discussion.

Contact Address and Latest Schedule Information
IT Technical Committee on Information Theory (IT)   [Latest Schedule]
Contact Address E--mail:it-c(to IT Secretaries)
.
Hidenori Kuwakado(Kobe University)
Hiroki Koga(University of Tsukuba) 
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E--mail: ic-c (to ISEC secretaries) 
WBS Technical Committee on Wideband System (WBS)   [Latest Schedule]
Contact Address Nobuyoshi Komuro (Chiba University)
TEL/FAX: +81-43-290-3274
E--mail: kmrfultyba-u 


Last modified: 2011-01-20 10:38:11


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan