Thu, Mar 3 AM ISEC(A110) Chair: ISEC 10:00 - 11:40 |
(1) |
10:00-10:25 |
Efficient Searchable Encryption Schemes Against Frequency Analysis |
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) |
(2) |
10:25-10:50 |
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication |
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric) |
(3) |
10:50-11:15 |
Attribute-Based Encryption with Traceability and Revocability |
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) |
(4) |
11:15-11:40 |
A Study on Forward Secure Leakage Resilient Signature Schemes |
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) |
|
11:40-13:00 |
Lunch Break ( 80 min. ) |
Thu, Mar 3 PM Invited Talk(A110) 13:00 - 16:00 |
(5) |
13:00-14:00 |
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation |
Hideichi Sasaoka (Doshisha Univ.) |
(6) |
14:00-15:00 |
[Invited Talk]
Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences |
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) |
(7) |
15:00-16:00 |
[Invited Talk]
Linear Cryptanalysis
-- History and Open Problems -- |
Mitsuru Matsui (Mitsubishi Electric) |
|
16:00-16:10 |
Break ( 10 min. ) |
Thu, Mar 3 PM ISEC(A110) Chair: ISEC 16:10 - 17:25 |
(8) |
16:10-16:35 |
Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics |
Tsutomu Matsumoto (Yokohama Nat Univ.) |
(9) |
16:35-17:00 |
RFID Identification Protocol with Reduced Reader Computational Cost |
Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.) |
(10) |
17:00-17:25 |
Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States |
Kazuho Kakiwaki, Atsuko Miyaji (JAIST) |
Thu, Mar 3 AM IT(B101) Chair: IT 10:00 - 11:40 |
(11) |
10:00-10:25 |
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.) |
(12) |
10:25-10:50 |
Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs |
Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric) |
(13) |
10:50-11:15 |
Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning |
Ken Enokizono, Hideki Ochiai (Yokohama National Univ.) |
(14) |
11:15-11:40 |
Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System |
Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.) |
|
11:40-16:10 |
Lunch + Invited Talk + Break ( 270 min. ) |
Thu, Mar 3 PM IT(B101) Chair: IT 16:10 - 17:25 |
(15) |
16:10-16:35 |
Han-Kobayashi Rate Region for Gray-Wyner Source Coding System |
Shigeaki Kuzuoka (Wakayama Univ.) |
(16) |
16:35-17:00 |
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding |
Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui) |
(17) |
17:00-17:25 |
A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property |
Takuya Koyama, Ken-ichi Iwata (Univ of Fukui) |
Thu, Mar 3 AM WBS(A109) 10:00 - 11:40 |
(18) |
10:00-10:25 |
A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection |
Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.) |
(19) |
10:25-10:50 |
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems |
Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.) |
(20) |
10:50-11:15 |
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network |
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.) |
(21) |
11:15-11:40 |
A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel |
Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.) |
|
11:40-16:10 |
Lunch + Invited Talk + Break ( 270 min. ) |
Thu, Mar 3 PM WBS(A109) 16:10 - 17:25 |
(22) |
16:10-16:35 |
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences |
Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.) |
(23) |
16:35-17:00 |
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications |
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(24) |
17:00-17:25 |
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications |
Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.) |
Fri, Mar 4 AM ISEC(A110) Chair: ISEC 09:00 - 10:15 |
(25) |
09:00-09:25 |
Construction of non-hyperelliptic coverings for elliptic curves on extension fields |
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) |
(26) |
09:25-09:50 |
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform |
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) |
(27) |
09:50-10:15 |
Proposition of precomputation schemes considering memory |
Taiki Sasahara, Atsuko Miyaji (JAIST) |
|
10:15-10:25 |
Break ( 10 min. ) |
Fri, Mar 4 AM ISEC(A110) Chair: ISEC 10:25 - 11:40 |
(28) |
10:25-10:50 |
Performance Evaluations of Robust Group Key Exchange Protocols |
Takashi Sato, Atsuko Miyaji (JAIST) |
(29) |
10:50-11:15 |
Verification Points of Security Against a Passive Attack for Key Exchange Protocols |
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) |
(30) |
11:15-11:40 |
Improved POSH scheme using hash chains among sensors |
Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.) |
|
11:40-13:25 |
Lunch Break ( 105 min. ) |
Fri, Mar 4 PM ISEC(A110) Chair: ISEC 13:25 - 14:40 |
(31) |
13:25-13:50 |
An anomaly detection method using gamma-divergence and its application to system call sequence |
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.) |
(32) |
13:50-14:15 |
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback |
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) |
(33) |
14:15-14:40 |
A Note on serviceability between personal certificate and server sertificate on PKI |
Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST) |
|
14:40-14:55 |
Break ( 15 min. ) |
Fri, Mar 4 PM ISEC(A110) Chair: ISEC 14:55 - 16:10 |
(34) |
14:55-15:20 |
User Authentication Using Neural Network Based on Keystroke Characteristics |
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) |
(35) |
15:20-15:45 |
Robust image hashing against geometric attacks using image normalization and SVD decomposition |
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX) |
(36) |
15:45-16:10 |
Visual Card Games for Boys and Girls |
Miyuki Uno, Mikio Kano (Ibaraki Univ.) |
Fri, Mar 4 AM IT(B101) Chair: IT 09:00 - 10:15 |
(37) |
09:00-09:25 |
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation |
Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo) |
(38) |
09:25-09:50 |
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring |
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech) |
(39) |
09:50-10:15 |
A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure
-- When Both Discrete and Continuous Data are Present -- |
Joe Suzuki (Osaka Univ.) |
|
10:15-10:25 |
Break ( 10 min. ) |
Fri, Mar 4 AM IT(B101) Chair: IT 10:25 - 12:05 |
(40) |
10:25-10:50 |
Error exponent for channel coding with noisy feedback and bin coding |
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo) |
(41) |
10:50-11:15 |
Rate-Splitting for Multiple Receiver Channels |
Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.) |
(42) |
11:15-11:40 |
Performance evaluation of MC-CDMA system which permits time and frequency offsets |
Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.) |
(43) |
11:40-12:05 |
Performance Evaluation of Non-binary LDPC Code with APSK Modulation |
Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.) |
|
12:05-13:25 |
Lunch ( 80 min. ) |
Fri, Mar 4 PM IT+ISEC[Joint session](B101) Chair: IT 13:25 - 14:40 |
(44) |
13:25-13:50 |
Secure Multiplex Coding with a Common Message |
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS) |
(45) |
13:50-14:15 |
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers |
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) |
(46) |
14:15-14:40 |
Dual universality of hash functions and its applications to quantum cryptography |
Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS) |
|
14:40-14:55 |
Break ( 15 min. ) |
Fri, Mar 4 PM IT+ISEC[Joint session](B101) Chair: IT 14:55 - 16:10 |
(47) |
14:55-15:20 |
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage |
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.) |
(48) |
15:20-15:45 |
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks |
Kazuya Koyano, Hiroki Koga (Tsukuba Univ.) |
(49) |
15:45-16:10 |
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane |
Yusuke Fujii, Hiroki Koga (Tsukuba Univ.) |
Fri, Mar 4 AM ISEC(A109) Chair: ISEC 09:00 - 10:15 |
(50) |
09:00-09:25 |
Efficient Privacy Amplification Algorithms for Quantum Key Distribution |
Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation) |
(51) |
09:25-09:50 |
New Differential Fault Analysis on Trivium Based on Setup-Time Violations |
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) |
(52) |
09:50-10:15 |
Higher Order Differential Attack on HyRAL |
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) |
|
10:15-10:25 |
Break ( 10 min. ) |
Fri, Mar 4 AM ISEC+IT[Joint session](A109) Chair: ISEC 10:25 - 12:05 |
(53) |
10:25-10:50 |
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics |
Masao Kasahara (O.G.U) |
(54) |
10:50-11:15 |
A Method of Fingerprint Authentication Using KSS(I) |
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
(55) |
11:15-11:40 |
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse |
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) |
(56) |
11:40-12:05 |
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter |
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
Fri, Mar 4 PM ISEC+IT[Joint session](A109) Chair: ISEC 13:25 - 14:40 |
(57) |
13:25-13:50 |
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC |
Masao Kasahara (Osaka Gakuin Univ.) |
(58) |
13:50-14:15 |
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC
-- Modification of K(VII)SE(1)PKC -- |
Masao Kasahara (Osaka Gakuin Univ.) |
(59) |
14:15-14:40 |
Proposal of Hidden Pair of Bijection Signature Scheme |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Fri, Mar 4 PM ISEC(A109) Chair: ISEC 14:55 - 16:10 |
(60) |
14:55-15:20 |
On the self-reducibility and the many-one-like reducibilities for multi-valued functions |
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) |
(61) |
15:20-15:45 |
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems |
Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo) |
(62) |
15:45-16:10 |
Symbolic Criterion for EUC Secure Authentication against Static Adversary |
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |