IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IT Conf / Next IT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Theory (IT)
Chair: Tomohiko Uematsu (Tokyo Inst. of Tech.) Vice Chair: Hiroshi Kamabe (Gifu Univ.)
Secretary: Hidenori Kuwakado (Kobe Univ.), Hiroki Koga (Univ. of Tsukuba)
Assistant: Masazumi Kurihara (Univ. of Electro-Comm.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Toru Fujiwara (Osaka Univ.)
Vice Chair: Naoya Torii (Fujitsu Labs.), Tsutomu Matsumoto (Yokohama National Univ.)
Secretary: Katsuyuki Takashima (Mitsubishi Electric), Toru Nakanishi (Okayama Univ.)
Assistant: Junji Shikata (Yokohama National Univ.)

===============================================
Technical Committee on Wideband System (WBS)
Chair: Makoto Itami (Tokyo Univ. of Science)
Vice Chair: Hiromasa Habuchi (Ibaraki Univ.), Yukitoshi Sanada (Keio Univ.)
Secretary: Masato Saito (Univ. of Ryukyus), Kenichi Takizawa (NICT)
Assistant: Kohei Ono (Tokyo Univ. of Science), Nobuyoshi Komuro (Chiba Univ.)

DATE:
Thu, Mar 3, 2011 10:00 - 17:25
Fri, Mar 4, 2011 09:00 - 16:10

PLACE:
Graduate School of Infomation Science and Technology, Suita Campus, Osaka University(1-5 Yamadaoka, Suita-shi, 565-0871 Japan)

TOPICS:


----------------------------------------
Thu, Mar 3 AM ISEC(A110) (10:00 - 11:40)
Chair: ISEC
----------------------------------------

(1) 10:00 - 10:25
Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications)

(2) 10:25 - 10:50
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric)

(3) 10:50 - 11:15
Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.)

(4) 11:15 - 11:40
A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Thu, Mar 3 PM Invited Talk(A110) (13:00 - 16:00)
----------------------------------------

(5) 13:00 - 14:00
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.)

(6) 14:00 - 15:00
[Invited Talk]
Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)

(7) 15:00 - 16:00
[Invited Talk]
Linear Cryptanalysis
-- History and Open Problems --
Mitsuru Matsui (Mitsubishi Electric)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 3 PM ISEC(A110) (16:10 - 17:25)
Chair: ISEC
----------------------------------------

(8) 16:10 - 16:35
Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics
Tsutomu Matsumoto (Yokohama Nat Univ.)

(9) 16:35 - 17:00
RFID Identification Protocol with Reduced Reader Computational Cost
Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.)

(10) 17:00 - 17:25
Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States
Kazuho Kakiwaki, Atsuko Miyaji (JAIST)

----------------------------------------
Thu, Mar 3 AM IT(B101) (10:00 - 11:40)
Chair: IT
----------------------------------------

(11) 10:00 - 10:25
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.)

(12) 10:25 - 10:50
Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs
Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric)

(13) 10:50 - 11:15
Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning
Ken Enokizono, Hideki Ochiai (Yokohama National Univ.)

(14) 11:15 - 11:40
Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System
Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.)

----- Lunch + Invited Talk + Break ( 270 min. ) -----

----------------------------------------
Thu, Mar 3 PM IT(B101) (16:10 - 17:25)
Chair: IT
----------------------------------------

(15) 16:10 - 16:35
Han-Kobayashi Rate Region for Gray-Wyner Source Coding System
Shigeaki Kuzuoka (Wakayama Univ.)

(16) 16:35 - 17:00
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)

(17) 17:00 - 17:25
A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property
Takuya Koyama, Ken-ichi Iwata (Univ of Fukui)

----------------------------------------
Thu, Mar 3 AM WBS(A109) (10:00 - 11:40)
----------------------------------------

(18) 10:00 - 10:25
A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection
Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.)

(19) 10:25 - 10:50
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems
Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.)

(20) 10:50 - 11:15
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.)

(21) 11:15 - 11:40
A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel
Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.)

----- Lunch + Invited Talk + Break ( 270 min. ) -----

----------------------------------------
Thu, Mar 3 PM WBS(A109) (16:10 - 17:25)
----------------------------------------

(22) 16:10 - 16:35
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences
Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.)

(23) 16:35 - 17:00
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)

(24) 17:00 - 17:25
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications
Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.)

----------------------------------------
Fri, Mar 4 AM ISEC(A110) (09:00 - 10:15)
Chair: ISEC
----------------------------------------

(25) 09:00 - 09:25
Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)

(26) 09:25 - 09:50
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.)

(27) 09:50 - 10:15
Proposition of precomputation schemes considering memory
Taiki Sasahara, Atsuko Miyaji (JAIST)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 4 AM ISEC(A110) (10:25 - 11:40)
Chair: ISEC
----------------------------------------

(28) 10:25 - 10:50
Performance Evaluations of Robust Group Key Exchange Protocols
Takashi Sato, Atsuko Miyaji (JAIST)

(29) 10:50 - 11:15
Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.)

(30) 11:15 - 11:40
Improved POSH scheme using hash chains among sensors
Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.)

----- Lunch Break ( 105 min. ) -----

----------------------------------------
Fri, Mar 4 PM ISEC(A110) (13:25 - 14:40)
Chair: ISEC
----------------------------------------

(31) 13:25 - 13:50
An anomaly detection method using gamma-divergence and its application to system call sequence
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.)

(32) 13:50 - 14:15
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST)

(33) 14:15 - 14:40
A Note on serviceability between personal certificate and server sertificate on PKI
Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Mar 4 PM ISEC(A110) (14:55 - 16:10)
Chair: ISEC
----------------------------------------

(34) 14:55 - 15:20
User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.)

(35) 15:20 - 15:45
Robust image hashing against geometric attacks using image normalization and SVD decomposition
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX)

(36) 15:45 - 16:10
Visual Card Games for Boys and Girls
Miyuki Uno, Mikio Kano (Ibaraki Univ.)

----------------------------------------
Fri, Mar 4 AM IT(B101) (09:00 - 10:15)
Chair: IT
----------------------------------------

(37) 09:00 - 09:25
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation
Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo)

(38) 09:25 - 09:50
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech)

(39) 09:50 - 10:15
A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure
-- When Both Discrete and Continuous Data are Present --
Joe Suzuki (Osaka Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 4 AM IT(B101) (10:25 - 12:05)
Chair: IT
----------------------------------------

(40) 10:25 - 10:50
Error exponent for channel coding with noisy feedback and bin coding
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)

(41) 10:50 - 11:15
Rate-Splitting for Multiple Receiver Channels
Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.)

(42) 11:15 - 11:40
Performance evaluation of MC-CDMA system which permits time and frequency offsets
Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.)

(43) 11:40 - 12:05
Performance Evaluation of Non-binary LDPC Code with APSK Modulation
Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.)

----- Lunch ( 80 min. ) -----

----------------------------------------
Fri, Mar 4 PM IT+ISEC[Joint session](B101) (13:25 - 14:40)
Chair: IT
----------------------------------------

(44) 13:25 - 13:50
Secure Multiplex Coding with a Common Message
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS)

(45) 13:50 - 14:15
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)

(46) 14:15 - 14:40
Dual universality of hash functions and its applications to quantum cryptography
Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Mar 4 PM IT+ISEC[Joint session](B101) (14:55 - 16:10)
Chair: IT
----------------------------------------

(47) 14:55 - 15:20
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.)

(48) 15:20 - 15:45
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
Kazuya Koyano, Hiroki Koga (Tsukuba Univ.)

(49) 15:45 - 16:10
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane
Yusuke Fujii, Hiroki Koga (Tsukuba Univ.)

----------------------------------------
Fri, Mar 4 AM ISEC(A109) (09:00 - 10:15)
Chair: ISEC
----------------------------------------

(50) 09:00 - 09:25
Efficient Privacy Amplification Algorithms for Quantum Key Distribution
Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation)

(51) 09:25 - 09:50
New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm)

(52) 09:50 - 10:15
Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 4 AM ISEC+IT[Joint session](A109) (10:25 - 12:05)
Chair: ISEC
----------------------------------------

(53) 10:25 - 10:50
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics
Masao Kasahara (O.G.U)

(54) 10:50 - 11:15
A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.)

(55) 11:15 - 11:40
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)

(56) 11:40 - 12:05
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Fri, Mar 4 PM ISEC+IT[Joint session](A109) (13:25 - 14:40)
Chair: ISEC
----------------------------------------

(57) 13:25 - 13:50
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC
Masao Kasahara (Osaka Gakuin Univ.)

(58) 13:50 - 14:15
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC
-- Modification of K(VII)SE(1)PKC --
Masao Kasahara (Osaka Gakuin Univ.)

(59) 14:15 - 14:40
Proposal of Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Mar 4 PM ISEC(A109) (14:55 - 16:10)
Chair: ISEC
----------------------------------------

(60) 14:55 - 15:20
On the self-reducibility and the many-one-like reducibilities for multi-valued functions
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)

(61) 15:20 - 15:45
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems
Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo)

(62) 15:45 - 16:10
Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
Invited Talk will have 50 minutes for presentation and 10 minutes for discussion.

# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.


=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:

Fri, May 20, 2011: Osaka City University [Thu, Apr 7]

# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Hidenori Kuwakado(Kobe University)
Hiroki Koga(University of Tsukuba)

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, May 13, 2011: Kikai-Shinko-Kaikan Bldg. [Tue, Mar 22]

# SECRETARY:
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:

Mon, May 9, 2011 - Tue, May 10, 2011: Okinawa Subtropical Environment Remote-Sensing Center [Thu, Mar 17], Topics: Coding, Modulation, Signal Processing and others.

# SECRETARY:
Nobuyoshi Komuro (Chiba University)
TEL/FAX: +81-43-290-3274
E-mail: kmrfultyba-u


Last modified: 2011-01-20 10:38:11


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   Prev IT Conf / Next IT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan