IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Atsushi Fujioka (Kanagawa Univ.)
Vice Chair Shiho Moriai (NICT), Shoichi Hirose (Univ. of Fukui)
Secretary Toshihiro Ohigashi (Tokai Univ.), Keita Emura (NICT)
Assistant Kazunari Omote (Tsukuba Univ.), Yuuji Suga (IIJ)

Technical Committee on Information Theory (IT) [schedule] [select]
Chair Jun Muramatsu (NTT)
Vice Chair Tadashi Wadayama (Nagoya Inst. of Tech.)
Secretary Takahiro Ohta (Nagano Pref Inst. of Tech.), Hideki Yagi (UEC)
Assistant Takahiro Yoshida (Yokohama College of Commerce)

Technical Committee on Wideband System (WBS) [schedule] [select]
Chair Minoru Okada (NAIST)
Vice Chair Koji Ohuchi (Shizuoka Univ.), Kenichi Takizawa (NICT)
Secretary Yusuke Kozawa (Ibaraki Univ.), Akira Nakamura (Tokyo Univ. of Science)
Assistant Ryohei Nakamura (National Defense Academy), Duong Quang Thang (NAIST)

Conference Date Thu, Mar 7, 2019 09:30 - 17:45
Fri, Mar 8, 2019 09:00 - 17:35
Topics joint meeting of IT, ISEC, and WBS 
Conference Place University of Electro-Communications 
Address 1-5-1 Chofugaoka, Chofu-shi, Tokyo 182-8585 Japan.
Contact
Person
Dr. Hideki Yagi
+81-42-443-5366
Sponsors This conference is co-sponsored by IEEE IT Society Japan Chapter.
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on IT, ISEC.

Thu, Mar 7 AM 
09:30 - 10:45
(1) 09:30-09:55 Password for Prevention of Shoulder Surfing by Rear-Facing Camera Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.)
(2) 09:55-10:20 Exploring Malicious URL in Dark Web Using Tor Crawler Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.)
(3) 10:20-10:45 Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research)
  10:45-10:55 Break ( 10 min. )
Thu, Mar 7 AM 
10:55 - 12:35
(4) 10:55-11:20 An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
(5) 11:20-11:45 A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2 Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
(6) 11:45-12:10 A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme Bagus Santoso (UEC)
(7) 12:10-12:35 Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings. Kaoru Takemure, Bagus Santoso (UEC)
  12:35-13:40 Lunch Break ( 65 min. )
Thu, Mar 7 PM 
13:40 - 14:55
(8) 13:40-14:05 Steganography for character strings by using deep learning Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.)
(9) 14:05-14:30 Steganography for images by using deep learning Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ)
(10) 14:30-14:55 A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.)
  14:55-15:05 Break ( 10 min. )
Thu, Mar 7 PM 
15:05 - 16:20
(11) 15:05-15:30 String commitment with output locality Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU)
(12) 15:30-15:55 Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University)
(13) 15:55-16:20 Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.)
  16:20-16:55 Break ( 35 min. )
Thu, Mar 7 PM 
Chair: Jun Muramatsu (NTT)
16:55 - 17:45
(14) 16:55-17:45 [Invited Talk]
Deepning and evolution of Deep learning technology
Hayaru Shouno (UEC)
Thu, Mar 7 AM 
Chair: Shota Saito (Waseda Univ.)
09:30 - 10:45
(15) 09:30-09:55 Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source
-- When the Statewise Alphabets are Unknown --
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.)
(16) 09:55-10:20 On Multiterminal Hypothesis Testing Problem Yasutada Oohama (UEC)
(17) 10:20-10:45 Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence Ryo Nomura (Senshu Univ.)
  10:45-10:55 Break ( 10 min. )
Thu, Mar 7 AM 
Chair: Ryo Nomura (Senshu Univ.)
10:55 - 12:10
(18) 10:55-11:20 A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set Mitsuharu Arimnura (Shonan Inst. Tech.)
(19) 11:20-11:45 Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.)
(20) 11:45-12:10 A New Variation of Asymmetric Numeral Systems Qi Xin, Hidetoshi Yokoo (Gunma Univ.)
  12:10-13:40 Lunch Break ( 90 min. )
Thu, Mar 7 PM 
13:40 - 14:55
(21) 13:40-14:05 [Encouragement Talk]
A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN
Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.)
(22) 14:05-14:30 [Encouragement Talk]
A Study of Signal Transmission Forms of Optical Wireless turbo Code system
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
(23) 14:30-14:55 A study on dimming control scheme for visible-light communication using modified prime sequence codes Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)
  14:55-15:05 Break ( 10 min. )
Thu, Mar 7 PM 
Chair: Kazushi Mimura (Hiroshima City Univ.)
15:05 - 16:20
(24) 15:05-15:30 Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes Masato Tajima
(25) 15:30-15:55 Coded caching and a subspace based on the distribution of the number of requests Masazumi Kurihara (UEC)
(26) 15:55-16:20 Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
Fri, Mar 8 AM 
09:00 - 10:40
(27) 09:00-09:25 History-Free Sequential Aggregate MAC without Pseudorandom Permutation Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.)
(28) 09:25-09:50 Authenticated Encryption Scheme Secure Against Side Channel Attack Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba)
(29) 09:50-10:15 Proposal of Online Pachinko using smart contract Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.)
(30) 10:15-10:40 Secure Comparisonl based on Quasi-Cyclic Code Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
  10:40-10:50 Break ( 10 min. )
Fri, Mar 8 AM 
10:50 - 12:05
(31) 10:50-11:15 A Consideration of Computational Delay Time by Using MAC Implemented on CAN Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech)
(32) 11:15-11:40 A document-management scheme by using Git and Blockchain methods Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
(33) 11:40-12:05 Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2) Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba)
  12:05-13:30 Lunch Break ( 85 min. )
Fri, Mar 8 PM 
13:30 - 15:10
(34) 13:30-13:55 One-Time Program and Its Application to Schnorr Signature Takashi Nishide (Univ. of Tsukuba)
(35) 13:55-14:20 Non-interactive Reusable Private Comparison Output from MKFHE Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba)
(36) 14:20-14:45 Nonce-Based Hybrid Encryption Atsumu Mishima, Takashi Nishide (Tsukuba Univ.)
(37) 14:45-15:10 A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC)
  15:10-15:20 Break ( 10 min. )
Fri, Mar 8 PM 
15:20 - 16:35
(38) 15:20-15:45 Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.)
(39) 15:45-16:10 Verifiable Delegated Private Bit Comparison Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.)
(40) 16:10-16:35 Non-interactive Proof Systems for Group-Dependent Bundled Languages Hiroaki Anada (Univ. of Nagasaki)
  16:35-16:45 Break ( 10 min. )
Fri, Mar 8 PM 
16:45 - 17:35
(41) 16:45-17:35 [Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC)
Fri, Mar 8 AM 
Chair: Yutaka Jitsumatsu (Kyushu Univ.)
09:50 - 10:40
(42) 09:50-10:15 Equivalence theorem and comparison of optimal designs in qubit systems Jun Suzuki (UEC)
(43) 10:15-10:40 Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.)
  10:40-10:50 Break ( 10 min. )
Fri, Mar 8 AM 
Chair: Bagus Santoso (UEC)
10:50 - 12:30
(44) 10:50-11:15 The distribution of the conditional information leakage in binary symmetric erasure wiretap channels Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC)
(45) 11:15-11:40 A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack Tatsuya Sekine, Hiroki Koga (U. Tsukuba)
(46) 11:40-12:05 On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants Takashi Hisatome, Hiroki Koga (U. Tsukuba)
(47) 12:05-12:30 Secret Sharing on Evolving Multi-level Access Structure Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)
  12:30-13:30 Lunch Break ( 60 min. )
Fri, Mar 8 PM 
13:30 - 15:10
(48) 13:30-13:55 Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU)
(49) 13:55-14:20 Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
(50) 14:20-14:45 On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.)
(51) 14:45-15:10 Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation Tadatomo Sato (NIT, Hiroshima Coll.)
  15:10-15:20 Break ( 10 min. )
Fri, Mar 8 PM 
Chair: Akiko Manada (Shonan Inst. of Tech)
15:20 - 16:35
(52) 15:20-15:45 Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
(53) 15:45-16:10 Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.)
(54) 16:10-16:35 Studies on Ordered Shuffled BP Decoding of LDPC Codes
-- Based on the Loops and Weight Distributions of LDPC Codes --
Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Kazumasa Omote (University of Tsukuba)
E--mail: ic-c (to ISEC secretaries) 
IT Technical Committee on Information Theory (IT)   [Latest Schedule]
Contact Address E--mail:it-c(to IT Secretaries)
.
Hideki Yagi (University of Electro-Communications)
Takahiro Ota (Nagano Prefectural Institute of Technology)
Takahiro Yoshida (Yokohama College of Commerce) 
WBS Technical Committee on Wideband System (WBS)   [Latest Schedule]
Contact Address Yusuke Kozawa (Ibaraki Univ.)
E--mail: ieee 


Last modified: 2020-01-17 15:55:35


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan