IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IT Conf / Next IT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Theory (IT)
Chair: Jun Muramatsu (NTT) Vice Chair: Tadashi Wadayama (Nagoya Inst. of Tech.)
Secretary: Takahiro Ohta (Nagano Pref Inst. of Tech.), Hideki Yagi (UEC)
Assistant: Takahiro Yoshida (Yokohama College of Commerce)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Atsushi Fujioka (Kanagawa Univ.) Vice Chair: Shiho Moriai (NICT), Shoichi Hirose (Univ. of Fukui)
Secretary: Toshihiro Ohigashi (Tokai Univ.), Keita Emura (NICT)
Assistant: Kazunari Omote (Tsukuba Univ.), Yuuji Suga (IIJ)

===============================================
Technical Committee on Wideband System (WBS)
Chair: Minoru Okada (NAIST) Vice Chair: Koji Ohuchi (Shizuoka Univ.), Kenichi Takizawa (NICT)
Secretary: Yusuke Kozawa (Ibaraki Univ.), Akira Nakamura (Tokyo Univ. of Science)
Assistant: Ryohei Nakamura (National Defense Academy), Duong Quang Thang (NAIST)

DATE:
Thu, Mar 7, 2019 09:30 - 17:45
Fri, Mar 8, 2019 09:00 - 17:35

PLACE:
University of Electro-Communications(1-5-1 Chofugaoka, Chofu-shi, Tokyo 182-8585 Japan.Dr. Hideki Yagi. +81-42-443-5366)

TOPICS:
joint meeting of IT, ISEC, and WBS

----------------------------------------
Thu, Mar 7 AM (09:30 - 10:45)
----------------------------------------

(1) 09:30 - 09:55
Password for Prevention of Shoulder Surfing by Rear-Facing Camera
Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.)

(2) 09:55 - 10:20
Exploring Malicious URL in Dark Web Using Tor Crawler
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.)

(3) 10:20 - 10:45
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 7 AM (10:55 - 12:35)
----------------------------------------

(4) 10:55 - 11:20
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)

(5) 11:20 - 11:45
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)

(6) 11:45 - 12:10
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme
Bagus Santoso (UEC)

(7) 12:10 - 12:35
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.
Kaoru Takemure, Bagus Santoso (UEC)

----- Lunch Break ( 65 min. ) -----

----------------------------------------
Thu, Mar 7 PM (13:40 - 14:55)
----------------------------------------

(8) 13:40 - 14:05
Steganography for character strings by using deep learning
Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.)

(9) 14:05 - 14:30
Steganography for images by using deep learning
Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ)

(10) 14:30 - 14:55
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 7 PM (15:05 - 16:20)
----------------------------------------

(11) 15:05 - 15:30
String commitment with output locality
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU)

(12) 15:30 - 15:55
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University)

(13) 15:55 - 16:20
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.)

----- Break ( 35 min. ) -----

----------------------------------------
Thu, Mar 7 PM (16:55 - 17:45)
Chair: Jun Muramatsu (NTT)
----------------------------------------

(14) 16:55 - 17:45
[Invited Talk]
Deepning and evolution of Deep learning technology
Hayaru Shouno (UEC)

----------------------------------------
Thu, Mar 7 AM (09:30 - 10:45)
Chair: Shota Saito (Waseda Univ.)
----------------------------------------

(15) 09:30 - 09:55
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source
-- When the Statewise Alphabets are Unknown --
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.)

(16) 09:55 - 10:20
On Multiterminal Hypothesis Testing Problem
Yasutada Oohama (UEC)

(17) 10:20 - 10:45
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence
Ryo Nomura (Senshu Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 7 AM (10:55 - 12:10)
Chair: Ryo Nomura (Senshu Univ.)
----------------------------------------

(18) 10:55 - 11:20
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set
Mitsuharu Arimnura (Shonan Inst. Tech.)

(19) 11:20 - 11:45
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources
Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.)

(20) 11:45 - 12:10
A New Variation of Asymmetric Numeral Systems
Qi Xin, Hidetoshi Yokoo (Gunma Univ.)

----- Lunch Break ( 90 min. ) -----

----------------------------------------
Thu, Mar 7 PM (13:40 - 14:55)
----------------------------------------

(21) 13:40 - 14:05
[Encouragement Talk]
A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN
Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.)

(22) 14:05 - 14:30
[Encouragement Talk]
A Study of Signal Transmission Forms of Optical Wireless turbo Code system
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)

(23) 14:30 - 14:55
A study on dimming control scheme for visible-light communication using modified prime sequence codes
Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 7 PM (15:05 - 16:20)
Chair: Kazushi Mimura (Hiroshima City Univ.)
----------------------------------------

(24) 15:05 - 15:30
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes
Masato Tajima

(25) 15:30 - 15:55
Coded caching and a subspace based on the distribution of the number of requests
Masazumi Kurihara (UEC)

(26) 15:55 - 16:20
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels
Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)

----------------------------------------
Fri, Mar 8 AM (09:00 - 10:40)
----------------------------------------

(27) 09:00 - 09:25
History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.)

(28) 09:25 - 09:50
Authenticated Encryption Scheme Secure Against Side Channel Attack
Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba)

(29) 09:50 - 10:15
Proposal of Online Pachinko using smart contract
Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.)

(30) 10:15 - 10:40
Secure Comparisonl based on Quasi-Cyclic Code
Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 8 AM (10:50 - 12:05)
----------------------------------------

(31) 10:50 - 11:15
A Consideration of Computational Delay Time by Using MAC Implemented on CAN
Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech)

(32) 11:15 - 11:40
A document-management scheme by using Git and Blockchain methods
Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)

(33) 11:40 - 12:05
Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2)
Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba)

----- Lunch Break ( 85 min. ) -----

----------------------------------------
Fri, Mar 8 PM (13:30 - 15:10)
----------------------------------------

(34) 13:30 - 13:55
One-Time Program and Its Application to Schnorr Signature
Takashi Nishide (Univ. of Tsukuba)

(35) 13:55 - 14:20
Non-interactive Reusable Private Comparison Output from MKFHE
Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba)

(36) 14:20 - 14:45
Nonce-Based Hybrid Encryption
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.)

(37) 14:45 - 15:10
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 8 PM (15:20 - 16:35)
----------------------------------------

(38) 15:20 - 15:45
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.)

(39) 15:45 - 16:10
Verifiable Delegated Private Bit Comparison
Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.)

(40) 16:10 - 16:35
Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 8 PM (16:45 - 17:35)
----------------------------------------

(41) 16:45 - 17:35
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC)

----------------------------------------
Fri, Mar 8 AM (09:50 - 10:40)
Chair: Yutaka Jitsumatsu (Kyushu Univ.)
----------------------------------------

(42) 09:50 - 10:15
Equivalence theorem and comparison of optimal designs in qubit systems
Jun Suzuki (UEC)

(43) 10:15 - 10:40
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence
Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 8 AM (10:50 - 12:30)
Chair: Bagus Santoso (UEC)
----------------------------------------

(44) 10:50 - 11:15
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC)

(45) 11:15 - 11:40
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba)

(46) 11:40 - 12:05
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba)

(47) 12:05 - 12:30
Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Fri, Mar 8 PM (13:30 - 15:10)
----------------------------------------

(48) 13:30 - 13:55
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU)

(49) 13:55 - 14:20
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling
Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)

(50) 14:20 - 14:45
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.)

(51) 14:45 - 15:10
Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation
Tadatomo Sato (NIT, Hiroshima Coll.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 8 PM (15:20 - 16:35)
Chair: Akiko Manada (Shonan Inst. of Tech)
----------------------------------------

(52) 15:20 - 15:45
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)

(53) 15:45 - 16:10
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code
Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.)

(54) 16:10 - 16:35
Studies on Ordered Shuffled BP Decoding of LDPC Codes
-- Based on the Loops and Weight Distributions of LDPC Codes --
Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.

# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.


=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:

Thu, May 23, 2019 - Fri, May 24, 2019: Asahikawa International Conference Hall [Wed, Mar 13], Topics: Information Security, Information Theory, Information Hiding, etc.

# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Hideki Yagi (University of Electro-Communications)
Takahiro Ota (Nagano Prefectural Institute of Technology)
Takahiro Yoshida (Yokohama College of Commerce)

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, May 17, 2019: Kikai-Shinko-Kaikan Bldg. [Thu, Mar 14]

# SECRETARY:
Kazumasa Omote (University of Tsukuba)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:

Wed, May 15, 2019 - Thu, May 16, 2019: MEIJO University (Tempaku campus) [Fri, Mar 15], Topics: Coding, Modulation, Signal processing and General

# SECRETARY:
Yusuke Kozawa (Ibaraki Univ.)
E-mail: ieee


Last modified: 2020-01-17 15:55:35


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   Prev IT Conf / Next IT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan