Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-07 13:40 |
Tokyo |
University of Electro-Communications |
[Encouragement Talk]
A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.) IT2018-95 ISEC2018-101 WBS2018-96 |
When we estimate a location of a rover by using the Global Positioning Systems (GPS) indoors, it may be impossible to do... [more] |
IT2018-95 ISEC2018-101 WBS2018-96 pp.121-126 |
IT, ISEC, WBS |
2019-03-07 14:05 |
Tokyo |
University of Electro-Communications |
[Encouragement Talk]
A Study of Signal Transmission Forms of Optical Wireless turbo Code system Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) IT2018-96 ISEC2018-102 WBS2018-97 |
For improving the reliability of optical wireless communications, the implementations of error correcting codes are inve... [more] |
IT2018-96 ISEC2018-102 WBS2018-97 pp.127-130 |
IT, ISEC, WBS |
2019-03-07 14:30 |
Tokyo |
University of Electro-Communications |
A study on dimming control scheme for visible-light communication using modified prime sequence codes Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2018-97 ISEC2018-103 WBS2018-98 |
Synchronous optical code-division multiplexing (CDM) incorporated with an adequate interference canceller is suitable to... [more] |
IT2018-97 ISEC2018-103 WBS2018-98 pp.131-136 |
IT, ISEC, WBS |
2019-03-07 15:05 |
Tokyo |
University of Electro-Communications |
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes Masato Tajima IT2018-98 ISEC2018-104 WBS2018-99 |
In the previous paper, by comparing with the results in the linear filtering theory, we have introduced the notion of in... [more] |
IT2018-98 ISEC2018-104 WBS2018-99 pp.137-142 |
IT, ISEC, WBS |
2019-03-07 15:30 |
Tokyo |
University of Electro-Communications |
Coded caching and a subspace based on the distribution of the number of requests Masazumi Kurihara (UEC) IT2018-99 ISEC2018-105 WBS2018-100 |
[more] |
IT2018-99 ISEC2018-105 WBS2018-100 pp.143-148 |
IT, ISEC, WBS |
2019-03-07 15:55 |
Tokyo |
University of Electro-Communications |
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC) IT2018-100 ISEC2018-106 WBS2018-101 |
[more] |
IT2018-100 ISEC2018-106 WBS2018-101 pp.149-154 |
IT, ISEC, WBS |
2019-03-08 09:00 |
Tokyo |
University of Electro-Communications |
History-Free Sequential Aggregate MAC without Pseudorandom Permutation Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102 |
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] |
IT2018-101 ISEC2018-107 WBS2018-102 pp.155-162 |
IT, ISEC, WBS |
2019-03-08 09:25 |
Tokyo |
University of Electro-Communications |
Authenticated Encryption Scheme Secure Against Side Channel Attack Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba) IT2018-102 ISEC2018-108 WBS2018-103 |
In 2018, Guo, Pereira, Peters and Standaert formalized the security requirements for authenticated encryption with assoc... [more] |
IT2018-102 ISEC2018-108 WBS2018-103 pp.163-167 |
IT, ISEC, WBS |
2019-03-08 09:50 |
Tokyo |
University of Electro-Communications |
Proposal of Online Pachinko using smart contract Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.) IT2018-103 ISEC2018-109 WBS2018-104 |
Smart Contract is a mechanism that defines transaction contents based on a contract in a program and automatically check... [more] |
IT2018-103 ISEC2018-109 WBS2018-104 pp.169-174 |
IT, ISEC, WBS |
2019-03-08 10:15 |
Tokyo |
University of Electro-Communications |
Secure Comparisonl based on Quasi-Cyclic Code Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) IT2018-104 ISEC2018-110 WBS2018-105 |
If practical quantum computers are realized, it is known that most of cryptosystems based on number theory will be broke... [more] |
IT2018-104 ISEC2018-110 WBS2018-105 pp.175-180 |
IT, ISEC, WBS |
2019-03-08 10:50 |
Tokyo |
University of Electro-Communications |
A Consideration of Computational Delay Time by Using MAC Implemented on CAN Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech) IT2018-105 ISEC2018-111 WBS2018-106 |
CAN(Controller Area Network) is widely used as the vehicle network, however, CAN have no security system. In this manusc... [more] |
IT2018-105 ISEC2018-111 WBS2018-106 pp.181-186 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A document-management scheme by using Git and Blockchain methods Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) IT2018-106 ISEC2018-112 WBS2018-107 |
[more] |
IT2018-106 ISEC2018-112 WBS2018-107 pp.187-191 |
IT, ISEC, WBS |
2019-03-08 11:40 |
Tokyo |
University of Electro-Communications |
Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2) Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba) IT2018-107 ISEC2018-113 WBS2018-108 |
The issue of cryptocurrency exchanges gains prominent attention by the incidents that a large amount of NEM is leaked fr... [more] |
IT2018-107 ISEC2018-113 WBS2018-108 pp.193-200 |
IT, ISEC, WBS |
2019-03-08 13:30 |
Tokyo |
University of Electro-Communications |
One-Time Program and Its Application to Schnorr Signature Takashi Nishide (Univ. of Tsukuba) IT2018-108 ISEC2018-114 WBS2018-109 |
One-time programs (OTPs) are programs that can be executed only once. Goldwasser et al. constructed
OTPs by relying on ... [more] |
IT2018-108 ISEC2018-114 WBS2018-109 pp.201-208 |
IT, ISEC, WBS |
2019-03-08 13:55 |
Tokyo |
University of Electro-Communications |
Non-interactive Reusable Private Comparison Output from MKFHE Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba) IT2018-109 ISEC2018-115 WBS2018-110 |
(To be available after the conference date) [more] |
IT2018-109 ISEC2018-115 WBS2018-110 pp.209-214 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
Nonce-Based Hybrid Encryption Atsumu Mishima, Takashi Nishide (Tsukuba Univ.) IT2018-110 ISEC2018-116 WBS2018-111 |
Nonce-based cryptography can eliminate the vulnerability caused by bad randomness.
Nonce-based symmetric-key cryptograp... [more] |
IT2018-110 ISEC2018-116 WBS2018-111 pp.215-222 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112 |
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more] |
IT2018-111 ISEC2018-117 WBS2018-112 pp.223-228 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
IT, ISEC, WBS |
2019-03-08 15:45 |
Tokyo |
University of Electro-Communications |
Verifiable Delegated Private Bit Comparison Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.) IT2018-113 ISEC2018-119 WBS2018-114 |
(To be available after the conference date) [more] |
IT2018-113 ISEC2018-119 WBS2018-114 pp.235-242 |
IT, ISEC, WBS |
2019-03-08 16:10 |
Tokyo |
University of Electro-Communications |
Non-interactive Proof Systems for Group-Dependent Bundled Languages Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115 |
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more] |
IT2018-114 ISEC2018-120 WBS2018-115 pp.243-248 |