IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 442

Information Theory

Workshop Date : 2011-03-03 - 2011-03-04 / Issue Date : 2011-02-24

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2010-68
Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications)
pp. 1 - 6

IT2010-69
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric)
pp. 7 - 14

IT2010-70
Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.)
pp. 15 - 22

IT2010-71
A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC)
pp. 23 - 30

IT2010-72
[Invited Talk] Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.)
pp. 31 - 36

IT2010-73
[Invited Talk] Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 37 - 44

IT2010-74
[Invited Talk] Linear Cryptanalysis -- History and Open Problems --
Mitsuru Matsui (Mitsubishi Electric)
p. 45

IT2010-75
Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics
Tsutomu Matsumoto (Yokohama Nat Univ.)
pp. 47 - 48

IT2010-76
RFID Identification Protocol with Reduced Reader Computational Cost
Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.)
pp. 49 - 55

IT2010-77
Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States
Kazuho Kakiwaki, Atsuko Miyaji (JAIST)
pp. 57 - 64

IT2010-78
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.)
pp. 65 - 68

IT2010-79
Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs
Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric)
pp. 69 - 74

IT2010-80
Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning
Ken Enokizono, Hideki Ochiai (Yokohama National Univ.)
pp. 75 - 80

IT2010-81
Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System
Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.)
pp. 81 - 86

IT2010-82
Han-Kobayashi Rate Region for Gray-Wyner Source Coding System
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 87 - 92

IT2010-83
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 93 - 98

IT2010-84
A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property
Takuya Koyama, Ken-ichi Iwata (Univ of Fukui)
pp. 99 - 104

IT2010-85
A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection
Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.)
pp. 105 - 111

IT2010-86
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems
Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.)
pp. 113 - 118

IT2010-87
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.)
pp. 119 - 122

IT2010-88
A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel
Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.)
pp. 123 - 126

IT2010-89
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences
Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.)
pp. 127 - 130

IT2010-90
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 131 - 135

IT2010-91
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications
Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.)
pp. 137 - 142

IT2010-92
Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 143 - 150

IT2010-93
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.)
pp. 151 - 157

IT2010-94
Proposition of precomputation schemes considering memory
Taiki Sasahara, Atsuko Miyaji (JAIST)
pp. 159 - 166

IT2010-95
Performance Evaluations of Robust Group Key Exchange Protocols
Takashi Sato, Atsuko Miyaji (JAIST)
pp. 167 - 175

IT2010-96
Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.)
pp. 177 - 184

IT2010-97
Improved POSH scheme using hash chains among sensors
Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.)
pp. 185 - 190

IT2010-98
An anomaly detection method using gamma-divergence and its application to system call sequence
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.)
pp. 191 - 197

IT2010-99
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST)
pp. 199 - 203

IT2010-100
A Note on serviceability between personal certificate and server sertificate on PKI
Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST)
pp. 205 - 212

IT2010-101
User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.)
pp. 213 - 220

IT2010-102
Robust image hashing against geometric attacks using image normalization and SVD decomposition
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX)
pp. 221 - 226

IT2010-103
Visual Card Games for Boys and Girls
Miyuki Uno, Mikio Kano (Ibaraki Univ.)
pp. 227 - 234

IT2010-104
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation
Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 235 - 242

IT2010-105
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech)
pp. 243 - 248

IT2010-106
A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure -- When Both Discrete and Continuous Data are Present --
Joe Suzuki (Osaka Univ.)
pp. 249 - 254

IT2010-107
Error exponent for channel coding with noisy feedback and bin coding
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 255 - 262

IT2010-108
Rate-Splitting for Multiple Receiver Channels
Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.)
pp. 263 - 269

IT2010-109
Performance evaluation of MC-CDMA system which permits time and frequency offsets
Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.)
pp. 271 - 276

IT2010-110
Performance Evaluation of Non-binary LDPC Code with APSK Modulation
Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.)
pp. 277 - 282

IT2010-111
Secure Multiplex Coding with a Common Message
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS)
pp. 283 - 287

IT2010-112
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
pp. 289 - 294

IT2010-113
Dual universality of hash functions and its applications to quantum cryptography
Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS)
pp. 295 - 302

IT2010-114
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.)
pp. 303 - 310

IT2010-115
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
Kazuya Koyano, Hiroki Koga (Tsukuba Univ.)
pp. 311 - 318

IT2010-116
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane
Yusuke Fujii, Hiroki Koga (Tsukuba Univ.)
pp. 319 - 326

IT2010-117
Efficient Privacy Amplification Algorithms for Quantum Key Distribution
Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation)
pp. 327 - 332

IT2010-118
New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm)
pp. 333 - 339

IT2010-119
Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 341 - 347

IT2010-120
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics
Masao Kasahara (O.G.U)
pp. 349 - 352

IT2010-121
A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360

IT2010-122
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
pp. 361 - 366

IT2010-123
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
pp. 367 - 372

IT2010-124
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 373 - 376

IT2010-125
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC -- Modification of K(VII)SE(1)PKC --
Masao Kasahara (Osaka Gakuin Univ.)
pp. 377 - 382

IT2010-126
Proposal of Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 383 - 388

IT2010-127
On the self-reducibility and the many-one-like reducibilities for multi-valued functions
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 389 - 394

IT2010-128
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems
Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo)
pp. 395 - 402

IT2010-129
Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
pp. 403 - 410

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan