IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 443

Information Security

Workshop Date : 2011-03-03 - 2011-03-04 / Issue Date : 2011-02-24

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2010-72
Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications)
pp. 1 - 6

ISEC2010-73
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric)
pp. 7 - 14

ISEC2010-74
Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.)
pp. 15 - 22

ISEC2010-75
A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC)
pp. 23 - 30

ISEC2010-76
[Invited Talk] Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.)
pp. 31 - 36

ISEC2010-77
[Invited Talk] Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 37 - 44

ISEC2010-78
[Invited Talk] Linear Cryptanalysis -- History and Open Problems --
Mitsuru Matsui (Mitsubishi Electric)
p. 45

ISEC2010-79
Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics
Tsutomu Matsumoto (Yokohama Nat Univ.)
pp. 47 - 48

ISEC2010-80
RFID Identification Protocol with Reduced Reader Computational Cost
Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.)
pp. 49 - 55

ISEC2010-81
Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States
Kazuho Kakiwaki, Atsuko Miyaji (JAIST)
pp. 57 - 64

ISEC2010-82
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.)
pp. 65 - 68

ISEC2010-83
Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs
Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric)
pp. 69 - 74

ISEC2010-84
Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning
Ken Enokizono, Hideki Ochiai (Yokohama National Univ.)
pp. 75 - 80

ISEC2010-85
Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System
Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.)
pp. 81 - 86

ISEC2010-86
Han-Kobayashi Rate Region for Gray-Wyner Source Coding System
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 87 - 92

ISEC2010-87
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 93 - 98

ISEC2010-88
A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property
Takuya Koyama, Ken-ichi Iwata (Univ of Fukui)
pp. 99 - 104

ISEC2010-89
A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection
Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.)
pp. 105 - 111

ISEC2010-90
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems
Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.)
pp. 113 - 118

ISEC2010-91
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.)
pp. 119 - 122

ISEC2010-92
A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel
Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.)
pp. 123 - 126

ISEC2010-93
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences
Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.)
pp. 127 - 130

ISEC2010-94
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 131 - 135

ISEC2010-95
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications
Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.)
pp. 137 - 142

ISEC2010-96
Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 143 - 150

ISEC2010-97
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.)
pp. 151 - 157

ISEC2010-98
Proposition of precomputation schemes considering memory
Taiki Sasahara, Atsuko Miyaji (JAIST)
pp. 159 - 166

ISEC2010-99
Performance Evaluations of Robust Group Key Exchange Protocols
Takashi Sato, Atsuko Miyaji (JAIST)
pp. 167 - 175

ISEC2010-100
Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.)
pp. 177 - 184

ISEC2010-101
Improved POSH scheme using hash chains among sensors
Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.)
pp. 185 - 190

ISEC2010-102
An anomaly detection method using gamma-divergence and its application to system call sequence
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.)
pp. 191 - 197

ISEC2010-103
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST)
pp. 199 - 203

ISEC2010-104
A Note on serviceability between personal certificate and server sertificate on PKI
Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST)
pp. 205 - 212

ISEC2010-105
User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.)
pp. 213 - 220

ISEC2010-106
Robust image hashing against geometric attacks using image normalization and SVD decomposition
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX)
pp. 221 - 226

ISEC2010-107
Visual Card Games for Boys and Girls
Miyuki Uno, Mikio Kano (Ibaraki Univ.)
pp. 227 - 234

ISEC2010-108
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation
Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 235 - 242

ISEC2010-109
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech)
pp. 243 - 248

ISEC2010-110
A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure -- When Both Discrete and Continuous Data are Present --
Joe Suzuki (Osaka Univ.)
pp. 249 - 254

ISEC2010-111
Error exponent for channel coding with noisy feedback and bin coding
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 255 - 262

ISEC2010-112
Rate-Splitting for Multiple Receiver Channels
Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.)
pp. 263 - 269

ISEC2010-113
Performance evaluation of MC-CDMA system which permits time and frequency offsets
Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.)
pp. 271 - 276

ISEC2010-114
Performance Evaluation of Non-binary LDPC Code with APSK Modulation
Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.)
pp. 277 - 282

ISEC2010-115
Secure Multiplex Coding with a Common Message
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS)
pp. 283 - 287

ISEC2010-116
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
pp. 289 - 294

ISEC2010-117
Dual universality of hash functions and its applications to quantum cryptography
Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS)
pp. 295 - 302

ISEC2010-118
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.)
pp. 303 - 310

ISEC2010-119
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
Kazuya Koyano, Hiroki Koga (Tsukuba Univ.)
pp. 311 - 318

ISEC2010-120
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane
Yusuke Fujii, Hiroki Koga (Tsukuba Univ.)
pp. 319 - 326

ISEC2010-121
Efficient Privacy Amplification Algorithms for Quantum Key Distribution
Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation)
pp. 327 - 332

ISEC2010-122
New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm)
pp. 333 - 339

ISEC2010-123
Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 341 - 347

ISEC2010-124
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics
Masao Kasahara (O.G.U)
pp. 349 - 352

ISEC2010-125
A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360

ISEC2010-126
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
pp. 361 - 366

ISEC2010-127
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
pp. 367 - 372

ISEC2010-128
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 373 - 376

ISEC2010-129
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC -- Modification of K(VII)SE(1)PKC --
Masao Kasahara (Osaka Gakuin Univ.)
pp. 377 - 382

ISEC2010-130
Proposal of Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 383 - 388

ISEC2010-131
On the self-reducibility and the many-one-like reducibilities for multi-valued functions
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 389 - 394

ISEC2010-132
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems
Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo)
pp. 395 - 402

ISEC2010-133
Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
pp. 403 - 410

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan