IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 117, Number 488

Information Security

Workshop Date : 2018-03-08 - 2018-03-09 / Issue Date : 2018-03-01

[PREV] [NEXT]

[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2017-91
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 1 - 6

ISEC2017-92
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.)
pp. 7 - 12

ISEC2017-93
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior -- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC)
pp. 13 - 18

ISEC2017-94
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.)
pp. 19 - 24

ISEC2017-95
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech)
pp. 25 - 30

ISEC2017-96
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba)
pp. 31 - 36

ISEC2017-97
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba)
pp. 37 - 42

ISEC2017-98
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech)
pp. 43 - 48

ISEC2017-99
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
pp. 49 - 54

ISEC2017-100
Optimal Coded Caching using Linear Programming
Shota Kamiya, Hiroki Koga (Univ. Tsukuba)
pp. 55 - 60

ISEC2017-101
Shifted Coded Slotted ALOHA
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 61 - 66

ISEC2017-102
[Invited Talk] On Traitor Tracings and Related Topics
Shota Yamada (AIST)
p. 67

ISEC2017-103
[Invited Talk] Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK)
p. 69

ISEC2017-104
[Invited Talk] On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute)
p. 71

ISEC2017-105
Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 73 - 79

ISEC2017-106
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC)
pp. 81 - 88

ISEC2017-107
Succinct Oblivious RAM
Taku Onodera, Tetsuo Shibuya (IMSUT)
pp. 89 - 96

ISEC2017-108
High Efficient Scalar Multiplication in Elliptic Curve Cryptography
Noboru Takeuchi, Toshiyuki Kinoshita (TUT)
pp. 97 - 101

ISEC2017-109
Digital watermark using deep-learning classification
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 103 - 106

ISEC2017-110
Evaluation of deep learning method for detection of intrusion packets
Tomoki Ueno, Mitiko Harayama (GIFU Univ)
pp. 107 - 113

ISEC2017-111
Reply analysis between Twitter users using machine learning -- Distinguish real-life/online friends --
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU)
pp. 115 - 119

ISEC2017-112
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.)
pp. 121 - 128

ISEC2017-113
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 129 - 135

ISEC2017-114
A study on segmented deletion error correction using polar code
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech)
pp. 137 - 141

ISEC2017-115
Bayes Optimal AMP Decoder for Sparse Superposition Codes
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 143 - 148

ISEC2017-116
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code
Ryoma Sakai, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154

ISEC2017-117
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.)
pp. 155 - 160

ISEC2017-118
Non-binary codes correcting a burst of deletions or insertions
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 161 - 166

ISEC2017-119
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.)
pp. 167 - 172

ISEC2017-120
Consideration of error correction code suitable for WBAN
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications)
pp. 173 - 177

ISEC2017-121
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures
Yuta Sakai (Univ. Fukui)
pp. 179 - 184

ISEC2017-122
Parameter orthogonalization method in quantum parameter estimation problem
Jun Suzuki (UEC)
pp. 185 - 190

ISEC2017-123
Improved Lossless Compression by Substring Enumeration Using Sorting
Takahiro Ota (NPIT), Akiko Manada (UEC)
pp. 191 - 196

ISEC2017-124
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm
Hideki Yoshikawa (Tohoku Gakuin Univ.)
pp. 197 - 200

ISEC2017-125
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2 -- Sparse Modeling --
Osamu Hirota (Tamagawa Univ.)
pp. 201 - 206

ISEC2017-126
Attacks on several Multivariate PKCs -- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.)
pp. 207 - 212

ISEC2017-127
A Note on Security Notions of Anonymity in Identity-Based Encryption -- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 213 - 218

ISEC2017-128
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 219 - 223

ISEC2017-129
On (Un)Deniability of Plausible Deniability
Atsushi Waseda, Ryo Nojima (NICT)
pp. 225 - 230

ISEC2017-130
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.)
pp. 231 - 236

ISEC2017-131
On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC)
pp. 237 - 243

ISEC2017-132
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.)
pp. 245 - 251

ISEC2017-133
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas -- for High Performance Error-Control Coding --
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS)
pp. 253 - 258

ISEC2017-134
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 259 - 264

ISEC2017-135
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.)
pp. 265 - 270

ISEC2017-136
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT)
pp. 271 - 273

ISEC2017-137
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 275 - 280

ISEC2017-138
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 281 - 286

ISEC2017-139
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 287 - 292

ISEC2017-140
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.)
pp. 293 - 297

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan