IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 118, Number 478

Information Security

Workshop Date : 2019-03-07 - 2019-03-08 / Issue Date : 2019-02-28

[PREV] [NEXT]

[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2018-81
Password for Prevention of Shoulder Surfing by Rear-Facing Camera
Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.)
pp. 1 - 6

ISEC2018-82
Exploring Malicious URL in Dark Web Using Tor Crawler
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.)
pp. 7 - 12

ISEC2018-83
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research)
pp. 13 - 19

ISEC2018-84
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 21 - 26

ISEC2018-85
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 27 - 32

ISEC2018-86
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme
Bagus Santoso (UEC)
pp. 33 - 38

ISEC2018-87
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.
Kaoru Takemure, Bagus Santoso (UEC)
pp. 39 - 44

ISEC2018-88
Steganography for character strings by using deep learning
Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.)
pp. 45 - 49

ISEC2018-89
Steganography for images by using deep learning
Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ)
pp. 51 - 55

ISEC2018-90
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.)
pp. 57 - 64

ISEC2018-91
String commitment with output locality
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU)
pp. 65 - 70

ISEC2018-92
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University)
pp. 71 - 76

ISEC2018-93
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.)
pp. 77 - 82

ISEC2018-94
[Invited Talk] Deepning and evolution of Deep learning technology
Hayaru Shouno (UEC)
p. 83

ISEC2018-95
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source -- When the Statewise Alphabets are Unknown --
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.)
pp. 85 - 90

ISEC2018-96
On Multiterminal Hypothesis Testing Problem
Yasutada Oohama (UEC)
pp. 91 - 96

ISEC2018-97
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence
Ryo Nomura (Senshu Univ.)
pp. 97 - 102

ISEC2018-98
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set
Mitsuharu Arimnura (Shonan Inst. Tech.)
pp. 103 - 108

ISEC2018-99
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources
Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.)
pp. 109 - 114

ISEC2018-100
A New Variation of Asymmetric Numeral Systems
Qi Xin, Hidetoshi Yokoo (Gunma Univ.)
pp. 115 - 120

ISEC2018-101
[Encouragement Talk] A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN
Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.)
pp. 121 - 126

ISEC2018-102
[Encouragement Talk] A Study of Signal Transmission Forms of Optical Wireless turbo Code system
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 127 - 130

ISEC2018-103
A study on dimming control scheme for visible-light communication using modified prime sequence codes
Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)
pp. 131 - 136

ISEC2018-104
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes
Masato Tajima
pp. 137 - 142

ISEC2018-105
Coded caching and a subspace based on the distribution of the number of requests
Masazumi Kurihara (UEC)
pp. 143 - 148

ISEC2018-106
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels
Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154

ISEC2018-107
History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.)
pp. 155 - 162

ISEC2018-108
Authenticated Encryption Scheme Secure Against Side Channel Attack
Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba)
pp. 163 - 167

ISEC2018-109
Proposal of Online Pachinko using smart contract
Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.)
pp. 169 - 174

ISEC2018-110
Secure Comparisonl based on Quasi-Cyclic Code
Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
pp. 175 - 180

ISEC2018-111
A Consideration of Computational Delay Time by Using MAC Implemented on CAN
Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech)
pp. 181 - 186

ISEC2018-112
A document-management scheme by using Git and Blockchain methods
Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 187 - 191

ISEC2018-113
Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2)
Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba)
pp. 193 - 200

ISEC2018-114
One-Time Program and Its Application to Schnorr Signature
Takashi Nishide (Univ. of Tsukuba)
pp. 201 - 208

ISEC2018-115
Non-interactive Reusable Private Comparison Output from MKFHE
Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba)
pp. 209 - 214

ISEC2018-116
Nonce-Based Hybrid Encryption
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.)
pp. 215 - 222

ISEC2018-117
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 223 - 228

ISEC2018-118
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.)
pp. 229 - 234

ISEC2018-119
Verifiable Delegated Private Bit Comparison
Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.)
pp. 235 - 242

ISEC2018-120
Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki)
pp. 243 - 248

ISEC2018-121
[Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC)
p. 249

ISEC2018-122
Equivalence theorem and comparison of optimal designs in qubit systems
Jun Suzuki (UEC)
pp. 251 - 256

ISEC2018-123
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence
Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.)
pp. 257 - 262

ISEC2018-124
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC)
pp. 263 - 268

ISEC2018-125
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba)
pp. 269 - 274

ISEC2018-126
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants
Takashi Hisatome, Hiroki Koga (U. Tsukuba)
pp. 275 - 280

ISEC2018-127
Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)
pp. 281 - 284

ISEC2018-128
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU)
pp. 285 - 290

ISEC2018-129
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling
Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 291 - 296

ISEC2018-130
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.)
pp. 297 - 302

ISEC2018-131
Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation
Tadatomo Sato (NIT, Hiroshima Coll.)
pp. 303 - 306

ISEC2018-132
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 307 - 312

ISEC2018-133
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code
Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.)
pp. 313 - 318

ISEC2018-134
Studies on Ordered Shuffled BP Decoding of LDPC Codes -- Based on the Loops and Weight Distributions of LDPC Codes --
Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC)
pp. 319 - 324

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan