IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 122, Number 430

Reliable Communication and Control

Workshop Date : 2023-03-14 - 2023-03-15 / Issue Date : 2023-03-07

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

RCC2022-65
Improvement of the meteor burst channel model and comparison with results of the experiment in Indonesia
Hiroto Iwasaki, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.)
pp. 1 - 6

RCC2022-66
A Study on Application of Multi-Receiver System in Meteor Burst Communication
Takumi Kayama, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.)
pp. 7 - 12

RCC2022-67
A Proposal of Visible Light Communication System using Image Classifier based on Imaginary Images
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.)
pp. 13 - 18

RCC2022-68
[Invited Talk] Information-Theoretic Analyses for Two Problems Taking Security into Consideration -- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem --
Shota Saito (Gunma Univ.)
pp. 19 - 24

RCC2022-69
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication -- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication --
Masaaki Shirase (FUN)
pp. 25 - 32

RCC2022-70
Security Anslysis of binary elliptic curve GLS254
Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.)
pp. 33 - 40

RCC2022-71
Full key recovery of RSA secret key from noisy binary GCD operation sequences
Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba)
pp. 41 - 48

RCC2022-72
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field
Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ)
pp. 49 - 53

RCC2022-73
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field
Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU)
pp. 54 - 60

RCC2022-74
An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography
Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech)
pp. 61 - 67

RCC2022-75
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields
Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech)
pp. 68 - 73

RCC2022-76
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ)
pp. 74 - 79

RCC2022-77
An information-spectrum approach to entanglement purification and distillation
Motoki Achiwa, Tomohiro Ogawa (UEC)
pp. 80 - 85

RCC2022-78
On Reward Distribution in Reinforcement Learning of Multi-Agent Surveillance Systems with Temporal Logic Specifications
Keita Terashima, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.)
pp. 86 - 90

RCC2022-79
Generation of GPS and QZSS Spoofing Signals
Yuta Kawasaki, ishii koji (Kagawa Univ.)
pp. 91 - 96

RCC2022-80
Secure communication based on high precision space-time synchronization
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT)
pp. 97 - 102

RCC2022-81
A Study on Security Gap-Based Design of Polar Codes
Hidetake Matsui, Toshiki Matsumine, Hideki Ochiai (Yokohama National Univ.)
pp. 103 - 108

RCC2022-82
High Speed Optical Wireless Uplink using MU-MIMO with Angle Diversity
Xuejuan Zhu, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya Univ)
pp. 109 - 113

RCC2022-83
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication
Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.)
pp. 114 - 119

RCC2022-84
Performance Evaluation of Image Sensor Communication Using Propeller-Type Rotary LED Transmitter With Varying LED Installation Positions
Kazuki Syakuda (Okayama Univ. of Sci.), Zhengqiang Tang (Nagoya Univ.), Shintaro Arai (Okayama Univ. of Sci.)
pp. 120 - 125

RCC2022-85
[Invited Talk] Novel Wireless Communication System Realized by Mobile Terminal Collaboration using Higher-Frequency Bands
Hidekazu Murata (Yamaguchi Univ.)
p. 126

RCC2022-86
Multi-Authority Attribute Based Signatures from Lattice
Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.)
pp. 127 - 134

RCC2022-87
Signature scheme based on OSIDH
Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT)
pp. 135 - 141

RCC2022-88
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 142 - 148

RCC2022-89
FPGA implementation of PQC Signature Algorithm QR-UOV using High Level Synthesis
Kimihiro Yamakoshi, Tsunekaze Saito (NTT)
pp. 149 - 154

RCC2022-90
Forward-Secure for Claimable/Repudiable Ring Signature Scheme
Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ)
pp. 155 - 162

RCC2022-91
Attribute-based encryption with keyword search
Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.)
pp. 163 - 170

RCC2022-92
Claimable Designated Verifier Signature
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU)
pp. 171 - 178

RCC2022-93
Identity-based Matchmaking Encryption Secure against the KGC
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)
pp. 179 - 186

RCC2022-94
Proposal for a privacy-preserving frequency estimation method
Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR)
pp. 187 - 194

RCC2022-95
Local Differential Privacy mechanism for non-linear machine learning
Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST), Tomoaki Mimoto (ATR)
pp. 195 - 202

RCC2022-96
Diversification of Personal Records using GAN
Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.)
pp. 203 - 208

RCC2022-97
Exponential Strong Converse for Source Coding with Encoded Side Information -- Comparison with Source Coding with Non-encoded Side Information --
Daisuke Takeuchi, Shun Watanabe (TUAT)
pp. 209 - 211

RCC2022-98
A Greedy Algorithm for the Minimum-Entropy Coupling Problem
Taisei Shibata, Ken-ichi Iwata, Kengo Hashimoto (Univ. Fukui)
pp. 212 - 217

RCC2022-99
A Construction Method of Alphabetic Codes Allowing N-bit Decoding Delays
Daichi Ueda, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
pp. 218 - 223

RCC2022-100
Construction of Grammar-Based Codes Using the LZ78 Code and Its Variants
Mitsuharu Arimura (Shonan Inst. Tech.)
pp. 224 - 229

RCC2022-101

Kaito Ootsu, Shan Lu, Hiroshi Kamabe (Gifu Univ)
pp. 230 - 235

RCC2022-102
Estimation Performance of Sparse Bayesian Linear Regression model with t-distribution
Kazuaki Murayama (UEC)
pp. 236 - 241

RCC2022-103
Improvement of the Performance for Quantum Neural Network Classifiers based on Optimal Quantum Measurement Decoding
Yusaku Yamada, Jun Suzuki (UEC)
pp. 242 - 247

RCC2022-104
Design Using Sparse Optimization of Consensus Dynamics in High-Order Multi-Agent Systems
Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.)
pp. 248 - 250

RCC2022-105
Control of Multi-robot Systems Using A Future Map
Aki Matsutaka (Nagoya Univ.), Shun-ichi Azuma (Kyoto Univ.), Ryo Ariizumi, Toru Asai (Nagoya Univ.)
pp. 251 - 256

RCC2022-106
Improvement of the Operability of Industrial Robot using Interpolation method under Imperfect Communication Constraints
Yosuke Takagi, Ben Naila Chedlia, Hiraku Okada, Masaaki Katayama (Nagoya Univ.)
pp. 257 - 262

RCC2022-107
[Invited Talk] Virtualized terminal utilizing the terahertz band for high-capacity communications toward Beyond 5G/6G
Takahiro Hayashi, Yoshio Kunisawa, Tatsuya Nagao, Kazuki Takezawa, Satoshi Ito, Hiromi Matsuno, Yoji Kishi (KDDI Research, Inc)
pp. 263 - 268

RCC2022-108
Networks anomaly detection by VAE based on features extracted by CNN
Higashihata Kazuki (Osaka Prefecture Univ.), Aoki Shigeki, Miyamoto Takao (Osaka Metropolitan Univ.)
pp. 269 - 276

RCC2022-109
A Consideration of Logfile Automatic Detection for Digital Forensics using Machine Learning
Koudai Iwasaki (TUIS), Akira Orita, Shingo Sekiya, Shinta Nakano (HISYS), Masaki Hanada, Eiji Nunohiro, Yorinori Kishimoto (TUIS)
pp. 277 - 281

RCC2022-110
Designing for Supply Chain Network Model with Disruption Risks by Hybrid GA and Jaya Algorithm with Fuzzy Logic Controller
Mitsuo Gen (FLSI), YoungSu Yun, Tserendulam Erdenebaatar (Chosun Univ.)
pp. 282 - 289

RCC2022-111
Garbled Circuit Construction Method Using Linked List of Hash Functions
Guangjian Liu, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.)
pp. 290 - 296

RCC2022-112
Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input
Yuji Suga (IIJ)
pp. 297 - 304

RCC2022-113
Steganography for Graphs using Graph Spectrum
Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT)
pp. 305 - 312

RCC2022-114
A Study on Systematic Design of Geometric Shaping for BICM Systems
Eito Kurihara, Hideki Ochiai (YNU)
pp. 313 - 318

RCC2022-115

Hibiki Ogawa, Hiroshi Kamabe, Shan Lu (Gifu Univ)
pp. 319 - 324

RCC2022-116
Efficient composition of encoding polynomial in distributed coded computing scheme
Daisuke Hibino, Tomoharu Shibuya (Sophia Univ.)
pp. 325 - 330

RCC2022-117
Data Sharing Illumination Light Communications System using (k,n) Visual Secret Sharing Scheme
Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 331 - 336

RCC2022-118
A Study of Individual FOV Optimization according to the placement of PDs for Underwater VLC using Angular Diversity Receiver
Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ)
pp. 337 - 342

RCC2022-119
A Study on Average Bit Error Rate Analysis of Underwater Optical Camera Communication Using RGB-LED Array
Kazune Yokoo, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.), Takao Sawa (JAMSTEC)
pp. 343 - 348

RCC2022-120
Frame Synchronization of Modified MPPM in RGB-LED based Parallel Transmission Scheme
Hiromasa Habuchi, Jo Matsushima (Ibaraki Univ.)
pp. 349 - 354

RCC2022-121
[Invited Talk] Terahertz Surface-Wave Resonators for Functional Devices
Jun-ichi Shikata, Yuya Iwakawa (Nihon Univ.), Seigo Ohno (Tohoku Univ.)
pp. 355 - 359

RCC2022-122
Characterization of Effective Traffic Offloading with Predictive Drone Placement
Sotaro Ichikawa, Osamu Takyu (Shinshu Univ)
pp. 360 - 365

RCC2022-123
Performance Improvements of Positioning Accuracy Based on Multiple Observations of Doppler shift for User Position Detection System Using Unmanned Aerial Vehicles
Taiga Deguchi, Hiroyasu Ishikawa (Nihon Univ.)
pp. 366 - 371

RCC2022-124
A proposal of an attribute protection scheme in self-sovereign identity systems with shared terminals
Wataru Nakamura, Kenta Takahashi (Hitachi)
pp. 372 - 377

RCC2022-125
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher
Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.)
pp. 378 - 385

RCC2022-126
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution
Sakae Chikara, Tsunekazu Saito (NTT)
pp. 386 - 392

RCC2022-127
Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token
Kouichi Sakurai (Kyushu Univ.)
pp. 393 - 397

RCC2022-128
Experiments on pre-image computation time in Keccak[r = 40, c = 160, nr = 2]
Xinyu Qi, Atsushi Fujioka (Kanagawa Univ), Kazumaro Aoki (BUNKYO Univ)
pp. 398 - 403

RCC2022-129
Evaluation and Improvement of Related Key Differential Attack for the Block Cipher Midori
Shion Hirao, Keigo Horibe, Kosei Sakamoto, Takanori Isobe (UOH)
pp. 404 - 411

RCC2022-130
New Differential Pair of Linear Differential Attack for Salsa
Kunjo Ri, Atsuko Miyaji (Handai)
pp. 412 - 418

RCC2022-131
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.)
pp. 419 - 426

RCC2022-132
An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information
Tetsunao Matsuta (Saitama Univ.)
pp. 427 - 432

RCC2022-133
On the Optimal Construction of a Ramp Secret Sharing Scheme Realizing a General Access Structure
Shugo Kurokawa, Hiroki Koga (Univ Tsukuba)
pp. 433 - 438

RCC2022-134
Evaluation of the Optimal Relative Difference of Superimposed All the Shares for a (t,n)-Threshold Visual Cryptography Scheme
Hiroki Koga (Univ. Tsuikuba)
pp. 439 - 444

RCC2022-135
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color
Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ)
pp. 445 - 450

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan