IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 123, Number 424

Information Security

Workshop Date : 2024-03-14 / Issue Date : 2024-03-06

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2023-74
Research on safety verification of Japanese stamp
Uehara Asato (NTT-Me), Matsuzawa Yuito, Sugita Makoto (SUS)
pp. 1 - 4

ISEC2023-75
An improvement method and security evaluation for the method of protecting ownership using digital watermark
Dung Ta Anh, Hidema Tanaka (NDA)
pp. 5 - 11

ISEC2023-76
A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images
Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC)
pp. 12 - 19

ISEC2023-77
Performance Evaluation of Visible Light Communication System Using Imaginary Images based Image Classifier
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.)
pp. 20 - 25

ISEC2023-78
A Study of Parameter Optimization for Underwater Visible Light Communication using Angle Diversity Transceiver
Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ)
pp. 26 - 31

ISEC2023-79
A study of transmitter optical color selection for Underwater SLIPT system using Power Splitting receiver
Honoka Yoshinaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 32 - 37

ISEC2023-80
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.)
pp. 38 - 43

ISEC2023-81
Revisiting the Soundness of 5-Pass Identification Scheme
Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC)
pp. 44 - 51

ISEC2023-82
Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)
pp. 52 - 59

ISEC2023-83
Neural Network-based Compensation of Wideband Nonlinear Distortion for MIMO Transmission with Virtualized Terminal
Taishi Watanabe, Takeo Ohseki, Issei Kanno (KDDI Research)
pp. 60 - 65

ISEC2023-84
Position Estimation Accuracy of Mobile User based on Multiple Observation of Doppler-shifts in Positioning System using Unmanned Aerial Vehicle
Hideaki Ito, Hiroyasu Ishikawa (Nihon Uniuv.)
pp. 66 - 71

ISEC2023-85
A Study on a Link Design Method based on the Meteor Burst Communication Channel Model
Hiroto Iwasaki, Kaishi Mukumoto, Tadahiro Wada (Shizuoka Univ.)
pp. 72 - 77

ISEC2023-86
[Invited Talk] Recent Developments in Quantum Statistics
Akio Fujiwara (Osaka Univ.)
p. 78

ISEC2023-87
Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU)
pp. 79 - 86

ISEC2023-88
Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 87 - 93

ISEC2023-89
Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem
Akitaka Yokota, Bagus Santoso (UEC)
pp. 94 - 101

ISEC2023-90
Quantum Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes
Koki Sasaki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 102 - 107

ISEC2023-91
Sparse Superposition Codes Using Second Order Reed-Muller: Orthogonal Encoding
Tsukasa Osaka (Doshisha Univ.), Guanghui Song (Xidian Univ.), Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
pp. 108 - 113

ISEC2023-92
A solution of degree solving problem of the commutative fourth order recurrecne relation with two varibales over Z_2k
Daisaburo Yoshioka, Takuma Nishizaka (Sojo Univ.)
pp. 114 - 117

ISEC2023-93
Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 118 - 126

ISEC2023-94
On Privacy Mechanism to Discreat Data fit for Machine Learning
Tomoshi Yagishita, Atsuko Miyaji (OU)
pp. 127 - 134

ISEC2023-95
Efficient Replay Data Selection in Continual Federated Learning Model
Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ)
pp. 135 - 141

ISEC2023-96
Implementation and Application of a Library for Differential Privacy Broadly Applicable in the Python Ecosystem
Takumi Hiraoka, Shouhei Hanaoka, Kenjiro Taura (The University of Tokyo)
pp. 142 - 149

ISEC2023-97
A consideration on the generation of algebraic surfaces that can evaluate the computational complexity of section-finding problem
Kosuke Sakata (UTokyo), Koichiro Akiyama (Toshiba)
pp. 150 - 157

ISEC2023-98
Consideration on Definition Field for Efficient Ring-LWE Problem
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU)
pp. 158 - 165

ISEC2023-99
Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 166 - 173

ISEC2023-100
Variable-Lowpass-Filter Stability Guarantee Utilizing an Even-Symmetric Unity-Bounded Function
Tian-Bo Deng (Toho Univ.)
pp. 174 - 178

ISEC2023-101
A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation
Hidetake Matsui, Hideki Ochiai (YNU)
pp. 179 - 184

ISEC2023-102
Data-Driven Design of Sensor Networks Using Distributed Event-Triggered Communication
Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.)
pp. 185 - 188

ISEC2023-103
Partial Key Exposure Attacks on UOV-like Signatures
Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo)
pp. 189 - 196

ISEC2023-104
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 197 - 204

ISEC2023-105
A generalization of ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.)
pp. 205 - 211

ISEC2023-106
Consideration of BKZ by reordering lattice basis vectors
Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 212 - 219

ISEC2023-107
(See Japanese page.)
pp. 220 - 225

ISEC2023-108
Achievable Rate of Coded Caching Scheme with Cache Memories of Different Sizes
Akihito Nagaya, Hiroki Koga (Univ. of Tsukuba)
pp. 226 - 231

ISEC2023-109
New Algorithms for Computing a Correct Decoding Probability Exponent and an Error Decoding Probability Exponent with Cost Constraints and their Equivalency
Koki Kazama (Waseda Univ.), Akira Kamatsuka (Shonan Institute of Technology), Takahiro Yoshida (Nihon Univ.)
pp. 232 - 237

ISEC2023-110
(See Japanese page.)
pp. 238 - 240

ISEC2023-111
Efficient Key-Value Commitments with batch update and verification
Toshiyuki Mineta, Atsuko Miyaji (OU)
pp. 241 - 248

ISEC2023-112
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences)
pp. 249 - 253

ISEC2023-113
Comparison of accuracy of classification methods using machine learning for imaged malware
Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.)
pp. 254 - 258

ISEC2023-114
Improving classification accuracy of imaged malware through data expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.)
pp. 259 - 264

ISEC2023-115
[Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.)
p. 265

ISEC2023-116
[Special Invited Talk] Smart Radio and Reliable Communication & Control -- A Journey Through Research and Emerging Challenges --
Masaaki Katayama (Nagoya Univ.)
p. 266

ISEC2023-117
An Identity Management System using Group Signatures with Message-Dependent Opening
Yuto Imura, Keita Emura (Kanazawa Univ.)
pp. 267 - 272

ISEC2023-118
Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ)
pp. 273 - 278

ISEC2023-119
Improvement of non-interactive privacy-preserving document classification
Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech)
pp. 279 - 286

ISEC2023-120
Research Directions in Formal Verification of Transport Layer Security Protocols
Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR)
pp. 287 - 293

ISEC2023-121
A selection method of candidate constellation for the superimposed QAM signal method to reduce PAPR in OFDM system
Takashi Aoki, Tsuyoshi Arai, Hiroshi Inai, Hideaki Wakabayashi (Okayama Prefectural Univ.)
pp. 294 - 299

ISEC2023-122
Performance Evaluation of OFDM Systems with Clipping and Partial Filtering
Wataru Hatano, Hideki Ochiai (YNU)
pp. 300 - 305

ISEC2023-123
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU)
pp. 306 - 311

ISEC2023-124
Performance evaluation of throughput increase method in Optical wireless OFDM system in multipath channel.
Yutaka Munakata, Kouji Ohuchi (Shizuoka Univ.)
pp. 312 - 316

ISEC2023-125
Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU)
pp. 317 - 323

ISEC2023-126
Proposing the privacy-preserving cross-chain communication
Hideaki Miyaji, Noriaki Kamiyama (RU)
pp. 324 - 331

ISEC2023-127
Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences)
pp. 332 - 336

ISEC2023-128
Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences)
pp. 337 - 342

ISEC2023-129
An Efficient Differential Attack Resistance Evaluation Method for Block Ciphers
Haruka Sugai, Yasutaka Igarashi (TUS)
pp. 343 - 349

ISEC2023-130
Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science)
pp. 350 - 357

ISEC2023-131
Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.)
pp. 358 - 365

ISEC2023-132
Tradeoff relations between entropic quantities and their application in quantum information theory
Michele Dall'Arno (Toyohashi U. of Technology)
pp. 366 - 367

ISEC2023-133
Construction of an MDL Estimator with Tight Risk Bound in Simple ReLU Networks
Yoshinari Takeishi, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 368 - 373

ISEC2023-134
Comparison of Scale Parameter Dependence of Estimation Performance in Sparse Bayesian Linear Regression Model with Variance Gamma Prior Distribution and t-Prior Distribution
Kazuaki Murayama (UEC)
pp. 374 - 379

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan