Thu, Mar 7 AM 09:30 - 10:45 |
(1) |
09:30-09:55 |
Password for Prevention of Shoulder Surfing by Rear-Facing Camera |
Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.) |
(2) |
09:55-10:20 |
Exploring Malicious URL in Dark Web Using Tor Crawler |
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.) |
(3) |
10:20-10:45 |
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information |
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) |
|
10:45-10:55 |
Break ( 10 min. ) |
Thu, Mar 7 AM 10:55 - 12:35 |
(4) |
10:55-11:20 |
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques |
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) |
(5) |
11:20-11:45 |
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2 |
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) |
(6) |
11:45-12:10 |
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme |
Bagus Santoso (UEC) |
(7) |
12:10-12:35 |
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings. |
Kaoru Takemure, Bagus Santoso (UEC) |
|
12:35-13:40 |
Lunch Break ( 65 min. ) |
Thu, Mar 7 PM 13:40 - 14:55 |
(8) |
13:40-14:05 |
Steganography for character strings by using deep learning |
Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.) |
(9) |
14:05-14:30 |
Steganography for images by using deep learning |
Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ) |
(10) |
14:30-14:55 |
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity |
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) |
|
14:55-15:05 |
Break ( 10 min. ) |
Thu, Mar 7 PM 15:05 - 16:20 |
(11) |
15:05-15:30 |
String commitment with output locality |
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU) |
(12) |
15:30-15:55 |
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network |
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University) |
(13) |
15:55-16:20 |
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer |
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.) |
|
16:20-16:55 |
Break ( 35 min. ) |
Thu, Mar 7 PM Chair: Jun Muramatsu (NTT) 16:55 - 17:45 |
(14) |
16:55-17:45 |
[Invited Talk]
Deepning and evolution of Deep learning technology |
Hayaru Shouno (UEC) |
Thu, Mar 7 AM Chair: Shota Saito (Waseda Univ.) 09:30 - 10:45 |
(15) |
09:30-09:55 |
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source
-- When the Statewise Alphabets are Unknown -- |
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.) |
(16) |
09:55-10:20 |
On Multiterminal Hypothesis Testing Problem |
Yasutada Oohama (UEC) |
(17) |
10:20-10:45 |
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence |
Ryo Nomura (Senshu Univ.) |
|
10:45-10:55 |
Break ( 10 min. ) |
Thu, Mar 7 AM Chair: Ryo Nomura (Senshu Univ.) 10:55 - 12:10 |
(18) |
10:55-11:20 |
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set |
Mitsuharu Arimnura (Shonan Inst. Tech.) |
(19) |
11:20-11:45 |
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources |
Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.) |
(20) |
11:45-12:10 |
A New Variation of Asymmetric Numeral Systems |
Qi Xin, Hidetoshi Yokoo (Gunma Univ.) |
|
12:10-13:40 |
Lunch Break ( 90 min. ) |
Thu, Mar 7 PM 13:40 - 14:55 |
(21) |
13:40-14:05 |
[Encouragement Talk]
A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN |
Hiroki Musha, Masahiro Fujii (Utsunomiya Univ.) |
(22) |
14:05-14:30 |
[Encouragement Talk]
A Study of Signal Transmission Forms of Optical Wireless turbo Code system |
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(23) |
14:30-14:55 |
A study on dimming control scheme for visible-light communication using modified prime sequence codes |
Ryo Kawamoto, Yuto Doi, Kenmu Kamimura, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) |
|
14:55-15:05 |
Break ( 10 min. ) |
Thu, Mar 7 PM Chair: Kazushi Mimura (Hiroshima City Univ.) 15:05 - 16:20 |
(24) |
15:05-15:30 |
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes |
Masato Tajima |
(25) |
15:30-15:55 |
Coded caching and a subspace based on the distribution of the number of requests |
Masazumi Kurihara (UEC) |
(26) |
15:55-16:20 |
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels |
Keiji Shirakawa, Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC) |
Fri, Mar 8 AM 09:00 - 10:40 |
(27) |
09:00-09:25 |
History-Free Sequential Aggregate MAC without Pseudorandom Permutation |
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) |
(28) |
09:25-09:50 |
Authenticated Encryption Scheme Secure Against Side Channel Attack |
Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba) |
(29) |
09:50-10:15 |
Proposal of Online Pachinko using smart contract |
Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.) |
(30) |
10:15-10:40 |
Secure Comparisonl based on Quasi-Cyclic Code |
Yiying Qi, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 8 AM 10:50 - 12:05 |
(31) |
10:50-11:15 |
A Consideration of Computational Delay Time by Using MAC Implemented on CAN |
Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech) |
(32) |
11:15-11:40 |
A document-management scheme by using Git and Blockchain methods |
Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) |
(33) |
11:40-12:05 |
Act-Finding Survey on Cryptocurrency Exchanges in Japan and Overseas(2) |
Tomoki Fujitani, Kazumasa Omote (Univ. of Tsukuba) |
|
12:05-13:30 |
Lunch Break ( 85 min. ) |
Fri, Mar 8 PM 13:30 - 15:10 |
(34) |
13:30-13:55 |
One-Time Program and Its Application to Schnorr Signature |
Takashi Nishide (Univ. of Tsukuba) |
(35) |
13:55-14:20 |
Non-interactive Reusable Private Comparison Output from MKFHE |
Yuji Higuchi, Takashi Nishide (Univ. of Tsukuba) |
(36) |
14:20-14:45 |
Nonce-Based Hybrid Encryption |
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.) |
(37) |
14:45-15:10 |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies |
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) |
|
15:10-15:20 |
Break ( 10 min. ) |
Fri, Mar 8 PM 15:20 - 16:35 |
(38) |
15:20-15:45 |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform |
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) |
(39) |
15:45-16:10 |
Verifiable Delegated Private Bit Comparison |
Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.) |
(40) |
16:10-16:35 |
Non-interactive Proof Systems for Group-Dependent Bundled Languages |
Hiroaki Anada (Univ. of Nagasaki) |
|
16:35-16:45 |
Break ( 10 min. ) |
Fri, Mar 8 PM 16:45 - 17:35 |
(41) |
16:45-17:35 |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography |
Kazuo Ohta (UEC) |
Fri, Mar 8 AM Chair: Yutaka Jitsumatsu (Kyushu Univ.) 09:50 - 10:40 |
(42) |
09:50-10:15 |
Equivalence theorem and comparison of optimal designs in qubit systems |
Jun Suzuki (UEC) |
(43) |
10:15-10:40 |
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence |
Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 8 AM Chair: Bagus Santoso (UEC) 10:50 - 12:30 |
(44) |
10:50-11:15 |
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels |
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC) |
(45) |
11:15-11:40 |
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack |
Tatsuya Sekine, Hiroki Koga (U. Tsukuba) |
(46) |
11:40-12:05 |
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants |
Takashi Hisatome, Hiroki Koga (U. Tsukuba) |
(47) |
12:05-12:30 |
Secret Sharing on Evolving Multi-level Access Structure |
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) |
|
12:30-13:30 |
Lunch Break ( 60 min. ) |
Fri, Mar 8 PM 13:30 - 15:10 |
(48) |
13:30-13:55 |
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission |
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) |
(49) |
13:55-14:20 |
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling |
Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.) |
(50) |
14:20-14:45 |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks |
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) |
(51) |
14:45-15:10 |
Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation |
Tadatomo Sato (NIT, Hiroshima Coll.) |
|
15:10-15:20 |
Break ( 10 min. ) |
Fri, Mar 8 PM Chair: Akiko Manada (Shonan Inst. of Tech) 15:20 - 16:35 |
(52) |
15:20-15:45 |
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes |
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.) |
(53) |
15:45-16:10 |
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code |
Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.) |
(54) |
16:10-16:35 |
Studies on Ordered Shuffled BP Decoding of LDPC Codes
-- Based on the Loops and Weight Distributions of LDPC Codes -- |
Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC) |