IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev WBS Conf / Next WBS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Wideband System (WBS)
Chair: Takashi Shono (Wind River)
Vice Chair: Hiroyasu Ishikawa (Nihon Univ.), Hideki Ochiai (Yokohama National Univ.)
Secretary: Tsuyoshi Arai (Okayama Prefectural Univ.), Kentaro Kobayashi (Meijo Univ.)
Assistant: Chen Na (NAIST), Taishi Watanabe (KDDI Research)

===============================================
Technical Committee on Information Theory (IT)
Chair: Tetsuya Kojima (Tokyo Kosen) Vice Chair: Yasuyuki Nogami (Okayama Univ.)
Secretary: Go Hosoya (Waseda Univ.), Akiko Manada (Nagaoka Univ. of Tech.)
Assistant: Tetsunao Matsuta (Saitamai Univ.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Goichiro Hanaoka (AIST)
Vice Chair: Junji Shikata (Yokohama National Univ.), Shinsaku Kiyomoto (KDDI Research)
Secretary: Takahiro Matsuda (AIST), Yoshikazu Hanatani (Toshiba)
Assistant: Hiroki Okada (KDDI Research)

===============================================
Technical Committee on Reliable Communication and Control (RCC)
Chair: Shunichi Azuma (Kyoto Univ.) Vice Chair: Shunichi Azuma (Hokkaido Univ.), Koji Ishii (Kagawa Univ.)
Secretary: Toshinori Kagawa (CRIEPI), Kunihisa Okano (Ritsumeikan Univ.)
Assistant: SHAN LIN (NICT), Ryosuke Adachi (Yamaguchi Univ.)

DATE:
Wed, Mar 13, 2024 09:15 - 17:25
Thu, Mar 14, 2024 09:05 - 17:25

PLACE:
Bldg. A (Room A110, Room A210) and Bldg. B (Room B101), Graduate School of Information Science and Technology, Suita Campus, Osaka University(Yamadaoka 1-5, Suita city, Osaka 565-0871, Japan. (1) Train: 15'~30' east on foot from Kita-Senri, Hankyu Senri Line. (2) Monorail: 5'~15' on foot from Monorail Handai-Byoin-Mae. (3) Hankyu Bus: Bus for Handai-Honbu-Mae or Ibaraki-Mihogaoka at Senri-Chuo. Exit at Handai-Honbu-Mae. (5'~15'). (4) Kintetsu Bus: Bus for Handai-Honbu-Mae from Ibaraki-Shi, Hankyu Kyoto Line. Exit at Handai-Honbu-Mae. (5'~15'). (5) From Shin-Osaka Station: Subway Midosuji Line to Senri-Chuo, → Monorail. Exit at Handai-Byoin-Mae. (1hr.). https://www.ist.osaka-u.ac.jp/english/access/suita-campus.html. Assoc. Prof. Naoto Yanai, Graduate School of Information Science and Technology, Osaka University)

TOPICS:
RCC, ISEC, IT, WBS

----------------------------------------
Wed, Mar 13 AM ISEC1 (Room A110) (09:15 - 10:30)
Chair: Atsuko Miyaji (Osaka Univ.)
----------------------------------------

(1) 09:15 - 09:40
Research on safety verification of Japanese stamp
Uehara Asato (NTT-Me), Matsuzawa Yuito, Sugita Makoto (SUS)

(2) 09:40 - 10:05
An improvement method and security evaluation for the method of protecting ownership using digital watermark
Dung Ta Anh, Hidema Tanaka (NDA)

(3) 10:05 - 10:30
A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images
Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC)

----- Break ( 15 min. ) -----

----------------------------------------
Wed, Mar 13 AM WBS1 (Room B101) (09:15 - 10:30)
Chair: Kentaro Kobayashi (Meijo Univ.)
----------------------------------------

(4) 09:15 - 09:40
Performance Evaluation of Visible Light Communication System Using Imaginary Images based Image Classifier
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.)

(5) 09:40 - 10:05
A Study of Parameter Optimization for Underwater Visible Light Communication using Angle Diversity Transceiver
Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ)

(6) 10:05 - 10:30
A study of transmitter optical color selection for Underwater SLIPT system using Power Splitting receiver
Honoka Yoshinaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Wed, Mar 13 AM ISEC2 (Room A110) (10:45 - 12:00)
Chair: Atsushi Takayasu (Univ. of Tokyo)
----------------------------------------

(7) 10:45 - 11:10
Note on Impossibility of Tight Reduction on IND-CCA secure Identity-Based Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.)

(8) 11:10 - 11:35
Revisiting the Soundness of 5-Pass Identification Scheme
Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC)

(9) 11:35 - 12:00
Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Wed, Mar 13 AM WBS2 (Room B101室) (10:45 - 12:00)
Chair: Yusuke Kozawa (Ibaraki Univ.)
----------------------------------------

(10) 10:45 - 11:10
Neural Network-based Compensation of Wideband Nonlinear Distortion for MIMO Transmission with Virtualized Terminal
Taishi Watanabe, Takeo Ohseki, Issei Kanno (KDDI Research)

(11) 11:10 - 11:35
Position Estimation Accuracy of Mobile User based on Multiple Observation of Doppler-shifts in Positioning System using Unmanned Aerial Vehicle
Hideaki Ito, Hiroyasu Ishikawa (Nihon Uniuv.)

(12) 11:35 - 12:00
A Study on a Link Design Method based on the Meteor Burst Communication Channel Model
Hiroto Iwasaki, Kaishi Mukumoto, Tadahiro Wada (Shizuoka Univ.)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Wed, Mar 13 PM IT Invited Talk (Room A110) (13:00 - 14:00)
Chair: Tetsuya Kojima (NIT, Tokyo College)
----------------------------------------

(13) 13:00 - 14:00
[Invited Talk]
Recent Developments in Quantum Statistics
Akio Fujiwara (Osaka Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Wed, Mar 13 PM ISEC3a (Room 110) (14:15 - 15:30)
Chair: Shingo Hasegawa (Tohoku Univ.)
----------------------------------------

(14) 14:15 - 14:40
Proxy Re-Encryption Based on LPN Problem
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU)

(15) 14:40 - 15:05
Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)

(16) 15:05 - 15:30
Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem
Akitaka Yokota, Bagus Santoso (UEC)

----- Break ( 40 min. ) -----

----------------------------------------
Wed, Mar 13 PM IT1 (Room B101) (14:15 - 15:30)
Chair: Jun Asatani (Okayama Univ. of Science)
----------------------------------------

(17) 14:15 - 14:40
Quantum Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes
Koki Sasaki, Takayuki Nozaki (Yamaguchi Univ.)

(18) 14:40 - 15:05
Sparse Superposition Codes Using Second Order Reed-Muller: Orthogonal Encoding
Tsukasa Osaka (Doshisha Univ.), Guanghui Song (Xidian Univ.), Tomotaka Kimura, Jun Cheng (Doshisha Univ.)

(19) 15:05 - 15:30
A solution of degree solving problem of the commutative fourth order recurrecne relation with two varibales over Z_2k
Daisaburo Yoshioka, Takuma Nishizaka (Sojo Univ.)

----- Break ( 40 min. ) -----

----------------------------------------
Wed, Mar 13 PM ISEC3b (Room A210) (14:15 - 15:55)
Chair: Hiroki Okada (KDDI Research)
----------------------------------------

(20) 14:15 - 14:40
Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)

(21) 14:40 - 15:05
On Privacy Mechanism to Discreat Data fit for Machine Learning
Tomoshi Yagishita, Atsuko Miyaji (OU)

(22) 15:05 - 15:30
Efficient Replay Data Selection in Continual Federated Learning Model
Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ)

(23) 15:30 - 15:55
Implementation and Application of a Library for Differential Privacy Broadly Applicable in the Python Ecosystem
Takumi Hiraoka, Shouhei Hanaoka, Kenjiro Taura (The University of Tokyo)

----- Break ( 15 min. ) -----

----------------------------------------
Wed, Mar 13 PM ISEC4 (Room A110) (16:10 - 17:25)
Chair: Kotaro Suzuki (TUT)
----------------------------------------

(24) 16:10 - 16:35
A consideration on the generation of algebraic surfaces that can evaluate the computational complexity of section-finding problem
Kosuke Sakata (UTokyo), Koichiro Akiyama (Toshiba)

(25) 16:35 - 17:00
Consideration on Definition Field for Efficient Ring-LWE Problem
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU)

(26) 17:00 - 17:25
Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)

----------------------------------------
Wed, Mar 13 PM RCC (Room B101) (16:10 - 17:25)
Chair: Koichi Kobayashi (Hokkaido Univ.)
----------------------------------------

(27) 16:10 - 16:35
Variable-Lowpass-Filter Stability Guarantee Utilizing an Even-Symmetric Unity-Bounded Function
Tian-Bo Deng (Toho Univ.)

(28) 16:35 - 17:00
A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation
Hidetake Matsui, Hideki Ochiai (YNU)

(29) 17:00 - 17:25
Data-Driven Design of Sensor Networks Using Distributed Event-Triggered Communication
Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.)

----------------------------------------
Thu, Mar 14 AM ISEC5a (Room A110) (09:05 - 10:45)
Chair: Noboru Kunihiro (Univ. of Tsukuba)
----------------------------------------

(30) 09:05 - 09:30
Partial Key Exposure Attacks on UOV-like Signatures
Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo)

(31) 09:30 - 09:55
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.)

(32) 09:55 - 10:20
A generalization of ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.)

(33) 10:20 - 10:45
Consideration of BKZ by reordering lattice basis vectors
Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 AM IT2 (Room B101) (09:05 - 10:45)
Chair: Masanori Hirotomo (Saga Univ.)
----------------------------------------

(34) 09:05 - 09:30
(See Japanese page.)

(35) 09:30 - 09:55
On the Achievable Rate of a Coded Caching Scheme with Cache Memories of Different Sizes
Akihito Nagaya, Hiroki Koga (Univ. of Tsukuba)

(36) 09:55 - 10:20
New Algorithms for Computing a Correct Decoding Probability Exponent and an Error Decoding Probability Exponent with Cost Constraints and their Equivalency
Koki Kazama (Waseda Univ.), Akira Kamatsuka (Shonan Institute of Technology), Takahiro Yoshida (Nihon Univ.)

(37) 10:20 - 10:45
(See Japanese page.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 AM ISEC5b (Room A210) (09:05 - 10:45)
Chair: Yoshikazu Hanatani (Toshiba)
----------------------------------------

(38) 09:05 - 09:30
Efficient Key-Value Commitments with batch update and verification
Toshiyuki Mineta, Atsuko Miyaji (OU)

(39) 09:30 - 09:55
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences)

(40) 09:55 - 10:20
Comparison of accuracy of classification methods using machine learning for imaged malware
Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.)

(41) 10:20 - 10:45
Improving The Classification Accuracy of Imaged Malware through Data Expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 AM ISEC Invited Talk (Room A110) (11:00 - 12:00)
Chair: Goichiro Hanaoka (AIST)
----------------------------------------

(42) 11:00 - 12:00
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Thu, Mar 14 PM RCC Invited Tail (Room A110) (13:00 - 14:00)
Chair: Koji Ishi (Kagawa Univ.)
----------------------------------------

(43) 13:00 - 14:00
[Special Invited Talk]
Smart Radio and Reliable Communication & Control
-- A Journey Through Research and Emerging Challenges --
Masaaki Katayama (Nagoya Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 PM ISEC6a (Room A110) (14:15 - 15:55)
Chair: Yusuke Yoshida (TITech)
----------------------------------------

(44) 14:15 - 14:40
An Identity Management System using Group Signatures with Message-Dependent Opening
Yuto Imura, Keita Emura (Kanazawa Univ.)

(45) 14:40 - 15:05
Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ)

(46) 15:05 - 15:30
Improvement of non-interactive privacy-preserving document classification
Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech)

(47) 15:30 - 15:55
Research Directions in Formal Verification of Transport Layer Security Protocols
Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 PM WBS3 (Room B101) (14:15 - 15:55)
Chair: Taishi Watanabe (KDDI Research)
----------------------------------------

(48) 14:15 - 14:40
Performance evaluation of throughput increase method in Optical wireless OFDM system in multipath channel.
Yutaka Munakata, Kouji Ohuchi (Shizuoka Univ.)

(49) 14:40 - 15:05
Performance Evaluation of OFDM Systems with Clipping and Partial Filtering
Wataru Hatano, Hideki Ochiai (YNU)

(50) 15:05 - 15:30
Secure Design of Channel Oriented Polar-Coded OFDM System over Frequency Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU)

(51) 15:30 - 15:55
A selection method of candidate constellation for the superimposed QAM signal method to reduce PAPR in OFDM system
Takashi Aoki, Tsuyoshi Arai, Hiroshi Inai, Hideaki Wakabayashi (Okayama Prefectural Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 PM ISEC6b (Room 210) (14:15 - 15:55)
Chair: Yuji Suga (IIJ)
----------------------------------------

(52) 14:15 - 14:40
Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU)

(53) 14:40 - 15:05
Proposing the privacy-preserving cross-chain communication
Hideaki Miyaji, Noriaki Kamiyama (RU)

(54) 15:05 - 15:30
Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences)

(55) 15:30 - 15:55
Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 14 PM ISEC7 (Room A110) (16:10 - 17:25)
Chair: Shoichi Hirose (Univ. of Fukui)
----------------------------------------

(56) 16:10 - 16:35
An Efficient Differential Attack Resistance Evaluation Method for Block Ciphers
Haruka Sugai, Yasutaka Igarashi (TUS)

(57) 16:35 - 17:00
Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science)

(58) 17:00 - 17:25
Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.)

----------------------------------------
Thu, Mar 14 PM IT3 (Room B101) (16:10 - 17:25)
Chair: Akira Kamatsuka (Shonan Inst. of Tech.)
----------------------------------------

(59) 16:10 - 16:35
Tradeoff relations between entropic quantities and their application in quantum information theory
Michele Dall'Arno (Toyohashi U. of Technology)

(60) 16:35 - 17:00
Construction of an MDL Estimator with Tight Risk Bound in Simple ReLU Networks
Yoshinari Takeishi, Jun'ichi Takeuchi (Kyushu Univ.)

(61) 17:00 - 17:25
Comparison of Scale Parameter Dependence of Estimation Performance in Sparse Bayesian Linear Regression Model with Variance Gamma Prior Distribution and t-Prior Distribution
Kazuaki Murayama (UEC)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.

# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.

# CONFERENCE ANNOUNCEMENT:
- We plan to have a drink party from 18:00 at the building next to the workshop venue.
**********
- Date: 18:00-20:00, March 13th (Wed), 2024.
- Place: The restaurant "クルール", located at the 1st floor of the building next to the workshop venue.
- Address: 1-9 Yamadaoka, Suita, Osaka, Japan.
- Style: Buffet-style, all you can drink
- Fee: Around 5,000yen (or 3,000yen if you are a student) (Subject to change)
- Deadline for registration: March 3rd (Sun), 2024.
**********
(The cancellation fee after the deadline is 100% of the registration fee.)
If you plan to join, please register from the following link:
https://docs.google.com/forms/d/e/1FAIpQLSfM3hmnneBRaISThkduKhf1gau2pZj9_GoSzI86ZEVhPjoLSg/viewform
Contact: isec-sec at mail.ieice.org (Replace "at" with "@".)


=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:

Thu, May 16, 2024 - Fri, May 17, 2024: KITEN Convention hall (Miyazaki) [Fri, Mar 8], Topics: Coding, Modulation, Signal processing, Reliable Communication and Control, Healthcare and Medical Information Communication Technologies, and General

# SECRETARY:
WBS Secretary:
E-mail: wbs-nn

=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:

Thu, May 30, 2024 - Fri, May 31, 2024: Chiba University (Nishi-Chiba Campus) [Wed, Mar 13], Topics: Information Security, Information Theory, Information Hiding, etc.

# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Gou Hosoya (Waseda University)
Akiko Manada (Nagaoka University of Technology)
Tetsunao Matsuta (Saitama University)

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Wed, May 15, 2024: Kikai-Shinko-Kaikan Bldg. [Tue, Mar 12]

# SECRETARY:
Takahiro Matsuda (AIST)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Reliable Communication and Control (RCC) ===
# FUTURE SCHEDULE:

Thu, May 16, 2024 - Fri, May 17, 2024: KITEN Convention hall (Miyazaki) [Fri, Mar 8], Topics: Coding, Modulation, Signal processing, Reliable Communication and Control, Healthcare and Medical Information Communication Technologies, and General

# SECRETARY:
rcc-c

# ANNOUNCEMENT:
# http://www.ieice.org/~rcc/


Last modified: 2024-03-13 05:50:03


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /   [Return to RCC Schedule Page]   /  
 
 Go Top  Go Back   Prev WBS Conf / Next WBS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan