IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Theory (IT) [schedule] [select]
Chair Tetsuya Kojima (Tokyo Kosen)
Vice Chair Yasuyuki Nogami (Okayama Univ.)
Secretary Tetsunao Matsuta (Saitamai Univ.), Akiko Manada (Nagaoka Univ. of Tech.)
Assistant Takayuki Nozaki (Yamaguchi Univ.)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Noboru Kunihiro (Tsukuba Univ.)
Vice Chair Junji Shikata (Yokohama National Univ.), Goichiro Hanaoka (AIST)
Secretary Takahiro Matsuda (AIST), Kazuki Yoneyama (Ibaraki Univ.)
Assistant Yoshikazu Hanatani (Toshiba)

Technical Committee on Wideband System (WBS) [schedule] [select]
Chair Takashi Shono (Wind River)
Vice Chair Hiroyasu Ishikawa (Nihon Univ.), Hideki Ochiai (Yokohama National Univ.)
Secretary Tsuyoshi Arai (Okayama Prefectural Univ.), Masayuki Kinoshita (Chiba Univ. of Tech.)
Assistant Sun Ran (Ibaraki Univ.), Chen Na (NAIST)

Technical Committee on Reliable Communication and Control (RCC) [schedule] [select]
Chair Shunichi Azuma (Nagoya Univ.)
Vice Chair Shunichi Azuma (Hokkaido Univ.), Koji Ishii (Kagawa Univ.)
Secretary Toshinori Kagawa (CRIEPI), Kunihisa Okano (Ritsumeikan Univ.)
Assistant SHAN LIN (NICT), Ryosuke Adachi (Yamaguchi Univ.)

Conference Date Tue, Mar 14, 2023 09:00 - 18:05
Wed, Mar 15, 2023 09:30 - 16:35
Topics  
Conference Place Yamaguchi University, Tokiwa Campus, D F1 and 2 
Address 2-16-1 Tokiwadai, Ube, Yamaguchi, Japan
Contact
Person
Ryosuke Adachi
Sponsors This conference is co-sponsored by IEEE IT Society Japan Chapter.
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on RCC, ISEC, IT, WBS.

Tue, Mar 14 AM  WBS1(D21)
09:00 - 10:15
(1) 09:00-09:25 Improvement of the meteor burst channel model and comparison with results of the experiment in Indonesia Hiroto Iwasaki, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.)
(2) 09:25-09:50 A Study on Application of Multi-Receiver System in Meteor Burst Communication Takumi Kayama, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.)
(3) 09:50-10:15 A Proposal of Visible Light Communication System using Image Classifier based on Imaginary Images Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.)
  10:15-10:30 Break ( 15 min. )
Tue, Mar 14 AM  IT2(D21)
Chair: Tetsuya Kojima (National Institute of Technology, Tokyo College)
10:30 - 11:20
(4) 10:30-11:20 [Invited Talk]
Information-Theoretic Analyses for Two Problems Taking Security into Consideration
-- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem --
Shota Saito (Gunma Univ.)
  11:20-13:00 Break ( 100 min. )
Tue, Mar 14 AM  ISEC1(D22)
Chair: Kazuki Yoneyama (Ibaraki University)
09:00 - 10:15
(5) 09:00-09:25 Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication
-- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication --
Masaaki Shirase (FUN)
(6) 09:25-09:50 Security Anslysis of binary elliptic curve GLS254 Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.)
(7) 09:50-10:15 Full key recovery of RSA secret key from noisy binary GCD operation sequences Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba)
  10:15-10:30 Break ( 15 min. )
Tue, Mar 14 AM  ISEC2(D22)
Chair: Yoshikazu Hanatani (Toshiba)
10:30 - 12:10
(8) 10:30-10:55 Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ)
(9) 10:55-11:20 Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU)
(10) 11:20-11:45 An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech)
(11) 11:45-12:10 Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech)
  12:10-13:00 Break ( 50 min. )
Tue, Mar 14 AM  IT1 (D12)
Chair: Jun Suzuki (UEC)
09:25 - 10:15
(12) 09:25-09:50 A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ)
(13) 09:50-10:15 An information-spectrum approach to entanglement purification and distillation Motoki Achiwa, Tomohiro Ogawa (UEC)
Tue, Mar 14 PM  RCC1(D21)
Chair: Kunihisa Okano (Ritsumeikan University)
13:00 - 14:15
(14) 13:00-13:25 On Reward Distribution in Reinforcement Learning of Multi-Agent Surveillance Systems with Temporal Logic Specifications Keita Terashima, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.)
(15) 13:25-13:50 Generation of GPS and QZSS Spoofing Signals Yuta Kawasaki, ishii koji (Kagawa Univ.)
(16) 13:50-14:15 Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT)
  14:15-14:55 Break ( 40 min. )
Tue, Mar 14 PM  WBS2(D21)
14:55 - 16:35
(17) 14:55-15:20 A Study on Security Gap-Based Design of Polar Codes Hidetake Matsui, Toshiki Matsumine, Hideki Ochiai (Yokohama National Univ.)
(18) 15:20-15:45 High Speed Optical Wireless Uplink using MU-MIMO with Angle Diversity Xuejuan Zhu, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya Univ)
(19) 15:45-16:10 Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.)
(20) 16:10-16:35 Performance Evaluation of Image Sensor Communication Using Propeller-Type Rotary LED Transmitter With Varying LED Installation Positions Kazuki Syakuda (Okayama Univ. of Sci.), Zhengqiang Tang (Nagoya Univ.), Shintaro Arai (Okayama Univ. of Sci.)
  16:35-16:50 Break ( 15 min. )
Tue, Mar 14 PM  RCC2(D21)
Chair: Ryosuke Adachi (Yamaguchi University)
16:50 - 17:40
(21) 16:50-17:40 [Invited Talk]
Novel Wireless Communication System Realized by Mobile Terminal Collaboration using Higher-Frequency Bands
Hidekazu Murata (Yamaguchi Univ.)
Tue, Mar 14 PM  ISEC3(D22)
Chair: Atsushi Takayasu (The University of Tokyo)
13:00 - 14:40
(22) 13:00-13:25 Multi-Authority Attribute Based Signatures from Lattice Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.)
(23) 13:25-13:50 Signature scheme based on OSIDH Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT)
(24) 13:50-14:15 A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
(25) 14:15-14:40 FPGA implementation of PQC Signature Algorithm QR-UOV using High Level Synthesis Kimihiro Yamakoshi, Tsunekaze Saito (NTT)
  14:40-14:55 Break ( 15 min. )
Tue, Mar 14 PM  ISEC4(D22)
Chair: Koichi Sakurai (Kyushu University)
14:55 - 16:35
(26) 14:55-15:20 Forward-Secure for Claimable/Repudiable Ring Signature Scheme Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ)
(27) 15:20-15:45 Attribute-based encryption with keyword search Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.)
(28) 15:45-16:10 Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU)
(29) 16:10-16:35 Identity-based Matchmaking Encryption Secure against the KGC Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)
  16:35-16:50 Break ( 15 min. )
Tue, Mar 14 PM  ISEC5(D22)
Chair: Takahiro Matsuda (AIST)
16:50 - 18:05
(30) 16:50-17:15 Proposal for a privacy-preserving frequency estimation method Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR)
(31) 17:15-17:40 Local Differential Privacy mechanism for non-linear machine learning Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST), Tomoaki Mimoto (ATR)
(32) 17:40-18:05 Diversification of Personal Records using GAN Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.)
Tue, Mar 14 PM  IT3 (D12)
Chair: Shigeaki Kuzuoka (Wakayama Univ.)
13:00 - 14:40
(33) 13:00-13:25 Exponential Strong Converse for Source Coding with Encoded Side Information
-- Comparison with Source Coding with Non-encoded Side Information --
Daisuke Takeuchi, Shun Watanabe (TUAT)
(34) 13:25-13:50 A Greedy Algorithm for the Minimum-Entropy Coupling Problem Taisei Shibata, Ken-ichi Iwata, Kengo Hashimoto (Univ. Fukui)
(35) 13:50-14:15 A Construction Method of Alphabetic Codes Allowing N-bit Decoding Delays Daichi Ueda, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
(36) 14:15-14:40 Construction of Grammar-Based Codes Using the LZ78 Code and Its Variants Mitsuharu Arimura (Shonan Inst. Tech.)
  14:40-14:55 Break ( 15 min. )
Tue, Mar 14 PM  IT4 (D12)
Chair: Tomohiro Ogawa (UEC)
14:55 - 16:10
(37) 14:55-15:20 Kaito Ootsu, Shan Lu, Hiroshi Kamabe (Gifu Univ)
(38) 15:20-15:45 Estimation Performance of Sparse Bayesian Linear Regression model with t-distribution Kazuaki Murayama (UEC)
(39) 15:45-16:10 Improvement of the Performance for Quantum Neural Network Classifiers based on Optimal Quantum Measurement Decoding Yusaku Yamada, Jun Suzuki (UEC)
Wed, Mar 15 AM  RCC3(D21)
Chair: Koichi Kobayashi (Hokkaido University)
09:30 - 10:45
(40) 09:30-09:55 Design Using Sparse Optimization of Consensus Dynamics in High-Order Multi-Agent Systems Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.)
(41) 09:55-10:20 Control of Multi-robot Systems Using A Future Map Aki Matsutaka (Nagoya Univ.), Shun-ichi Azuma (Kyoto Univ.), Ryo Ariizumi, Toru Asai (Nagoya Univ.)
(42) 10:20-10:45 Improvement of the Operability of Industrial Robot using Interpolation method under Imperfect Communication Constraints Yosuke Takagi, Ben Naila Chedlia, Hiraku Okada, Masaaki Katayama (Nagoya Univ.)
  10:45-11:00 Break ( 15 min. )
Wed, Mar 15 AM  WBS3(D21)
11:00 - 11:50
(43) 11:00-11:50 [Invited Talk]
Virtualized terminal utilizing the terahertz band for high-capacity communications toward Beyond 5G/6G
Takahiro Hayashi, Yoshio Kunisawa, Tatsuya Nagao, Kazuki Takezawa, Satoshi Ito, Hiromi Matsuno, Yoji Kishi (KDDI Research, Inc)
  11:50-13:00 Lunch ( 70 min. )
Wed, Mar 15 AM  ISEC6(D22)
Chair: Goichiro Hanaoka (AIST)
09:30 - 10:45
(44) 09:30-09:55 Networks anomaly detection by VAE based on features extracted by CNN Higashihata Kazuki (Osaka Prefecture Univ.), Aoki Shigeki, Miyamoto Takao (Osaka Metropolitan Univ.)
(45) 09:55-10:20 A Consideration of Logfile Automatic Detection for Digital Forensics using Machine Learning Koudai Iwasaki (TUIS), Akira Orita, Shingo Sekiya, Shinta Nakano (HISYS), Masaki Hanada, Eiji Nunohiro, Yorinori Kishimoto (TUIS)
(46) 10:20-10:45 Designing for Supply Chain Network Model with Disruption Risks by Hybrid GA and Jaya Algorithm with Fuzzy Logic Controller Mitsuo Gen (FLSI), YoungSu Yun, Tserendulam Erdenebaatar (Chosun Univ.)
  10:45-11:00 Break ( 15 min. )
Wed, Mar 15 AM  ISEC7(D22)
Chair: Masaaki Shirase (Future University Hakodate)
11:00 - 12:15
(47) 11:00-11:25 Garbled Circuit Construction Method Using Linked List of Hash Functions Guangjian Liu, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.)
(48) 11:25-11:50 Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input Yuji Suga (IIJ)
(49) 11:50-12:15 Steganography for Graphs using Graph Spectrum Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT)
  12:15-13:00 Lunch ( 45 min. )
Wed, Mar 15 AM  IT5 (D12)
Chair: Gou Hosoya (Waseda Univ.)
09:30 - 10:45
(50) 09:30-09:55 A Study on Systematic Design of Geometric Shaping for BICM Systems Eito Kurihara, Hideki Ochiai (YNU)
(51) 09:55-10:20 Hibiki Ogawa, Hiroshi Kamabe, Shan Lu (Gifu Univ)
(52) 10:20-10:45 Efficient composition of encoding polynomial in distributed coded computing scheme Daisuke Hibino, Tomoharu Shibuya (Sophia Univ.)
Wed, Mar 15 PM  WBS4(D21)
13:00 - 14:40
(53) 13:00-13:25 Data Sharing Illumination Light Communications System using (k,n) Visual Secret Sharing Scheme Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
(54) 13:25-13:50 A Study of Individual FOV Optimization according to the placement of PDs for Underwater VLC using Angular Diversity Receiver Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ)
(55) 13:50-14:15 A Study on Average Bit Error Rate Analysis of Underwater Optical Camera Communication Using RGB-LED Array Kazune Yokoo, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.), Takao Sawa (JAMSTEC)
(56) 14:15-14:40 Frame Synchronization of Modified MPPM in RGB-LED based Parallel Transmission Scheme Hiromasa Habuchi, Jo Matsushima (Ibaraki Univ.)
  14:40-14:55 Break ( 15 min. )
Wed, Mar 15 PM  WBS5(D21)
14:55 - 16:35
(57) 14:55-15:45 [Invited Talk]
Terahertz Surface-Wave Resonators for Functional Devices
Jun-ichi Shikata, Yuya Iwakawa (Nihon Univ.), Seigo Ohno (Tohoku Univ.)
(58) 15:45-16:10 Characterization of Effective Traffic Offloading with Predictive Drone Placement Sotaro Ichikawa, Osamu Takyu (Shinshu Univ)
(59) 16:10-16:35 Performance Improvements of Positioning Accuracy Based on Multiple Observations of Doppler shift for User Position Detection System Using Unmanned Aerial Vehicles Taiga Deguchi, Hiroyasu Ishikawa (Nihon Univ.)
Wed, Mar 15 PM  ISEC8(D22)
Chair: Yuji Suga (IIJ)
13:00 - 14:40
(60) 13:00-13:25 A proposal of an attribute protection scheme in self-sovereign identity systems with shared terminals Wataru Nakamura, Kenta Takahashi (Hitachi)
(61) 13:25-13:50 Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.)
(62) 13:50-14:15 A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution Sakae Chikara, Tsunekazu Saito (NTT)
(63) 14:15-14:40 Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token Kouichi Sakurai (Kyushu Univ.)
  14:40-14:55 Break ( 15 min. )
Wed, Mar 15 PM  ISEC9(D22)
Chair: Noboru Kunihiro (University of Tsukuba)
14:55 - 16:35
(64) 14:55-15:20 Experiments on pre-image computation time in Keccak[r = 40, c = 160, nr = 2] Xinyu Qi, Atsushi Fujioka (Kanagawa Univ), Kazumaro Aoki (BUNKYO Univ)
(65) 15:20-15:45 Evaluation and Improvement of Related Key Differential Attack for the Block Cipher Midori Shion Hirao, Keigo Horibe, Kosei Sakamoto, Takanori Isobe (UOH)
(66) 15:45-16:10 New Differential Pair of Linear Differential Attack for Salsa Kunjo Ri, Atsuko Miyaji (Handai)
(67) 16:10-16:35 Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing Masaya Okazaki, Tetsu Iwata (Nagoya Univ.)
Wed, Mar 15 PM  IT6 (D12)
Chair: Mitsuharu Arimura (Shonan Institute of Technology )
13:00 - 14:40
(68) 13:00-13:25 An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information Tetsunao Matsuta (Saitama Univ.)
(69) 13:25-13:50 On the Optimal Construction of a Ramp Secret Sharing Scheme Realizing a General Access Structure Shugo Kurokawa, Hiroki Koga (Univ Tsukuba)
(70) 13:50-14:15 Evaluation of the Optimal Relative Difference of Superimposed All the Shares for a (t,n)-Threshold Visual Cryptography Scheme Hiroki Koga (Univ. Tsuikuba)
(71) 14:15-14:40 Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
IT Technical Committee on Information Theory (IT)   [Latest Schedule]
Contact Address E--mail:it-c(to IT Secretaries)
.
Akiko Manada (Nagaoka University of Technology)
Tetsunao Matsuta (Saitama University)
Takayuki Nozaki (Yamaguchi University) 
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Takahiro Matsuda (AIST)
E--mail: ic-c (to ISEC secretaries) 
WBS Technical Committee on Wideband System (WBS)   [Latest Schedule]
Contact Address WBS Secretary:
E--mail: wbs-nn 
RCC Technical Committee on Reliable Communication and Control (RCC)   [Latest Schedule]
Contact Address rcc-c 
Announcement http://www.ieice.org/~rcc/


Last modified: 2023-03-13 15:27:08


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /   [Return to RCC Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan