IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Theory (IT)
Chair: Tadashi Wadayama (Nagoya Inst. of Tech.) Vice Chair: Tetsuya Kojima (Tokyo Kosen)
Secretary: Takayuki Nozaki (Yamaguchi Univ.), Masanori Hirotomo (Saga Univ.)
Assistant: Takahiro Ohta (Senshu Univ.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Shoichi Hirose (Univ. of Fukui)
Vice Chair: Tetsuya Izu (Fujitsu Labs.), Noboru Kunihiro (Tsukuba Univ.)
Secretary: Kazunari Omote (Tsukuba Univ.), Dai Yamamoto (Fujitsu Labs.)
Assistant: Kazuki Yoneyama (Ibaraki Univ.)

===============================================
Technical Committee on Wideband System (WBS)
Chair: Masanori Hamamura (Kochi Univ. of Tech.) Vice Chair: Takashi Shono (INTEL), Masahiro Fujii (Utsunomiya Univ.)
Secretary: Shintaro Arai (Okayama Univ. of Science), Ryohei Nakamura (National Defence Academy)
Assistant: Duong Quang Thang (NAIST), Masafumi Moriyama (NICT), Masayuki Kinoshita (Chiba Univ. of Tech.)

DATE:
Thu, Mar 4, 2021 09:25 - 17:15
Fri, Mar 5, 2021 09:00 - 16:15

PLACE:
Online Technical Meeting (Zoom, Webex, EventIn)

TOPICS:
Joint Meeting of WBS, IT, and ISEC

----------------------------------------
Thu, Mar 4 AM Online Room A: IT 1 (09:25 - 10:40)
Chair: Takayuki Nozaki (Yamaguchi University)
----------------------------------------

(1) 09:25 - 09:50
List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits
Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS)

(2) 09:50 - 10:15
Variable spreading factor codes for optical code-division multiple access
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.)

(3) 10:15 - 10:40
Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes
Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 4 AM Online Room A: IT 2 (10:55 - 12:10)
Chair: Nozomi Miya (Aoyama Gakuin University)
----------------------------------------

(4) 10:55 - 11:20
An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section
Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)

(5) 11:20 - 11:45
A note on sufficient condition for reconstructable substring of CSE method
Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.)

(6) 11:45 - 12:10
Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report)
Tomoyuki Yamakami (U of Fukui)

----------------------------------------
Thu, Mar 4 AM Online Room B: ISEC 1 (09:25 - 10:40)
----------------------------------------

(7) 09:25 - 09:50
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.)

(8) 09:50 - 10:15
Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA
Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS)

(9) 10:15 - 10:40
Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 4 AM Online Room B: ISEC 2 (10:55 - 12:35)
----------------------------------------

(10) 10:55 - 11:20
Solving Shortest Vector Problem using annealing computation
-- How to generate a hamiltonian using pseudo multispin flip method --
Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories)

(11) 11:20 - 11:45
An Attack on Search Ring-LWE Problem for Even Relative Degree
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ)

(12) 11:45 - 12:10
Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.)

(13) 12:10 - 12:35
Efficient parallel computing method of isogeny based cryptography
Ryota Udani, Koutarou Suzuki (TUT)

----- Lunch Break -----

----------------------------------------
Thu, Mar 4 PM Online Poster Session: WBS, IT (13:20 - 14:40)
Chair: Shintaro Arai (Okayama Univ. of Science)
----------------------------------------

(14) 13:20 - 14:40
[Poster Presentation]
Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter
Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.)

(15) 13:20 - 14:40
[Poster Presentation]
Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction
Daiki Harada, Kouji Ohuchi (Shizuoka Univ.)

(16) 13:20 - 14:40
[Poster Presentation]
Recovery of Partially Missing OFDM Signal in Time-Domain
Chengbo Liu, Na Chen, Minoru Okada (NAIST)

(17) 13:20 - 14:40
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU)

(18) 13:20 - 14:40
[Poster Presentation]
Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera
Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)

(19) 13:20 - 14:40
[Poster Presentation]
Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes
Shota Saito, Toshiyasu Matsushima (Waseda Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 4 PM Online Room A: IT 3 (14:55 - 16:10)
Chair: Hideki Yagi (The University of Electro-Communications)
----------------------------------------

(20) 14:55 - 15:20
An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares
Kyohei Sekine, Hiroki Koga (Tsukuba Univ.)

(21) 15:20 - 15:45
A Consideration on Evolving Secret Sharing Schemes using Linear Codes
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.)

(22) 15:45 - 16:10
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database
Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Mar 4 PM Online Room A: Invited Talk (WBS) (16:25 - 17:15)
Chair: Takashi Shono (INTEL)
----------------------------------------

(23) 16:25 - 17:15
[Invited Talk]
Management of Multiple Wireless Access for IOWN in the 6G era
Yasushi Takatori (NTT)

----------------------------------------
Thu, Mar 4 PM Online Room B: ISEC 3 (14:55 - 16:10)
----------------------------------------

(24) 14:55 - 15:20
A Physical Zero-knowledge Proof for Cryptarithmetic Using Dihedral Cards
Raimu Isuzugawa (Tohoku Univ.), Daiki Miyahara, Takaaki Mizuki (Tohoku Univ./AIST), Hideaki Sone (Tohoku Univ.)

(25) 15:20 - 15:45
On Some Principles of Security Analysis for Physical-Ciphered Communication Systems
Kentaro Kato (Tamagawa Univ.)

(26) 15:45 - 16:10
A Real-Time Bluetooth Protocol Fuzzing System
Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU)

----- Break (After the break, the invited talk will be held in Session A.) ( 15 min. ) -----

----------------------------------------
Fri, Mar 5 AM Online Room A: WBS 1 (09:25 - 10:40)
Chair: Masafumi Moriyama (NICT)
----------------------------------------

(27) 09:25 - 09:50
Blind Estimation of Carrier Frequency Offset and Symbol Time Offset using WFrFT
Toshifumi Kojima, Kouji Ohuchi (Shizuoka Univ.)

(28) 09:50 - 10:15
Performance Evaluation of VN-CSK Type Parallel Indoor Optical Wireless Communication Using RGB-LED with Different Color Power
Koki Taruishi, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)

(29) 10:15 - 10:40
Indoor Long Distance High Speed Imaging MIMO System With Linear Transmitting Element Array
Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya University)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Mar 5 AM Online Room A: WBS 2 (10:55 - 11:45)
Chair: Ryohei Nakamura (National Defence Academy)
----------------------------------------

(30) 10:55 - 11:20
Vehicle Speed and Driving Distance Estimation using Millimeter-wave Radar
Keiji Jimi, Takeki Ogitsu (Gunma Univ.)

(31) 11:20 - 11:45
Improving of Interference Reduction Scheme Using Replica Signals for FMCW Radar
Fumiya Tako, Kohei Ohno (Meiji Univ.)

----------------------------------------
Fri, Mar 5 AM Online Room B: ISEC 4 (09:00 - 10:40)
----------------------------------------

(32) 09:00 - 09:25
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..)

(33) 09:25 - 09:50
Construction of non-malleable codes based on graph theory
Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.)

(34) 09:50 - 10:15
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing
Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech)

(35) 10:15 - 10:40
A Proposal for Causal Inference with Subjective Evaluation
Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Mar 5 AM Online Room B: ISEC 5 (10:55 - 12:35)
----------------------------------------

(36) 10:55 - 11:20
Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.)

(37) 11:20 - 11:45
Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.)

(38) 11:45 - 12:10
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction
Hiroaki Anada (Univ. of Nagasaki)

(39) 12:10 - 12:35
Fast Multiparty Threshold ECDSA With Robustness
Wang zhaobo, Atsuko Miyaji (Osaka Univ.)

----- Lunch Break -----

----------------------------------------
Fri, Mar 5 PM Online Room A: IT 4 (14:20 - 15:10)
Chair: Shota Saito (Waseda University)
----------------------------------------

(40) 14:20 - 14:45
Improvement of Cicalese-Gargano-Vaccaro Algorithm for the Minimum-Entropy Couplings Problem
Kohei Sakatani, Ken-ichi Iwata (Univ. of Fukui), Hiroshi Fujisaki (Kanazawa Univ.)

(41) 14:45 - 15:10
Analysis of Optimal Error Exponents on Classification for Markov Sources
Hiroto Kuramata, Hideki Yagi, Tsutomu Kawabata (UEC)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Mar 5 PM Online Room A: Invited Talk (IT) (15:25 - 16:15)
Chair: Tadashi Wadayama (Nagoya Institute of Technology)
----------------------------------------

(42) 15:25 - 16:15
[Invited Talk]
Lee Metric Error Correcting Codes on Two-Dimensional Lattices
Hiroyoshi Morita (UEC)

----------------------------------------
Fri, Mar 5 PM Online Room B: ISEC 6 (13:30 - 15:10)
----------------------------------------

(43) 13:30 - 13:55
Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT)

(44) 13:55 - 14:20
Analysis of Attack Activities for Honeypot Installation in Ethereum Network.
Chin Kota, Omote Kazumasa (Univ. Tsukuba)

(45) 14:20 - 14:45
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC)

(46) 14:45 - 15:10
Consideration of embedding methods and machine learning models for detecting malicious URLs
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba)

----- Break (After the break, the invited talk will be held in Session A.) ( 15 min. ) -----

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
Poster Presentation will have 80 minutes for presentation.
Invited Talk will have 40 minutes for presentation and 10 minutes for discussion.

# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.


=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:

Thu, May 20, 2021 - Fri, May 21, 2021: Online [Fri, Mar 12], Topics: Information Security, Information Theory, Information Hiding, etc.

# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Takayuki Nozaki (Yamaguchi University)
Masanori Hirotomo (Saga University)
Takahiro Ota (Senshu University)

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Wed, May 19, 2021: Online [Fri, Mar 12]

# SECRETARY:
Kazumasa Omote (University of Tsukuba)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:

Thu, May 20, 2021 - Fri, May 21, 2021 (tentative): Online (Zoom) [Fri, Mar 12], Topics: Coding, Modulation, Signal processing, Reliable Communication and Control, Healthcare and Medical Information Communication Technologies, and General

# SECRETARY:
Shintaro Arai (Okayama Univ. of Sci.)
E-mail: aieeous


Last modified: 2021-03-03 22:03:45


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan