IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Theory (IT) [schedule] [select]
Chair Masayoshi Ohashi (Fukuoka Univ.)
Vice Chair Jun Muramatsu (NTT)
Secretary Takahiro Yoshida (Yokohama College of Commerce), Hideki Yagi (UEC)
Assistant Sigeaki Kuzuoka (wakayama univ.)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Kazuto Ogawa (NHK)
Vice Chair Atsushi Fujioka (Kanagawa Univ.), Shiho Moriai (NICT)
Secretary Takaaki Mizuki (Tohoku Univ.), Toshihiro Ohigashi (Tokai Univ.)
Assistant Keita Emura (NICT), Yuichi Komano (TOSHIBA), Yuuji Suga (IIJ)

Technical Committee on Wideband System (WBS) [schedule] [select]
Chair Fumiaki Maehara (Waseda Univ.)
Vice Chair Masanori Hamamura (Kochi Univ. of Tech.), Fumie Ono (NICT)
Secretary Yasunori Nouda (Mitsubishi Electric), Yusuke Kozawa (Ibaraki Univ.)
Assistant Akira Nakamura (Tokyo Univ. of Science), Ryohei Nakamura (National Defense Academy)

Conference Date Thu, Mar 8, 2018 09:00 - 17:50
Fri, Mar 9, 2018 09:00 - 17:00
Topics joint meeting of IT, ISEC, and WBS 
Conference Place  
Sponsors This conference is co-sponsored by IEEE IT Society Japan Chapter.

Thu, Mar 8 AM 
09:00 - 10:40
(1) 09:00-09:25 Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
(2) 09:25-09:50 Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.)
(3) 09:50-10:15 Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC)
(4) 10:15-10:40 Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.)
  10:40-10:50 Break ( 10 min. )
Thu, Mar 8 AM 
10:50 - 12:05
(5) 10:50-11:15 The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech)
(6) 11:15-11:40 Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants Takashi Hisatome, Hiroki Koga (Univ. Tsukuba)
(7) 11:40-12:05 Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation Kotaro Okada, Hiroki Koga (Univ. of Tsukuba)
  12:05-13:00 Lunch Break ( 55 min. )
Thu, Mar 8 PM 
13:00 - 14:40
(8) 13:00-13:25 Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech)
(9) 13:25-13:50 Optimality for the Iterative Construction Scheme of AIFV-$m$ codes Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
(10) 13:50-14:15 Optimal Coded Caching using Linear Programming Shota Kamiya, Hiroki Koga (Univ. Tsukuba)
(11) 14:15-14:40 Shifted Coded Slotted ALOHA Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
  14:40-15:00 Break ( 20 min. )
Thu, Mar 8 PM 
15:00 - 15:50
(12) 15:00-15:50 [Invited Talk]
On Traitor Tracings and Related Topics
Shota Yamada (AIST)
  15:50-16:00 Break ( 10 min. )
Thu, Mar 8 PM 
16:00 - 16:50
(13) 16:00-16:50 [Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK)
  16:50-17:00 Break ( 10 min. )
Thu, Mar 8 PM 
17:00 - 17:50
(14) 17:00-17:50 [Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute)
Thu, Mar 8 AM 
09:00 - 10:40
(15) 09:00-09:25 Effect on randomizing components to the security of Minalpher Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
(16) 09:25-09:50 A study on hierarchical secret sharing schemes applicable to any level based on XOR operations Koji Shima, Hiroshi Doi (IISEC)
(17) 09:50-10:15 Succinct Oblivious RAM Taku Onodera, Tetsuo Shibuya (IMSUT)
(18) 10:15-10:40 High Efficient Scalar Multiplication in Elliptic Curve Cryptography Noboru Takeuchi, Toshiyuki Kinoshita (TUT)
  10:40-10:50 Break ( 10 min. )
Thu, Mar 8 AM 
10:50 - 12:05
(19) 10:50-11:15 Digital watermark using deep-learning classification Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
(20) 11:15-11:40 Evaluation of deep learning method for detection of intrusion packets Tomoki Ueno, Mitiko Harayama (GIFU Univ)
(21) 11:40-12:05 Reply analysis between Twitter users using machine learning
-- Distinguish real-life/online friends --
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU)
  12:05-13:00 Lunch Break ( 55 min. )
Thu, Mar 8 PM 
13:00 - 13:50
(22) 13:00-13:25 On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.)
(23) 13:25-13:50 Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
Fri, Mar 9 AM 
09:25 - 10:40
(24) 09:25-09:50 A study on segmented deletion error correction using polar code Hikari Koremura, Haruhiko Kaneko (Tokyo Tech)
(25) 09:50-10:15 Bayes Optimal AMP Decoder for Sparse Superposition Codes Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)
(26) 10:15-10:40 Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code Ryoma Sakai, Kazuhiko Yamaguchi (UEC)
  10:40-10:50 Break ( 10 min. )
Fri, Mar 9 AM 
10:50 - 12:30
(27) 10:50-11:15 Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.)
(28) 11:15-11:40 Non-binary codes correcting a burst of deletions or insertions Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
(29) 11:40-12:05 Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.)
(30) 12:05-12:30 Consideration of error correction code suitable for WBAN Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications)
  12:30-13:30 Lunch Break ( 60 min. )
Fri, Mar 9 PM 
13:30 - 15:10
(31) 13:30-13:55 On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures Yuta Sakai (Univ. Fukui)
(32) 13:55-14:20 Parameter orthogonalization method in quantum parameter estimation problem Jun Suzuki (UEC)
(33) 14:20-14:45 Improved Lossless Compression by Substring Enumeration Using Sorting Takahiro Ota (NPIT), Akiko Manada (UEC)
(34) 14:45-15:10 The Error Performance Analysis of the K-best Viterbi Decoding Algorithm Hideki Yoshikawa (Tohoku Gakuin Univ.)
  15:10-15:45 Break ( 35 min. )
Fri, Mar 9 PM 
15:45 - 16:35
(35) 15:45-16:10 Quantum &Classical Radar Camera for Automotive and Effect of Fog-2
-- Sparse Modeling --
Osamu Hirota (Tamagawa Univ.)
(36) 16:10-16:35 Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.)
Fri, Mar 9 AM 
09:00 - 10:40
(37) 09:00-09:25 A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
(38) 09:25-09:50 On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
(39) 09:50-10:15 On (Un)Deniability of Plausible Deniability Atsushi Waseda, Ryo Nojima (NICT)
(40) 10:15-10:40 Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys Miho Ishikawa, Junji Shikata (Yokohama National Univ.)
  10:40-10:50 Break ( 10 min. )
Fri, Mar 9 AM 
10:50 - 11:40
(41) 10:50-11:15 On Security Evaluation for Coset Coding in Wiretap Channel Coding Yuki Mori, Tomohiro Ogawa (UEC)
(42) 11:15-11:40 Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.)
  11:40-13:30 Lunch Break ( 110 min. )
Fri, Mar 9 PM 
13:30 - 15:10
(43) 13:30-13:55 Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas
-- for High Performance Error-Control Coding --
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS)
(44) 13:55-14:20 Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.)
(45) 14:20-14:45 Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.)
(46) 14:45-15:10 Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT)
  15:10-15:20 Break ( 10 min. )
Fri, Mar 9 PM 
15:20 - 17:00
(47) 15:20-15:45 On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
(48) 15:45-16:10 Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
(49) 16:10-16:35 A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
(50) 16:35-17:00 BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
IT Technical Committee on Information Theory (IT)   [Latest Schedule]
Contact Address E--mail:it-c(to IT Secretaries)
.
Takahiro Yoshida (Yokohama College of Commerce)
Hideki Yagi (University of Electro-Communications)
Shigeaki Kuzuoka (Wakayama University) 
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Takaaki Mizuki (Tohoku University)
E--mail: ic-c (to ISEC secretaries) 
WBS Technical Committee on Wideband System (WBS)   [Latest Schedule]
Contact Address Yasunori Nouda (Mitsubishi Electric Corporation)
TEL +81-467-41-2850
E--mail: yum 


Last modified: 2018-03-01 18:09:22


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan