Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Novel Image authentication scheme using error correction code and digital signature Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 |
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] |
ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 pp.91-96 |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 |
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more] |
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 pp.74-79 |
QIT (2nd) |
2022-12-09 17:30 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Advance Sharing of Quantum Shares for Classical Secrets Rina Miyajima, Ryutaroh Matsumoto (Tokyo Tech) |
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret ... [more] |
|
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
RCS, SR, SRW (Joint) |
2020-03-05 15:10 |
Tokyo |
Tokyo Institute of Technology (Cancelled but technical report was issued) |
Study on application of Reed-Solomon product code for optical on-off keying satellite communication
-- A space link in 6G networks -- Eiji Okamoto (NITech), Hiroaki Yamazoe, Shinji Ohta (SONY CSL) RCS2019-370 |
In consultative committee for space data system (CCSDS), which standardizes techniques for satellite communications, dis... [more] |
RCS2019-370 pp.257-262 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2019-03-15 15:15 |
Kagoshima |
Kagoshima University |
Minimizing the reception completion times in one-to-many file transfer using MultiPath-MultiCast with Reed-Solomon coding Masayuki Kurata, Kenji Heira, Masahiro Shibata, Masato Tsuru (KIT) CQ2018-116 |
A rapid increase in network traffic has caused a problem along with the penetration of sharing, duplicating, or migratin... [more] |
CQ2018-116 pp.129-134 |
IT, ISEC, WBS |
2019-03-08 13:30 |
Tokyo |
University of Electro-Communications |
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123 |
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more] |
IT2018-122 ISEC2018-128 WBS2018-123 pp.285-290 |
RCS |
2018-06-21 13:50 |
Nagasaki |
Nagasaki University |
Differential Orthogonal Frequency Division Multiplexing Employing Reed-Solomon Codes Kotaro Hotta, Hiroshi Kubo, Hiroshi Kubo (Ritsumeikan Univ.) RCS2018-60 |
This paper discusses differential orthogonal frequency-division multiplexing (OFDM) in severe time and frequency selecti... [more] |
RCS2018-60 pp.149-154 |
IT |
2017-09-08 09:50 |
Yamaguchi |
Centcore Yamaguchi Hotel |
On the weight distributions of the binary codes obtained from Reed-Solomon codes over GF(2^m) Tshihisa Nishijima (Hosei Univ.) IT2017-40 |
In this report, we give a necessary and sufficient condition for symmetry of the weight distribution of the binary ... [more] |
IT2017-40 pp.11-14 |
IT |
2017-09-08 10:15 |
Yamaguchi |
Centcore Yamaguchi Hotel |
Demonstration example of 1 block error correction similar to Reed-Solomon code for students of elementary school 4th or higher grades
-- At The Annual Science Festival at Miyakonojo Kosen -- Hirofumi Nakamura (NIT, Miyakonojo College) IT2017-41 |
This report is not a report on new technical knowledge, but is a report on an example of an initiative designed to help ... [more] |
IT2017-41 pp.15-20 |
IT |
2017-07-13 10:40 |
Chiba |
Chiba University |
Study on Secret Sharing Scheme for Distributed Storage System Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2017-18 pp.11-14 |
IT |
2017-07-14 13:45 |
Chiba |
Chiba University |
Unequal Error Protection Codes Based on Reed-Solomon Codes over $GF(2^{m})$ Toshihisa Nishijima (Hosei Univ.) IT2017-32 |
A new class of unequal error protection codes based on Reed-Solomon codes over $GF(2^{m})$ is proposed by using the codi... [more] |
IT2017-32 pp.91-95 |
SAT, RCS (Joint) |
2016-08-18 13:40 |
Miyagi |
Tohoku Gakuin University |
[Invited Lecture]
A study on application of Reed-Solomon-Spinal concatenation code for free-space optics Naoya Saiki, Eiji Okamoto (NITech), Hideki Takenaka, Hiroo Kunimori, Kolev Dimitar, Hiroyuki Endo, Yusuke Kobayashi, Morio Tyoshima, Mikio Hujiwara, Masahide Sasaki (NICT), Takao Aoki (Waseda Univ.), Koichi Gyoda (SIT) SAT2016-40 RCS2016-133 |
Recently, satellite laser communication is attracting attention as an important infrastructure to achieve increasing dem... [more] |
SAT2016-40 RCS2016-133 pp.43-48(SAT), pp.25-30(RCS) |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 13:25 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Proposals of K(AI), K(AII) and K(AIII)Schemes for augmenting code-based PKC, product-sum type PKC and multivariate PKC Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2015-13 SITE2015-11 ICSS2015-23 EMM2015-21 |
In this paper we present three new schemes for augmenting the conventional code-based PKC(CBPKC), product-sum type PKC($... [more] |
ISEC2015-13 SITE2015-11 ICSS2015-23 EMM2015-21 pp.59-64 |
RECONF |
2015-06-20 11:35 |
Kyoto |
Kyoto University |
FPGA Implementation of a key generation circuit using PUF and Fuzzy Extractor on SASEBO-G3 Yohei Hori, Toshihiro Katashita (AIST) RECONF2015-19 |
We implemented a key generation circuit using a Physically Unclonable Function (PUF) and Fuzzy Extractor (FE) to a Kinte... [more] |
RECONF2015-19 pp.103-108 |
EMM |
2015-01-29 13:45 |
Miyagi |
Tohoku University |
Introduction of concatenated codes for digital watermarking Nobuhiro Hirata, Masaki Kawamura (Yamaguchi Univ.) EMM2014-75 |
We show that concatenated codes, which are combinations of error-correcting codes, can improve performance of watermarki... [more] |
EMM2014-75 pp.51-56 |
IT |
2014-07-18 09:30 |
Hyogo |
Kobe University |
Recognition Accuracy Improvement of QR Code by Using GMD Decoding Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ) IT2014-27 |
In recent years, two-dimensional codes typified by QR code is used in various scenes such as in medical prescription and... [more] |
IT2014-27 pp.89-94 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2013-88 ISEC2013-117 WBS2013-77 pp.215-220 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
IT |
2013-07-26 10:10 |
Tokyo |
Nishi-Waseda campus, Waseda University |
Performance Evaluation of 3D DWT Video Transmission with Invertible Codes Kotoku Omura, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.), Hirokazu Tanaka (Toshiba), Miki Haseyama (Hokkaido Univ.) IT2013-21 |
The objective of this study is to indicate efficacy of error resilience using invertible codes to three-dimensional disc... [more] |
IT2013-21 pp.49-53 |