The search functionality is under construction.

Author Search Result

[Author] Eiji OKAMOTO(57hit)

21-40hit(57hit)

  • Application of Wavelet Packet Modulation to Mobile Communication

    Eiji OKAMOTO  Yasunori IWANAMI  Tetsushi IKEGAMI  

     
    PAPER

      Vol:
    E87-A No:10
      Page(s):
    2684-2691

    Wavelet packet modulation (WPM) using the discrete wavelet transform is a multiplexing transmission method in which data is assigned to wavelet subbands having different time and frequency resolutions. The WPM keeps data transmission throughput even in tone and impulse interference environments that cannot be achieved with conventional multiplexing methods such as TDM (Time division multiplexing) or OFDM (Orthogonal frequency division multiplexing). In this paper, we propose an effective multicarrier transmission method of WPM for wireless mobile communications. First, the transmission characteristics of WPM in fading environments are minutely investigated. Then, taking the advantage of the WPM and the OFDM that has an equalizing technique in multipath fading environments, we propose a multimode transmission method using them. The adaptive transmission in those fading and interference environments is achieved by using the multimode transmission. Their transmission performances are evaluated by computer simulations.

  • Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials

    Naoki KANAYAMA  Yang LIU  Eiji OKAMOTO  Kazutaka SAITO  Tadanori TERUYA  Shigenori UCHIYAMA  

     
    LETTER

      Vol:
    E97-A No:1
      Page(s):
    300-302

    We implemented a scalar multiplication method over elliptic curves using division polynomials. We adapt an algorithm for computing elliptic nets proposed by Stange. According to our experimental results, the scalar multiplication method using division polynomials is faster than the binary method in an affine coordinate system.

  • Reliability Functions for Concatenated Codes Employing Modular Codes with Maximum Likelihood Decoding

    Tomohiko UYEMATSU  Junya KAGA  Eiji OKAMOTO  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1160-1169

    This paper investigates the error correcting capabilities of concatenated codes employing algebraic geometry codes as outer codes and time-varying randomly selected inner codes, used on discrete memoryless channels with maximum likelihood decoding. It is proved that Gallager's random coding error exponent can be obtained for all rates by such codes. Further, it is clarified that the error exponent arbitrarily close to Gallager's can be obtained for almost all random selections of inner codes with a properly chosen code length, provided that the length of the outer code is sufficiently large. For a class of regular channels, the result is also valid for linear concatenated codes, and Gallager's expurgated error exponent can be asymptotically obtained for all rates.

  • An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding

    Yuta KOSHIMIZU  Eiji OKAMOTO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:8
      Page(s):
    2119-2130

    In this paper, we propose an efficient channel estimation scheme in bi-directional wireless orthogonal frequency division multiplexing (OFDM) relay systems applying analog network coding (ANC). In the relay systems applying ANC, channel separation is needed to estimate each of the bi-directional channels simultaneously from the combined received signal. In the conventional channel estimation schemes, relatively higher-ratio pilots are needed to obtain accurate channels. In contrast, we propose a channel estimation scheme with sparse pilots, while maintaining high accuracy for channel estimation. In the proposed scheme, Walsh codes are inserted as the pilot symbols at both end nodes, and the individual channels are obtained by correlation processing from the combined signals. The improved bit error rate (BER) and throughput performances of the proposed scheme are shown through computer simulations.

  • Optimum Pre-Emphasis for FM Transmission with Frequency-Domain Voice Scrambling

    Yoshihiko AKAIWA  Eiji OKAMOTO  Yukitsuna FURUYA  

     
    PAPER

      Vol:
    E72-E No:5
      Page(s):
    507-513

    With popularity of radio communication, voice scrambling has received increased attention for communication privacy. It has been known that pre-emphasis at the transmit side and de-emphasis at the receive side improves the received signal to noise power ratio (SNR) both for scrambled and nonscrambled signals. In this paper, optimum pre- and de-emphasis are theoretically investigated for FM and PM transmission including frequency-domain scrambling for voice security. Using a linear system model, the optimum frequency-characteristics for pre- and de-emphasis filter are given as a function of a voice signal spectrum, demodulator output noise spectrum, and the scrambling method. Comparisons of the maximum attainable SNR are made for various case including plain voice (non scrambling) and secured voice scrambled by spectrum inversion, reverberation and FFT spectrum transformation, assuming simple voice and noise spectra.

  • Secure Computation Protocols Using Polarizing Cards

    Kazumasa SHINAGAWA  Takaaki MIZUKI  Jacob C. N. SCHULDT  Koji NUIDA  Naoki KANAYAMA  Takashi NISHIDE  Goichiro HANAOKA  Eiji OKAMOTO  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1122-1131

    It is known that, using just a deck of cards, an arbitrary number of parties with private inputs can securely compute the output of any function of their inputs. In 2009, Mizuki and Sone constructed a six-card COPY protocol, a four-card XOR protocol, and a six-card AND protocol, based on a commonly used encoding scheme in which each input bit is encoded using two cards. However, up until now, there are no known results to construct a set of COPY, XOR, and AND protocols based on a two-card-per-bit encoding scheme, which all can be implemented using only four cards. In this paper, we show that it is possible to construct four-card COPY, XOR, and AND protocols using polarizing plates as cards and a corresponding two-card-per-bit encoding scheme. Our protocols use a minimum number of cards in the setting of two-card-per-bit encoding schemes since four cards are always required to encode the inputs. Moreover, we show that it is possible to construct two-card COPY, two-card XOR, and three-card AND protocols based on a one-card-per-bit encoding scheme using a common reference polarizer which is a polarizing material accessible to all parties.

  • A Note on the Pairing Computation Using Normalized Miller Functions

    Naoki OGURA  Shigenori UCHIYAMA  Naoki KANAYAMA  Eiji OKAMOTO  

     
    PAPER-Mathematics

      Vol:
    E95-A No:1
      Page(s):
    196-203

    This paper considers the normalization of Miller functions for computing “point-evaluation” pairings on an elliptic curve E over a finite field Fq, where the characteristic of Fq is neither 2 nor 3. It is shown that the normalized Miller functions for computing point-evaluation pairings on G2G1 when (i) the embedding degree k is even, or (ii) 3|k and E/Fq(q ≡ (1 mod 3)) is a curve of the form Y2=X3+b. Thus, there is no need to consider the normalization for computing pairings on many pairing-friendly elliptic curves.

  • 400Gbit/s/ch Field Demonstration of Modulation Format Adaptation Based on Pilot-Aided OSNR Estimation Using Real-Time DSP Open Access

    Seiji OKAMOTO  Kazushige YONENAGA  Kengo HORIKOSHI  Mitsuteru YOSHIDA  Yutaka MIYAMOTO  Masahito TOMIZAWA  Takeshi OKAMOTO  Hidemi NOGUCHI  Jun-ichi ABE  Junichiro MATSUI  Hisao NAKASHIMA  Yuichi AKIYAMA  Takeshi HOSHIDA  Hiroshi ONAKA  Kenya SUGIHARA  Soichiro KAMETANI  Kazuo KUBO  Takashi SUGIHARA  

     
    INVITED PAPER

      Pubricized:
    2017/04/20
      Vol:
    E100-B No:10
      Page(s):
    1726-1733

    We describe a field experiment of flexible modulation format adaptation on a real-time 400Gbit/s/ch DSP-LSI. This real-time DSP-LSI features OSNR estimation, practical simplified back propagation, and high gain soft-decision forward error correction. With these techniques, we have successfully demonstrated modulation format allocation and transmission of 56-channel 400Gbit/s-2SC-PDM-16QAM and 200Gbit/s-2SC-PDM-QPSK signals in 216km and 3246km standard single mode fiber, respectively.

  • Algebraic Properties of Permutation Polynomials

    Eiji OKAMOTO  Wayne AITKEN  George Robert BLAKLEY  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    494-501

    Polynomials are called permutation polynomials if they induce bijective functions. This paper investigates algebraic properties of permutation polynomials over a finite field, especially properties associated with permutation cycles. A permutation polynomial has a simple structure but good randomness properties suitable for applications. The cycle structure of permutations are considered to be related to randomness. We investigate the algebraic structure from the viewpoint of randomness. First we show the relationship between polynomials and permutations using a matrix equation. Then, we give a general form of a permutation polynomial corresponding to a product C1C2Ck of pairwise disjoint cycles. Finally, permutation polynomials with fixed points -or with 2, 3 and 4-cycles -and their compositions are given together with distribution of degree of the permutation polynomials.

  • A Comparative Study on Time Domain Sequential Equalizer with MLD and MLSE Equalizer on MIMO Frequency Selective Channels

    Satoshi NAKANOBU  Yasunori IWANAMI  Eiji OKAMOTO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3197-3202

    In this paper, we investigate two receiver structures for spatially multiplexed transmission on MIMO frequency selective fading channels. Those receivers compensate the IAI (Inter-Antenna Interference) and ISI (Inter-Symbol Interference) in the time domain. We first propose the MIMO sequential equalizer in which the block of several receives symbols is processed symbol by symbol by MLD (Maximum Likelihood Detection). Next we investigate the MIMO MLSE (Maximum Likelihood Sequence Estimation) receiver in which the terminated block trellis is decoded by the Viterbi algorithm. The bit error rates of two time domain receivers are examined through computer simulations and we also compare their BER characteristics to those of the conventional MIMO SC-FDE.

  • An Accurate Indoor-Localization Scheme with NLOS Detection and Elimination Exploiting Stochastic Characteristics

    Manato HORIBA  Eiji OKAMOTO  Toshiko SHINOHARA  Katsuhiko MATSUMURA  

     
    PAPER

      Vol:
    E98-B No:9
      Page(s):
    1758-1767

    In indoor localization using sensor networks, performance improvements are required for non-line-of-sight (NLOS) environments in which the estimation error is high. NLOS mitigation schemes involve the detection and elimination of the NLOS measurements. The iterative minimum residual (IMR) scheme, which is often applied to the localization scheme using the time of arrival (TOA), is commonly employed for this purpose. The IMR scheme is a low-complexity scheme and its NLOS detection performance is relatively high. However, when there are many NLOS nodes in a sensor field, the NLOS detection error of the IMR scheme increases and the estimation accuracy deteriorates. Therefore, we propose a new scheme that exploits coarse NLOS detection based on stochastic characteristics prior to the application of the IMR scheme to improve the localization accuracy. Improved performances were confirmed in two NLOS channel models by performing numerical simulations.

  • Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear Modulation Open Access

    Tomoki KAGA  Mamoru OKUMURA  Eiji OKAMOTO  Tetsuya YAMAMOTO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/10/25
      Vol:
    E105-B No:5
      Page(s):
    638-647

    In the fifth-generation mobile communications system (5G), it is critical to ensure wireless security as well as large-capacity and high-speed communication. To achieve this, a chaos modulation method as an encrypted and channel-coded modulation method in the physical layer is proposed. However, in the conventional chaos modulation method, the decoding complexity increases exponentially with respect to the modulation order. To solve this problem, in this study, a hybrid modulation method that applies quadrature amplitude modulation (QAM) and chaos to reduce the amount of decoding complexity, in which some transmission bits are allocated to QAM while maintaining the encryption for all bits is proposed. In the proposed method, a low-complexity decoding method is constructed by ordering chaos and QAM symbols based on the theory of index modulation. Numerical results show that the proposed method maintains good error-rate performance with reduced decoding complexity and ensures wireless security.

  • Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study

    Anton ROMANOV  Eiji OKAMOTO  

     
    PAPER

      Vol:
    E93-B No:6
      Page(s):
    1411-1421

    With the increasing demand for services provided by communication networks, quality and reliability of such services as well as confidentiality of data transfer are becoming ones of the highest concerns. At the same time, because of growing hacker's activities, quality of provided content and reliability of its continuous delivery strongly depend on integrity of data transmission and availability of communication infrastructure, thus on information security of a given IT landscape. But, the amount of resources allocated to provide information security (like security staff, technical countermeasures and etc.) must be reasonable from the economic point of view. This fact, in turn, leads to the need to employ a forecasting technique in order to make planning of IT budget and short-term planning of potential bottlenecks. In this paper we present an approach to make such a forecasting for a wide class of information security related incidents (ISRI) -- unambiguously detectable ISRI. This approach is based on different auto regression models which are widely used in financial time series analysis but can not be directly applied to ISRI time series due to specifics related to information security. We investigate and address this specifics by proposing rules (special conditions) of collection and storage of ISRI time series, adherence to which improves forecasting in this subject field. We present an application of our approach to one type of unambiguously detectable ISRI -- amount of spam messages which, if not mitigated properly, could create additional load on communication infrastructure and consume significant amounts of network capacity. Finally we evaluate our approach by simulation and actual measurement.

  • Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

    Yukou KOBAYASHI  Naoto YANAI  Kazuki YONEYAMA  Takashi NISHIDE  Goichiro HANAOKA  Kwangjo KIM  Eiji OKAMOTO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:12
      Page(s):
    2991-3006

    By using Password-based Authenticated Key Exchange (PAKE), a server can authenticate a user who has only the same password shared with the server in advance and establish a session key with the user simultaneously. However, in the real applications, we may have a situation where a user needs to share a session key with server A, but the authentication needs to be done by a different server B that shares the password with the user. Further, to achieve higher security on the server side, it may be required to make PAKE tolerant of a server breach by having multiple authentication servers. To deal with such a situation, Abdalla et al. proposed a variant of PAKE called Gateway Threshold PAKE (GTPAKE) where a gateway corresponds to the aforementioned server A being an on-line service provider and also a potential adversary that may try to guess the passwords. However, the schemes of Abdalla et al. turned out to be vulnerable to Undetectable On-line Dictionary Attack (UDonDA). In this paper, we propose the first GTPAKE provably secure against UDonDA, and in the security analysis, we prove that our GTPAKE is secure even if an adversary breaks into parts of multiple authentication servers.

  • Permutation Cipher Scheme Using Polynomials over a Field

    Eiji OKAMOTO  Tomohiko UYEMATSU  Masahiro MAMBO  

     
    PAPER-Information Security

      Vol:
    E78-D No:2
      Page(s):
    138-142

    A permutation cipher scheme using polynomials over a field is presented. A permutation as well as substitution plays a major role in almost all conventional cryptosystems. But the security of the permutation depends on how symbols are permuted. This paper proposes the use of polynomials for the permutation and show that the scheme satisfies the following security criteria. (1) There are enough encryption keys to defend exhaustive attacks. (2) The permutation moves almost all samples into places which are different from the original places. (3) Most samples are shifted differently by different permutations. The permutation cipher scheme could be regarded as a scheme based on Reed-Solomon codes. The information symbols of the codes compose a key of the permutation cipher scheme.

  • An Effective Downlink Resource Allocation Scheme Based on MIMO-OFDMA-CDM in Cellular System

    Yasuhiro FUWA  Eiji OKAMOTO  Yasunori IWANAMI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:12
      Page(s):
    3550-3558

    Orthogonal frequency division multiple access (OFDMA) is adopted as a multiuser access scheme in recent cellular systems such as long term evolution (LTE) and WiMAX. In those systems, the performance improvement on cell-edge users is crucial to provide high-speed services. We propose a new resource allocation scheme based on multiple input multiple output – orthogonal frequency division multiple access – code division multiplexing (MIMO-OFDMA-CDM) to achieve performance improvements in terms of cell-edge user throughput, bit error rate, and fairness among users. The proposed scheme adopts code division multiplexing for MIMO-OFDMA and a modified proportional fairness algorithm for CDM, which enables the fairness among users and a higher throughput. The performance improvements are clarified by theoretical analysis and simulations.

  • A Fast Signature Scheme with New On-line Computation

    Takeshi OKAMOTO  Hirofumi KATSUNO  Eiji OKAMOTO  

     
    LETTER

      Vol:
    E87-A No:5
      Page(s):
    1154-1161

    In this paper, we propose a fast signature scheme which realizes short transmissions and minimal on-line computation. Our scheme requires a modular exponentiation as preprocessing (i.e., off-line computation). However, we need to acknowledge the existance of the following remarkable properties: neither multiplication nor modular reduction is used in the actual signature generation (i.e., on-line computation). Our scheme requires only two operations: hashing and addition. Although some fast signature schemes with small on-line computation have been proposed so far, those schemes require multiplication or modular reduction in the on-line phase. This leads to a large amount of work compared to that of addition. As far as we know, this is the first approach to obtain the fast signature without those two calculus methods.

  • Optimised Versions of the Ate and Twisted Ate Pairings

    Seiichi MATSUDA  Naoki KANAYAMA  Florian HESS  Eiji OKAMOTO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E92-A No:7
      Page(s):
    1660-1667

    We observe a natural generalisation of the ate and twisted ate pairings, which allow for performance improvements in non standard applications of pairings to cryptography like composite group orders. We also give a performance comparison of our pairings and the Tate, ate and twisted ate pairings for certain polynomial families based on operation count estimations and on an implementation, showing that our pairings can achieve a speedup of a factor of up to two over the other pairings.

  • A Simple Parallel Algorithm for the Ziv-Lempel Encoding

    Ken-ichi IWATA  Masakatu MORII  Tomohiko UYEMATSU  Eiji OKAMOTO  

     
    LETTER-Information Theory and Coding Theory

      Vol:
    E81-A No:4
      Page(s):
    709-712

    Many Ziv-Lempel algorithms have a similar property, that is, slow encoding and fast decoding. This paper proposes a simple improved Ziv-Lempel algorithm to encode a large amount of data quickly as well as compactly by using multiple-processor system.

  • A Pilot-Symbol-Assisted Fading and Frequency-Offset Compensation Method Using FFT

    Eiji OKAMOTO  Huan-Bang LI  Tetsushi IKEGAMI  

     
    PAPER

      Vol:
    E85-A No:7
      Page(s):
    1656-1664

    Methods that precisely compensate for propagation distortion using pilot symbols are widely used in mobile communications. We describe such a pilot-symbol-assisted technique for precise compensation of flat fading and frequency offset. This technique provides a wide range of offset compensation. Conventional methods using fast Fourier transform (FFT) compensate for both slow and fast fading, but their tolerable range of frequency offset is very limited. By composing a system with an approximate frequency estimator, we can estimate and compensate for fading and a large frequency offset at the same time. The estimation and compensation are carried out by periodic pilot symbols and no other index sequences are needed. This method enables high-data-rate transmission. We describe the method and provide a theoretical analysis for the compensable range of fading and frequency offset for a transmission frame structure with pilot symbols. Then, we evaluate the method by computer simulation.

21-40hit(57hit)