The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

11841-11860hit(42807hit)

  • Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application

    Mitsuhiro HATTORI  Takato HIRANO  Takashi ITO  Nori MATSUDA  Takumi MORI  Yusuke SAKAI  Kazuo OHTA  

     
    PAPER-Public Key Based Protocols

      Vol:
    E96-A No:1
      Page(s):
    53-67

    We propose a new hidden vector encryption (HVE) scheme that we call a ciphertext-policy delegatable hidden vector encryption (CP-dHVE) scheme. Several HVE schemes have been proposed and their properties have been analyzed extensively. Nonetheless, the definition of the HVE has been left unchanged. We therefore reconsider it, and point out that the conventional HVE should be categorized as the key-policy HVE, because the vectors corresponding to the secret keys can contain wildcards (which specify an access policy) whereas those corresponding to the ciphertexts cannot contain them. We then formalize its dual concept, the ciphertext-policy HVE, and propose a concrete scheme. Then, as an application of our scheme, we propose a public-key encryption with conjunctive keyword search scheme that can be used in the hierarchical user systems. Our scheme is novel in that the ciphertext size grows logarithmically to the number of uses in the system, while that of a conventional scheme grows linearly.

  • Security of Hash-then-CBC Key Wrapping Revisited

    Yasushi OSAKI  Tetsu IWATA  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E96-A No:1
      Page(s):
    25-34

    Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security definitions for key wrapping schemes. One captures the security against chosen plaintext attacks (called DAE-security), and the other captures known plaintext attacks (called AKW-security). In this paper, we revisit the security of Hash-then-CBC key wrapping schemes. In [17], Osaki and Iwata showed that the UCC-then-CBC key wrapping scheme, a key wrapping scheme that uses the UCC hash function and CBC mode, has provable AKW-security. In this paper, we show that the scheme achieves the stronger notion of DAE-security. We also show our proof in the variable input length setting, where the adversary is allowed making queries of varying lengths. Furthermore, we consider the scheme that incorporates the use of headers. To handle such a setting, we generalize the previous definition of the UCC hash function to the variable input length setting and to take the header as its input, and show an efficient construction that meets the definition.

  • New POI Construction with Street-Level Imagery

    Chillo GA  Jeongho LEE  Won Hee LEE  Kiyun YU  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E96-D No:1
      Page(s):
    129-133

    We present a novel point of interest (POI) construction approach based on street-level imagery (SLI) such as Google StreetView. Our method consists of: (1) the creation of a conflation map between an SLI trace and a vector map; (2) the detection of the corresponding buildings between the SLI scene and the conflation map; and (3) POI name extraction from a signboard in the SLI scene by user-interactive text recognition. Finally, a POI is generated through a combination of the POI name and attributes of the building object on a vector map. The proposed method showed recall of 92.99% and precision of 97.10% for real-world POIs.

  • Automatic Topic Identification for Idea Summarization in Idea Visualization Programs

    Kobkrit VIRIYAYUDHAKORN  Susumu KUNIFUJI  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E96-D No:1
      Page(s):
    64-72

    Recent idea visualization programs still lack automatic idea summarization capabilities. This paper presents a knowledge-based method for automatically providing a short piece of English text about a topic to each idea group in idea charts. This automatic topic identification makes used Yet Another General Ontology (YAGO) and Wordnet as its knowledge bases. We propose a novel topic selection method and we compared its performance with three existing methods using two experimental datasets constructed using two idea visualization programs, i.e., the KJ Method (Kawakita Jiro Method) and mind-mapping programs. Our proposed topic identification method outperformed the baseline method in terms of both performance and consistency.

  • Correlated Noise Reduction for Electromagnetic Analysis

    Hongying LIU  Xin JIN  Yukiyasu TSUNOO  Satoshi GOTO  

     
    PAPER-Implementation

      Vol:
    E96-A No:1
      Page(s):
    185-195

    Electromagnetic emissions leak confidential data of cryptographic devices. Electromagnetic Analysis (EMA) exploits such emission for cryptanalysis. The performance of EMA dramatically decreases when correlated noise, which is caused by the interference of clock network and exhibits strong correlation with encryption signal, is present in the acquired EM signal. In this paper, three techniques are proposed to reduce the correlated noise. Based on the observation that the clock signal has a high variance at the signal edges, the first technique: single-sample Singular Value Decomposition (SVD), extracts the clock signal with only one EM sample. The second technique: multi-sample SVD is capable of suppressing the clock signal with short sampling length. The third one: averaged subtraction is suitable for estimation of correlated noise when background samplings are included. Experiments on the EM signal during AES encryption on the FPGA and ASIC implementation demonstrate that the proposed techniques increase SNR as much as 22.94 dB, and the success rates of EMA show that the data-independent information is retained and the performance of EMA is improved.

  • Hybrid DCT/DST Precoding Scheme for the PAPR Reduction of OFDM Systems

    Soobum CHO  Sang Kyu PARK  

     
    LETTER

      Vol:
    E96-A No:1
      Page(s):
    296-297

    A new peak-to-average power ratio (PAPR) reduction scheme for orthogonal frequency division multiplexing (OFDM) is proposed based on the discrete cosine transform (DCT) and discrete sine transform (DST) precodings. Since the DCT and DST precodings concentrate energy into a few components, the hybrid application of the precodings to the real and imaginary parts of mapping symbols can significantly reduce the PAPR. Simulations show that the proposed scheme achieves significantly low PAPR without degrading the bit error rate (BER) compared to existing precoding schemes.

  • FOREWORD

    Tsutomu MATSUMOTO  

     
    FOREWORD

      Vol:
    E96-A No:1
      Page(s):
    1-1
  • MIMO Phase Control Relaying System

    Atsuki MIZUNO  Daisuke UCHIDA  Hiroyuki ARAI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    340-343

    The current amplify and forward (AF) model causes interference at a mobile terminal (MT) because of relay delay or noise amplification. Therefore, this paper proposes a MIMO phase control relaying system without amplification. The proposed scheme enhances both the communication quality and the channel capacity. Computer simulations indicate the effectiveness of the proposed scheme.

  • An Asynchronous Striping-Aware Readahead Framework for Disk Arrays in Linux

    Sung Hoon BAEK  

     
    PAPER-Software System

      Vol:
    E96-D No:1
      Page(s):
    19-27

    Disk arrays and prefetching schemes are used to mitigate the performance gap between main memory and disks. This paper presents a new problem that arises if prefetching schemes that are widely used in operation systems are applied to disk arrays. The key point of the problem is that block address space from the viewpoint of the host is contiguous but from that of the disk array it is discontiguous and thus more disk accesses than expected are required. This paper presents two ways to resolve the problem that arises from the Linux readahead framework. The proposed scheme prevents a readahead window from being split into multiple requests from the viewpoint of the disk array but not from the viewpoint of the host thereby reducing disk head movements. In addition, it outperforms the prior work by adopting an asynchronous solution, improving performance for fragmented files, eliminating readahead size restriction, and improving disk parallelism. We implemented the proposed scheme and integrated it with Linux. Our experiment shows that the solution significantly improved the original Linux readahead framework when a storage server processes multiple concurrent requests.

  • FOREWORD Open Access

    Akihiro NAKAO  

     
    FOREWORD

      Vol:
    E96-B No:1
      Page(s):
    1-1
  • Approximate Nearest Neighbor Based Feature Quantization Algorithm for Robust Hashing

    Yue nan LI  Hao LUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E95-D No:12
      Page(s):
    3109-3112

    In this letter, the problem of feature quantization in robust hashing is studied from the perspective of approximate nearest neighbor (ANN). We model the features of perceptually identical media as ANNs in the feature set and show that ANN indexing can well meet the robustness and discrimination requirements of feature quantization. A feature quantization algorithm is then developed by exploiting the random-projection based ANN indexing. For performance study, the distortion tolerance and randomness of the quantizer are analytically derived. Experimental results demonstrate that the proposed work is superior to state-of-the-art quantizers, and its random nature can provide robust hashing with security against hash forgery.

  • Loop-Free IP Fast Rerouting Considering Double-Link Failures

    Shohei KAMAMURA  Daisaku SHIMAZAKI  Atsushi HIRAMATSU  Hidenori NAKAZATO  

     
    PAPER-Network

      Vol:
    E95-B No:12
      Page(s):
    3811-3821

    IP fast rerouting has widely been studied for realizing millisecond-order recovery on pure IP networks. This paper proposes IP fast rerouting using backup topologies against concurrent double failures. The main issue in recovering from multiple failures is avoiding forwarding loops. To avoid forwarding loops, we propose a deterministic forwarding algorithm, which estimates the concurrently occurring failures from the packet header information. We also propose an efficient backup topology design algorithm which is both loop-free and which reduces the number of backup topologies. Our key idea is preparing the adequate diversity of backup routes for arbitrary source and destination pairs by combination of backup topologies. For efficient computation of diverse routes, we propose a similarity comparison-based algorithm between the original topology and the backup topologies. Our algorithm can achieve nearly optimal loop-free restoration from double failures on realistic topologies without explicit failure notification.

  • On d-Asymptotics for High-Dimensional Discriminant Analysis with Different Variance-Covariance Matrices

    Takanori AYANO  Joe SUZUKI  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:12
      Page(s):
    3106-3108

    In this paper we consider the two-class classification problem with high-dimensional data. It is important to find a class of distributions such that we cannot expect good performance in classification for any classifier. In this paper, when two population variance-covariance matrices are different, we give a reasonable sufficient condition for distributions such that the misclassification rate converges to the worst value as the dimension of data tends to infinity for any classifier. Our results can give guidelines to decide whether or not an experiment is worth performing in many fields such as bioinformatics.

  • Software FMEA for Safety-Critical System Based on Co-analysis of System Model and Software Model

    Guoqi LI  

     
    LETTER-Dependable Computing

      Vol:
    E95-D No:12
      Page(s):
    3101-3105

    Software FMEA is valuable and practically used for embedded software of safety-critical systems. In this paper, a novel method for Software FMEA is presented based on co-analysis of system model and software model. The method is hopeful to detect quantitative and dynamic effects by a targeted software failure. A typical application of the method is provided to illustrate the procedure and the applicable scenarios. In addition, a pattern is refined from the application for further reuse.

  • A Distributed TDMA Scheduling Algorithm with Distance-Measurement-Based Power Control for Sensor Networks

    Koji SATO  Shiro SAKATA  

     
    PAPER-Network and Communication

      Vol:
    E95-D No:12
      Page(s):
    2879-2887

    This paper proposes a distributed TDMA slot scheduling algorithm with power control, which the slot allocation priority is controlled by distance measurement information. In the proposed scheme, Lamport's bakery algorithm for mutual exclusion is applied for prioritized slot allocation based on the distance measurement information between nodes, and a packet-based transmission power control scheme is combined. This aims at achieving media access control methods which can construct a local network practically by limiting the scope. The proposed scheme can be shown as a possible replacement of DRAND algorithm for Z-MAC scheme in a distance-measurement-oriented manner. The scheme can contribute to the efficient TDMA slot allocation.

  • A Swarm Inspired Method for Efficient Data Transfer

    Yutaka KAWAI  Adil HASAN  Go IWAI  Takashi SASAKI  Yoshiyuki WATASE  

     
    PAPER-Network and Communication

      Vol:
    E95-D No:12
      Page(s):
    2852-2859

    In this paper we report on an approach inspired by Ant Colony Optimization (ACO) to provide a fault tolerant and efficient means of transferring data in dynamic environments. We investigate the problem of distributing data between a client and server by using pheromone equations. Ants choose the best source of food by selecting the strongest pheromone trail leaving the nest. The pheromone decays over-time and needs to be continually reinforced to define the optimum route in a dynamic environment. This resembles the dynamic environment for the distribution of data between clients and servers. Our approach uses readily available network and server information to construct a pheromone that determines the best server from which to download data. We demonstrate that the approach is self-optimizing and capable of adapting to dynamic changes in the environment.

  • An Optimal Resource Sharing in Hierarchical Virtual Organizations in the Grid

    Kyong Hoon KIM  Guy Martin TCHAMGOUE  Yong-Kee JUN  Wan Yeon LEE  

     
    LETTER

      Vol:
    E95-D No:12
      Page(s):
    2948-2951

    In large-scale collaborative computing, users and resource providers organize various Virtual Organizations (VOs) to share resources and services. A VO organizes other sub-VOs for the purpose of achieving the VO goal, which forms hierarchical VO environments. VO participants agree upon a certain policies, such as resource sharing amount or user accesses. In this letter, we provide an optimal resource sharing mechanism in hierarchical VO environments under resource sharing agreements. The proposed algorithm enhances resource utilization and reduces mean response time of each user.

  • Multi-Layered Translucent Wave Absorber Using Carbon Fibers and Applying to Portable Anechoic Chamber

    Takenori YASUZUMI  Shunki KATO  Yuya ISHII  Ryosuke SUGA  Osamu HASHIMOTO  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E95-B No:12
      Page(s):
    3830-3836

    A new wideband wave absorber with translucent structure using carbon fibers is presented in this paper. The absorber is composed of bundled short carbon fibers which are arranged in front of a back metal and a spacer. Absorption characteristics of the one-layered absorber showed that matching frequencies can be controlled by the thickness of the spacer and the length of the carbon fibers. To further improve the characteristics, multi-layered absorbers are designed with the same procedure as one-layered absorber. The designed absorber showed 15 dB absorption characteristics from 1.0 to 10.0 GHz. Then a small anechoic chamber with the inside dimension of 200 cm200 cm200 cm was fabricated using ninety-six proposed absorbers. The electrical power in the chamber was measured at 2.45 GHz and the results showed that the variation of the power was less than 4 dB inside a circle with radius of 60 cm as work space for electromagnetic measurements.

  • A Novel Expression Deformation Model for 3D Face Recognition

    Chuanjun WANG  Li LI  Xuefeng BAI  Xiamu NIU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E95-D No:12
      Page(s):
    3113-3116

    The accuracy of non-rigid 3D face recognition is highly influenced by the capability to model the expression deformations. Given a training set of non-neutral and neutral 3D face scan pairs from the same subject, a set of Fourier series coefficients for each face scan is reconstructed. The residues on each frequency of the Fourier series between the finely aligned pairs contain the expression deformation patterns and PCA is applied to learn these patterns. The proposed expression deformation model is then built by the eigenvectors with top eigenvalues from PCA. Recognition experiments are conducted on a 3D face database that features a rich set of facial expression deformations, and experimental results demonstrate the feasibility and merits of the proposed model.

  • Keys Distributing Optimization of CP-ABE Based Access Control in Cryptographic Cloud Storage

    Yong CHENG  Jiangchun REN  Zhiying WANG  Songzhu MEI  Jie ZHOU  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:12
      Page(s):
    3088-3091

    In this letter, we introduce a novel keys distribution optimization scheme for CP-ABE based access control. This scheme integrates roles, role hierarchies and objects grouping to accelerate keys distribution, meanwhile the CP-ABE encrypting overhead is reduced by adopting deterministic cryptographic function. Experiments show that our scheme obtains noticeable improvement over the original one, especially when the number of objects is much greater than that of users.

11841-11860hit(42807hit)