The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ti(30728hit)

23821-23840hit(30728hit)

  • Secure Protocol to Construct Electronic Trading

    Shin'ichiro MATSUO  Hikaru MORITA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    281-288

    As one form of electronic commerce, the scale of online trading in stocks is rapidly growing. Although brokers lie between the customers as trustees in the current market, retrenchment of broker seems inevitable. This paper proposes a protocol that allows trading to proceed with only the market and the customers. We show the required characteristics for this type of trading at first. Next, to fulfil these characteristics, we apply an electronic auction protocol and digital signatures. The result is a trading protocol with security equivalent to that the current trading system.

  • A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures

    Tsuyoshi NISHIOKA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    214-221

    ID-based key sharing scheme is one of the important topics in Key management, and the Key Predistiribution System (KPS) is one of the major divisions of such key sharing schemes. In KPS, in order to share a common key between the participants, one of the participants need to simply feed-in his partner's identifier value into their secret-algorithm. In contrast to its such remarkable property and its high contribution to the field of key management for digital signature, it has downsides as well. In this paper, we propose an efficient signature scheme on the KPS infrastructure that can overcome such difficulties that are faced. It is shown that if an ID-based key sharing system belonging to KPS is provided, the new digital signature scheme can be used straightforwardly. Moreover, this signature scheme is proven to be secure if the discrete logarithm is reasonably complex. There already exists other digital signature scheme which are also based on KPS, but they contain inevitable flaws: its verifier is restricted and a tamper resistant module(TRM) is required. Our method resolved these problems. In our signature scheme, it is an ensured fact that, all signatures are authenticated by any entity, which is based on the inherence behavior of key generator and not of some common key. Moreover, TRM is not required in our scheme. In order to describe our new scheme, a new concept of "one-way homomorphism" is introduced.

  • New Multiplicative Knapsack-Type Public Key Cryptosystems

    Shinya KIUCHI  Yasuyuki MURAKAMI  Masao KASAHARA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    188-196

    In this paper, first, we propose two of the high rate methods based on Morii-Kasahara cryptosystem. Method A-I is based on Schalkwijk algorithm. Method A-II is based on the extended Schalkwijk algorithm, which is proposed in this paper. We then show that these proposed methods can yield a higher rate compared with ElGamal cryptosystem. Next, we also propose two methods for a fast encryption by dividing the message vector into several pieces. Regarding each of the divided vectors as an index, we can realize a fast transformation of the index into a limited weight vector. In Method B-I, Schalkwijk algorithm is used for the fast transformation. In Method B-II, the fast transformation is realized with the method of table-lookup. These methods can realize a faster encryption than Method A-I, Method A-II and Morii-Kasahara cryptosystem. The security of these proposed methods are based on the security of Morii-Kasahara cryptosystem.

  • Relations among Security Goals of Probabilistic Public-Key Cryptosystems

    Ako SUZUKI  Yuichi KAJI  Hajime WATANABE  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    172-178

    This paper newly formalizes some notions of security for probabilistic public-key encryption schemes. The framework for these notions was originally presented in the work by Bellare et al., in which they consider non-malleability and indistinguishability under chosen-plaintext attack, non-adaptive chosen-ciphertext attack and adaptive chosen-ciphertext attack. This paper extends the results of Bellare et al. by introducing two goals, equivalence undecidability and non-verifiability under the above three attack models. Such goals are sometimes required in electronic voting and bids systems. It is shown that equivalence undecidability, non-verifiability and indistinguishability are all equivalent under the three attack models.

  • Speeding up the Lattice Factoring Method

    Shigenori UCHIYAMA  Naoki KANAYAMA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    146-150

    Recently, Boneh et al. proposed an interesting algorithm for factoring integers, the so-called LFM (Lattice Factoring Method). It is based on the techniques of Coppersmith and Howgrave-Graham, namely, it cleverly employs the LLL-algorithm. The LFM is for integers of the form N = pr q, and is very effective for large r. That is, it runs in polynomial time in log N when r is on the order of log p. We note that for small r, e.g. N =pq, p2q, it is an exponential time algorithm in log N. In this paper, we propose a method for speeding up the LFM from a practical viewpoint. Also, theoretical considerations and experimental results are provided that show that the proposed algorithm offers shorter runing time than the original LFM.

  • On the Complexity of Constructing an Elliptic Curve of a Given Order

    Masato YAMAMICHI  Masahiro MAMBO  Hiroki SHIZUYA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    140-145

    Can we find in polynomial time an elliptic curve of a given order over a finite field? This paper is concerned with this question which is open since 1986. Consider the partial multivalued function that outputs such an elliptic curve. We characterize the difficulty of computing this function, and show that the polynomial time hierarchy collapses if sat reduces to this function with respect to the polynomial time Turing reducibility, where sat is the partial multivalued function that on input a Boolean formula, outputs a satisfying assignment. We also give a problem that is equivalent to the open question under the Extended Riemann Hypothesis.

  • Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings

    Yasuyuki SAKAI  Kouichi SAKURAI  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    120-129

    We introduce efficient algorithms for scalar multiplication on elliptic curves defined over FP. The algorithms compute 2k P directly from P, where P is a random point on an elliptic curve, without computing the intermediate points, which is faster than k repeated doublings. Moreover, we apply the algorithms to scalar multiplication on elliptic curves, and analyze their computational complexity. As a result of their implementation with respect to affine (resp. weighted projective) coordinates, we achieved an increased performance factor of 1.45 (45%) (resp. 1.15 (15%)) in the scalar multiplication of the elliptic curve of size 160-bit.

  • A Perspective on Next-Generation Ad Hoc Networks--A Proposal for an Open Community Network--

    Kenichi MASE  Masakazu SENGOKU  Shoji SHINODA  

     
    INVITED PAPER

      Vol:
    E84-A No:1
      Page(s):
    98-106

    The concept of wireless ad hoc networking has unique features in which neither base stations nor wired backbone networks are required and a mobile node can communicate with a partner beyond the transmission range by multihopping. In this paper, innovations and issues in ad hoc network technologies are reviewed. The concept of a general-purpose ad hoc network is identified as a step toward next-generation ad hoc network development. The concept of an open community network is then presented as a vision for general-purpose ad hoc networks. An open community network is a novel information infrastructure for local communities based on wireless multihopping technologies, which may support an advanced information-oriented society in the twenty-first century. As a case study, an experimental system using PHS (Personal Handy Phone System) is described and some research issues for developing an open community network are identified.

  • A Fast Jacobian Group Arithmetic Scheme for Algebraic Curve Cryptography

    Ryuichi HARASAWA  Joe SUZUKI  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    130-139

    The goal of this paper is to describe a practical and efficient algorithm for computing in the Jacobian of a large class of algebraic curves over a finite field. For elliptic and hyperelliptic curves, there exists an algorithm for performing Jacobian group arithmetic in O(g2) operations in the base field, where g is the genus of a curve. The main problem in this paper is whether there exists a method to perform the arithmetic in more general curves. Galbraith, Paulus, and Smart proposed an algorithm to complete the arithmetic in O(g2) operations in the base field for the so-called superelliptic curves. We generalize the algorithm to the class of Cab curves, which includes superelliptic curves as a special case. Furthermore, in the case of Cab curves, we show that the proposed algorithm is not just general but more efficient than the previous algorithm as a parameter a in Cab curves grows large.

  • Digital Signal Processing: Progress over the Last Decade and the Challenges Ahead

    Nozomu HAMADA  

     
    INVITED PAPER

      Vol:
    E84-A No:1
      Page(s):
    80-90

    An aspect of the diverse developments of digital signal processing (DSP) over the last decade are summarized. The current progress of some core fields from the widespread fields are treated in this paper. The selected fields are filter design, wavelet theory and filter bank, adaptive signal processing, nonlinear filters, multidimensional signal processing, intelligent signal processing, and digital signal processor. Through the overview of recent research activities, the interdisciplinary character of the DSP should be proved. Some challenging research direction is described in the last section.

  • A Way of Making Trapdoor One-Way Functions Trapdoor No-Way

    Eikoh CHIDA  Motoji OHMORI  Hiroki SHIZUYA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    151-156

    A trapdoor one-way function is an extended version of a zero-way permutation. A zero-way permutation was first introduced by Niemi-Renvall in Asiacrypt'94. In this paper we define the class of functions called no-way functions. This is an extended version of a zero-way permutation. Intuitively, a function f is no-way if, without trapdoor, both computing f and computing f-1 are hard. Li-Chida-Shizuya defined the notion of a no-way function, which is a provable-security version of a zero-way permutation. They also gave an example of a no-way function such that computing f and f-1 is proven to be as hard as breaking the Diffie-Hellman key exchange scheme. We redefine the notion of a trapdoor no-way function more preciously, classify no-way functions by the property of the trapdoor: common, separated and semi-separated trapdoor no-way, give a method for constructing trapdoor no-way functions from trapdoor one-way functions, and also give an example of trapdoor no-way functions.

  • Wireless Past and Future--Evolving Mobile Communications Systems--

    Fumiyuki ADACHI  

     
    INVITED PAPER

      Vol:
    E84-A No:1
      Page(s):
    55-60

    Nowadays, when people colloquially use the word "wireless," they almost always mean a portable telephone. Over the last 10 years, there has been tremendous growth in the mobile communications markets not only in Japan but also worldwide. For these 10 years, the most popular service has been dominated by voice communication. However, modern mobile communications systems are shifting their focus from solely voice communication to electronic mailing and Internet access. From now, we will evolve into a wireless multimedia society, where a combination of mobile communications and the Internet will play an important role. Wireless technology is the core of mobile communications systems. This article, which focuses on wireless technology, looks at how mobile communications systems have evolved over the last 10 years and looks to the future of advanced wireless technologies that will be necessary to realize a true wireless multimedia society in the coming decade.

  • Parallel Meta-Heuristics and Autonomous Decentralized Combinatorial Optimization

    Morikazu NAKAMURA  Kenji ONAGA  

     
    INVITED PAPER

      Vol:
    E84-A No:1
      Page(s):
    48-54

    This paper treats meta-heuristics for combinatorial optimization problems. The parallelization of meta-heuristics is then discussed in which we show that parallel processing has possibility of not only speeding up but also improving solution quality. Finally we extend the discussion of the combinatorial optimization into autonomous decentralized systems, say autonomous decentralized optimization. This notion becomes very important with the advancement of the network-connected system architecture.

  • Principle of Superposition for Realizing Dexterous Pinching Motions of a Pair of Robot Fingers with Soft-Tips

    Suguru ARIMOTO  Pham Thuc Anh NGUYEN  

     
    INVITED PAPER

      Vol:
    E84-A No:1
      Page(s):
    39-47

    This paper is concerned with analysis of nonlinear dynamics under geometric constraints that express pinching motions of a pair of multi-degrees of freedom fingers with soft tips. The dynamics of such a pair of soft fingers can be expressed by a set of complicated nonlinear differential equations with algebraic constraints, even if the motion is constrained in a plane. However, it is shown from the passivity analysis that dynamic stable grasping (pinching) can be realized by means of a feedforward input of desired internal force with coefficients composed of elements of Jacobian matrices plus a feedback of the difference between moments of rotation exerted at both sides of the object. It is shown in the case of a pair of 2 d.o.f. and 3 d.o.f. fingers (corresponding to a pair of thumb and index fingers) that a principle of linear superposition is applicable to design of additional feedback signals for controlling simultaneously the posture (rotational angle) and position of the mass center of the object, though the dynamics are nonlinear. A sufficient condition for applicability of the principle of superposition is discussed and given as a condition for unique stationary resolution of the overall motion to elementary motions (stable grasping, rotation control, x and y coordinates control). The principle implies that a skilled motion can be resolved into some of elementary motions which human can learn separately and independently.

  • Efficient Sealed-Bid Auction by Using One-Way Functions

    Kunio KOBAYASHI  Hikaru MORITA  Koutarou SUZUKI  Mitsuari HAKUTA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    289-294

    The need for electronic sealed-bid auction services with quantitative competition is increasing. This paper proposes a new method that combines one-way functions and a bit commitment technique for quantitative competitive sealed-bid auctions. Since each modular exponentiation is replaced with a one-way function, the proposed method's computational time is one forty thousandth that of the former methods and the proposed method suits mass bidder systems.

  • Discovering Knowledge from Graph Structured Data by Using Refutably Inductive Inference of Formal Graph Systems

    Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  Takayoshi SHOUDAI  Tetsuji KUBOYAMA  Kenichi TAKAHASHI  Hiroaki UEDA  

     
    PAPER

      Vol:
    E84-D No:1
      Page(s):
    48-56

    We present a new method for discovering knowledge from structured data which are represented by graphs in the framework of Inductive Logic Programming. A graph, or network, is widely used for representing relations between various data and expressing a small and easily understandable hypothesis. The analyzing system directly manipulating graphs is useful for knowledge discovery. Our method uses Formal Graph System (FGS) as a knowledge representation language for graph structured data. FGS is a kind of logic programming system which directly deals with graphs just like first order terms. And our method employs a refutably inductive inference algorithm as a learning algorithm. A refutably inductive inference algorithm is a special type of inductive inference algorithm with refutability of hypothesis spaces, and is suitable for knowledge discovery. We give a sufficiently large hypothesis space, the set of weakly reducing FGS programs. And we show that this hypothesis space is refutably inferable from complete data. We have designed and implemented a prototype of a knowledge discovery system KD-FGS, which is based on our method and acquires knowledge directly from graph structured data. Finally we discuss the applicability of our method for graph structured data with experimental results on some graph theoretical notions.

  • A Subscriber-Excluding and Traitor-Tracing Broadcast Distribution System

    Maki YOSHIDA  Toru FUJIWARA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    247-255

    A broadcast distribution system (BDS) is a system for the distribution of digital contents over broadcast channel where the data supplier broadcasts the contents in encrypted form and gives each subscriber a decoder containing a secret decryption key. A traitor is a subscriber who offers the information which allows to decrypt the broadcast. When a pirate decoder is captured, if at least one traitor can be identified from it, a BDS is said to be traitor-tracing. If the data supplier can prevent subscribers from obtaining the contents without recalling their decoders, a BDS is said to be subscriber-excluding. In this paper, we propose an efficient BDS which is both subscriber-excluding and traitor-tracing. We use similar mathematics to a threshold cryptosystem. In the proposed BDS, the maximum number of excluded subscribers reaches the maximum number of traitors in a coalition for which at least one traitor can be identified. We prove that the proposed BDS is secure against ciphertext-only attack if and only if ElGamal cryptosystem is secure against the attack and the discrete logarithm problem is hard. The proposed BDS is the first one which satisfies all the following features: Both subscriber-excluding and traitor-tracing, identifying all the traitors, black box tracing and public key system.

  • A Technique for On-Line Data Migration

    Jiahong WANG  Masatoshi MIYAZAKI  Jie LI  

     
    PAPER-Databases

      Vol:
    E84-D No:1
      Page(s):
    113-120

    In recent years, more emphasis is placed on the performance of massive databases. It is often required not only that database systems provide high throughputs with rapid response times, but also that they are fully available 24-hours-per-day and 7-days-per-week. Requirements for throughput and response time can be satisfied by upgrading the hardware. As a result, databases in the old hardware environment have to be moved to the new one. Moving a database, however, generally requires taking the database off line for a long time, which is unacceptable for numerous applications. In this paper, a very practical and important subject is addressed: how to upgrade the hardware on line, i.e., how to move a database from an old hardware environment to a new one concurrently with users' reading and writing of the database. A technique for this purpose is proposed. We have implemented a prototype based on this technique. Our experiments with the prototype shown that compared with conventional off-line approach, the proposed technique could give a performance improvement by more than 85% in the query-bound environment and 40% in the update-bound environment.

  • Fault-Tolerant Routing Algorithms for Hypercube Interconnection Networks

    Keiichi KANEKO  Hideo ITO  

     
    PAPER-Fault Tolerance

      Vol:
    E84-D No:1
      Page(s):
    121-128

    Many researchers have used hypercube interconnection networks for their good properties to construct many parallel processing systems. However, as the number of processors increases, the probability of occurrences of faulty nodes also increases. Hence, for hypercube interconnection networks which have faulty nodes, several efficient dynamic routing algorithms have been proposed which allow each node to hold status information of its neighbor nodes. In this paper, we propose an improved version of the algorithm proposed by Chiu and Wu by introducing the notion of full reachability. A fully reachable node is a node that can reach all nonfaulty nodes which have Hamming distance l from the node via paths of length l. In addition, we further improve the algorithm by classifying the possibilities of detours with respect to each Hamming distance between current and target nodes. We propose an initialization procedure which makes use of an equivalent condition to perform this classification efficiently. Moreover, we conduct a simulation to measure the improvement ratio and to compare our algorithms with others. The simulation results show that the algorithms are effective when they are applied to low-dimensional hypercube interconnection networks.

  • Recognition of Ordered Tree-Shellable Boolean Functions Based on OBDDs

    Yasuhiko TAKENAGA  

     
    PAPER

      Vol:
    E84-D No:1
      Page(s):
    28-33

    In this paper, we consider the complexity of recognizing ordered tree-shellable Boolean functions when Boolean functions are given as OBDDs. An ordered tree-shellable function is a positive Boolean function such that the number of prime implicants equals the number of paths from the root node to a 1-node in its ordered binary decision tree representation. We show that given an OBDD, it is possible to check within polynomial time if the function is ordered tree-shellable with respect to the variable ordering of the OBDD.

23821-23840hit(30728hit)