The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ti(30728hit)

1641-1660hit(30728hit)

  • Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions

    Yi LU  Keisuke HARA  Keisuke TANAKA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/03/16
      Vol:
    E104-A No:9
      Page(s):
    1206-1218

    Receiver selective opening (RSO) attack for public key encryption (PKE) captures a situation where one sender sends messages to multiple receivers, an adversary can corrupt a set of receivers and get their messages and secret keys. Security against RSO attack for a PKE scheme ensures confidentiality of other uncorrupted receivers' ciphertexts. Among all of the RSO security notions, simulation-based RSO security against chosen ciphertext attack (SIM-RSO-CCA security) is the strongest notion. In this paper, we explore constructions of SIM-RSO-CCA secure PKE from various computational assumptions. Toward this goal, we show that a SIM-RSO-CCA secure PKE scheme can be constructed based on an IND-CPA secure PKE scheme and a designated-verifier non-interactive zero-knowledge (DV-NIZK) argument satisfying one-time simulation soundness. Moreover, we give the first construction of DV-NIZK argument satisfying one-time simulation soundness. Consequently, through our generic construction, we obtain the first SIM-RSO-CCA secure PKE scheme under the computational Diffie-Hellman (CDH) or learning parity with noise (LPN) assumption.

  • A Study on Extreme Wideband 6G Radio Access Technologies for Achieving 100Gbps Data Rate in Higher Frequency Bands Open Access

    Satoshi SUYAMA  Tatsuki OKUYAMA  Yoshihisa KISHIYAMA  Satoshi NAGATA  Takahiro ASAI  

     
    INVITED PAPER

      Pubricized:
    2021/04/01
      Vol:
    E104-B No:9
      Page(s):
    992-999

    In sixth-generation (6G) mobile communication system, it is expected that extreme high data rate communication with a peak data rate over 100Gbps should be provided by exploiting higher frequency bands in addition to millimeter-wave bands such as 28GHz. The higher frequency bands are assumed to be millimeter wave and terahertz wave where the extreme wider bandwidth is available compared with 5G, and hence 6G needs to promote research and development to exploit so-called terahertz wave targeting the frequency from 100GHz to 300GHz. In the terahertz wave, there are fundamental issues that rectilinearity and pathloss are higher than those in the 28GHz band. In order to solve these issues, it is very important to clarify channel characteristics of the terahertz wave and establish a channel model, to advance 6G radio access technologies suitable for the terahertz wave based on the channel model, and to develop radio-frequency device technologies for such higher frequency bands. This paper introduces a direction of studies on 6G radio access technologies to explore the higher frequency bands and technical issues on the device technologies, and then basic computer simulations in 100Gbps transmission using 100GHz band clarify a potential of extreme high data rate over 100Gbps.

  • A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/02/22
      Vol:
    E104-A No:9
      Page(s):
    1353-1356

    In this letter, we present a construction of bent functions which generalizes a work of Zhang et al. in 2016. Based on that, we obtain a cubic bent function in 10 variables and prove that, it has no affine derivative and does not belong to the completed Maiorana-McFarland class, which is opposite to all 6/8-variable cubic bent functions as they are inside the completed Maiorana-McFarland class. This is the first time a theoretical proof is given to show that the cubic bent functions in 10 variables can be outside the completed Maiorana-McFarland class. Before that, only a sporadic example with such properties was known by computer search. We also show that our function is EA-inequivalent to that sporadic one.

  • Counting Convex and Non-Convex 4-Holes in a Point Set

    Young-Hun SUNG  Sang Won BAE  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2021/03/18
      Vol:
    E104-A No:9
      Page(s):
    1094-1100

    In this paper, we present an algorithm that counts the number of empty quadrilaterals whose corners are chosen from a given set S of n points in general position. Our algorithm can separately count the number of convex or non-convex empty quadrilaterals in O(T) time, where T denotes the number of empty triangles in S. Note that T varies from Ω(n2) and O(n3) and the expected value of T is known to be Θ(n2) when the n points in S are chosen uniformly and independently at random from a convex and bounded body in the plane. We also show how to enumerate all convex and/or non-convex empty quadrilaterals in S in time proportional to the number of reported quadrilaterals, after O(T)-time preprocessing.

  • Optical CDMA Scheme Using Generalized Modified Prime Sequence Codes and Extended Bi-Orthogonal Codes Open Access

    Kyohei ONO  Shoichiro YAMASAKI  Shinichiro MIYAZAKI  Tomoko K. MATSUSHIMA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1329-1338

    Optical code-division multiple-access (CDMA) techniques provide multi-user data transmission services in optical wireless and fiber communication systems. Several signature codes, such as modified prime sequence codes (MPSCs), generalized MPSCs (GMPSCs) and modified pseudo-orthogonal M-sequence sets, have been proposed for synchronous optical CDMA systems. In this paper, a new scheme is proposed for synchronous optical CDMA to increase the number of users and, consequently, to increase the total data rate without increasing the chip rate. The proposed scheme employs a GMPSC and an extended bi-orthogonal code which is a unipolar code generated from a bipolar Walsh code. Comprehensive comparisons between the proposed scheme and several conventional schemes are shown. Moreover, bit error rate performance and energy efficiency of the proposed scheme are evaluated comparing with those of the conventional optical CDMA schemes under atmospheric propagation environment.

  • The Explicit Dual of Leander's Monomial Bent Function

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1357-1360

    Permutation polynomials and their compositional inverses are crucial for construction of Maiorana-McFarland bent functions and their dual functions, which have the optimal nonlinearity for resisting against the linear attack on block ciphers and on stream ciphers. In this letter, we give the explicit compositional inverse of the permutation binomial $f(z)=z^{2^{r}+2}+alpha zinmathbb{F}_{2^{2r}}[z]$. Based on that, we obtain the dual of monomial bent function $f(x)={ m Tr}_1^{4r}(x^{2^{2r}+2^{r+1}+1})$. Our result suggests that the dual of f is not a monomial any more, and it is not always EA-equivalent to f.

  • Conditional Wasserstein Generative Adversarial Networks for Rebalancing Iris Image Datasets

    Yung-Hui LI  Muhammad Saqlain ASLAM  Latifa Nabila HARFIYA  Ching-Chun CHANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/06/01
      Vol:
    E104-D No:9
      Page(s):
    1450-1458

    The recent development of deep learning-based generative models has sharply intensified the interest in data synthesis and its applications. Data synthesis takes on an added importance especially for some pattern recognition tasks in which some classes of data are rare and difficult to collect. In an iris dataset, for instance, the minority class samples include images of eyes with glasses, oversized or undersized pupils, misaligned iris locations, and iris occluded or contaminated by eyelids, eyelashes, or lighting reflections. Such class-imbalanced datasets often result in biased classification performance. Generative adversarial networks (GANs) are one of the most promising frameworks that learn to generate synthetic data through a two-player minimax game between a generator and a discriminator. In this paper, we utilized the state-of-the-art conditional Wasserstein generative adversarial network with gradient penalty (CWGAN-GP) for generating the minority class of iris images which saves huge amount of cost of human labors for rare data collection. With our model, the researcher can generate as many iris images of rare cases as they want and it helps to develop any deep learning algorithm whenever large size of dataset is needed.

  • A Compact Digital Signature Scheme Based on the Module-LWR Problem Open Access

    Hiroki OKADA  Atsushi TAKAYASU  Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/03/19
      Vol:
    E104-A No:9
      Page(s):
    1219-1234

    We propose a new lattice-based digital signature scheme MLWRSign by modifying Dilithium, which is one of the second-round candidates of NIST's call for post-quantum cryptographic standards. To the best of our knowledge, our scheme MLWRSign is the first signature scheme whose security is based on the (module) learning with rounding (LWR) problem. Due to the simplicity of the LWR, the secret key size is reduced by approximately 30% in our scheme compared to Dilithium, while achieving the same level of security. Moreover, we implemented MLWRSign and observed that the running time of our scheme is comparable to that of Dilithium.

  • Indoor Crowd Estimation Scheme Using the Number of Wi-Fi Probe Requests under MAC Address Randomization

    Yuki FURUYA  Hiromu ASAHINA  Masashi YOSHIDA  Iwao SASASE  

     
    PAPER-Information Network

      Pubricized:
    2021/06/18
      Vol:
    E104-D No:9
      Page(s):
    1420-1426

    As smartphones have become widespread in the past decade, Wi-Fi signal-based crowd estimation schemes are receiving increased attention. These estimation schemes count the number of unique MAC addresses in Wi-Fi signals, hereafter called probe requests (PRs), instead of counting the number of people. However, these estimation schemes have low accuracy of crowd estimation under MAC address randomization that replaces a unique MAC address with various dummy MAC addresses. To solve this problem, in this paper, we propose an indoor crowd estimation scheme using the number of PRs under MAC address randomization. The main idea of the proposed scheme is to leverage the fact that the number of PRs per a unit of time changes in proportion to the number of smartphones. Since a smartphone tends to send a constant number of PRs per a unit of time, the proposed scheme can estimate the accurate number of smartphones. Various experiment results show that the proposed scheme reduces estimation error by at most 75% compared to the conventional Wi-Fi signal-based crowd estimation scheme in an indoor environment.

  • Dynamic Terminal Connection Control Using Multi-Radio Unlicensed Access for 5G Evolution and Beyond

    Toshiro NAKAHIRA  Tomoki MURAKAMI  Hirantha ABEYSEKERA  Koichi ISHIHARA  Motoharu SASAKI  Takatsune MORIYAMA  Yasushi TAKATORI  

     
    PAPER

      Pubricized:
    2021/03/23
      Vol:
    E104-B No:9
      Page(s):
    1138-1146

    In this paper, we examine techniques for improving the throughput of unlicensed radio systems such as wireless LANs (WLANs) to take advantage of multi-radio access to mobile broadband, which will be important in 5G evolution and beyond. In WLANs, throughput is reduced due to mixed standards and the degraded quality of certain frequency channels, and thus control techniques and an architecture that provide efficient control over WLANs are needed to solve the problem. We have proposed a technique to control the terminal connection dynamically by using the multi-radio of the AP. Furthermore, we have proposed a new control architecture called WiSMA for efficient control of WLANs. Experiments show that the proposed method can solve those problems and improve the WLAN throughput.

  • New Almost Periodic Complementary Pairs

    Jiali WU  Rong LUO  Honglei WEI  Yanfeng QI  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2021/03/05
      Vol:
    E104-A No:9
      Page(s):
    1361-1364

    In this letter, we give a recursive construction of q-ary almost periodic complementary pairs (APCPs) based on an interleaving technique of sequences and Kronercker product. Based on this construction, we obtain new quaternary APCPs with new lengths.

  • Anomaly Prediction for Wind Turbines Using an Autoencoder Based on Power-Curve Filtering

    Masaki TAKANASHI  Shu-ichi SATO  Kentaro INDO  Nozomu NISHIHARA  Hiroto ICHIKAWA  Hirohisa WATANABE  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/06/07
      Vol:
    E104-D No:9
      Page(s):
    1506-1509

    Predicting the malfunction timing of wind turbines is essential for maintaining the high profitability of the wind power generation business. Machine learning methods have been studied using condition monitoring system data, such as vibration data, and supervisory control and data acquisition (SCADA) data, to detect and predict anomalies in wind turbines automatically. Autoencoder-based techniques have attracted significant interest in the detection or prediction of anomalies through unsupervised learning, in which the anomaly pattern is unknown. Although autoencoder-based techniques have been proven to detect anomalies effectively using relatively stable SCADA data, they perform poorly in the case of deteriorated SCADA data. In this letter, we propose a power-curve filtering method, which is a preprocessing technique used before the application of an autoencoder-based technique, to mitigate the dirtiness of SCADA data and improve the prediction performance of wind turbine degradation. We have evaluated its performance using SCADA data obtained from a real wind-farm.

  • Automatic Drawing of Complex Metro Maps

    Masahiro ONDA  Masaki MORIGUCHI  Keiko IMAI  

     
    PAPER-Graphs and Networks

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1150-1155

    The Tokyo subway is one of the most complex subway networks in the world and it is difficult to compute a visually readable metro map using existing layout methods. In this paper, we present a new method that can generate complex metro maps such as the Tokyo subway network. Our method consists of two phases. The first phase generates rough metro maps. It decomposes the metro networks into smaller subgraphs and partially generates rough metro maps. In the second phase, we use a local search technique to improve the aesthetic quality of the rough metro maps. The experimental results including the Tokyo metro map are shown.

  • Frequency-Domain Iterative Block DFE Using Erasure Zones and Improved Parameter Estimation

    Jian-Yu PAN  Kuei-Chiang LAI  Yi-Ting LI  Szu-Lin SU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/03/22
      Vol:
    E104-B No:9
      Page(s):
    1159-1171

    Iterative block decision feedback equalization with hard-decision feedback (HD-IBDFE) was proposed for single-carrier transmission with frequency-domain equalization (SC-FDE). The detection performance hinges upon not only error propagation, but also the accuracy of estimating the parameters used to re-compute the equalizer coefficients at each iteration. In this paper, we use the erasure zone (EZ) to de-emphasize the feedback values when the hard decisions are not reliable. EZ use also enables a more accurate, and yet computationally more efficient, parameter estimation method than HD-IBDFE. We show that the resulting equalizer coefficients share the same mathematical form as that of the HD-IBDFE, thereby preserving the merit of not requiring matrix inverse operations in calculating the equalizer coefficients. Simulations show that, by using the EZ and the proposed parameter estimation method, a significant performance improvement over the conventional HD-IBDFE can be achieved, but with lower complexity.

  • A Virtual Pre-Connection Scheme Enabling Fast Connection to Local Spot Cell in Private Cellular Network

    Kazuo IBUKA  Hikaru KAWASAKI  Takeshi MATSUMURA  Fumihide KOJIMA  

     
    PAPER

      Pubricized:
    2021/03/08
      Vol:
    E104-B No:9
      Page(s):
    1129-1137

    In the 5th generation mobile communication system (5G), super high frequency (SHF) bands such as 28GHz will be used in many scenarios. In Japan, a local 5G working group has been established to apply advanced 5G technologies to private networks and is working to encourage local companies and municipalities to introduce new services for local needs. Meanwhile, the smaller size of the 28GHz band cells creates the difficulties when establishing deployment areas for homogeneous networks. In general, heterogeneous network approach with the combination of macro-cell and micro-cell have been considered practical and applied by the giant telecommunication operators. However, private network operators have difficulty in deploying both micro- and macro-cells due to the cost issue. Without the assistance of macro-cells, local spot cells with a small service area may not be able to start services while high-speed mobile users are staying in the service area. In this paper, we propose a virtual pre-connection scheme allowing fast connection to local spot cells without the assistance of macro-cells. In addition, we confirm that the proposed scheme can reduce the cell search time required when entering a local spot cell from 100 seconds or more to less than 1 second, and can reduce the loss of connection opportunities to local spot cells for high-speed mobile users.

  • Effects of Input Data Uncertainties on an Air Traffic Control Difficulty Index

    Sakae NAGAOKA  Mark BROWN  Daniel DELAHAYE  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2021/03/22
      Vol:
    E104-B No:9
      Page(s):
    1188-1196

    Air traffic management (ATM) systems around the world are being modernized to accommodate shifts towards performance- and trajectory-based operations. These shifts will require new indices for safety, efficiency and complexity. The authors have been developing an index for evaluating air traffic control (ATC) difficulty that utilizes the relative positions and velocity vectors of aircraft pairs as input data. Prior to practical application of the index, it is necessary to understand the effects of input data error, i.e. errors in the positions and velocities of a pair of aircraft, on the estimated difficulty value. Two sensitivity analyses were therefore performed for a pair of aircraft cruising at constant speeds on intersecting linear tracks at the same altitude. Sensitivity analysis examines how uncertainty in inputs relates to uncertainty in outputs. Firstly, an analysis of propagation error was carried out. The formula of the propagation error at a certain point was derived based on the assumed input error, and the distribution of propagation error was investigated for all possible situations and compared with the distribution of difficulty values to clarify its characteristics. Secondly, a sensitivity analysis based on variance was carried out that evaluated the effect of each input parameter using a conditional variance value called the Sobol indices. Using a Monte Carlo method, we investigated the effect of each input parameter on the calculated difficulty value for all possible situations of aircraft pairs on intersecting trajectories. As a result, it was found that the parameter that most affects the difficulty value is the intersection angle of the trajectories.

  • Development of Superconducting Devices Supporting Radio Astronomy Open Access

    Yoshinori UZAWA  Matthias KROUG  Takafumi KOJIMA  Masanori TAKEDA  Kazumasa MAKISE  Shohei EZAKI  Wenlei SHAN  Akihira MIYACHI  Yasunori FUJII  Hirotaka TERAI  

     
    INVITED PAPER

      Pubricized:
    2021/03/24
      Vol:
    E104-C No:9
      Page(s):
    411-421

    This paper describes the development of superconductor-insulator-superconductor (SIS) mixers for the Atacama Large Millimeter/submillimeter Array (ALMA) from the device point of view. During the construction phase of ALMA, the National Astronomical Observatory of Japan (NAOJ) successfully fabricated SIS mixers to meet the stringent ALMA noise temperature requirements of less than 230 K (5 times the quantum noise) for Band 10 (787-950 GHz) in collaboration with the National Institute of Information and Communications Technology. Band 10 covers the highest frequency band of ALMA and is recognized as the most difficult band in terms of superconducting technology. After the construction, the NAOJ began development studies for ALMA enhancement such as wideband and multibeam SIS mixers according to top-level science requirements, which are also presented.

  • Magnetic Josephson Junctions: New Phenomena and Physics with Diluted Alloy, Conventional Ferromagnet, and Multilayer Barriers Open Access

    Taro YAMASHITA  

     
    INVITED PAPER

      Pubricized:
    2021/03/17
      Vol:
    E104-C No:9
      Page(s):
    422-428

    We review a new superconducting element, called “magnetic Josephson junctions” with a magnetic barrier instead of the insulating barrier of conventional Josephson junctions. We classify the three types of magnetic barrier, i.e., diluted alloy, conventional ferromagnet, and magnetic multilayer barriers, and introduce various new physics such as the π-state arising in magnetic Josephson junctions due to the interaction between superconductivity and magnetism.

  • Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access

    Daisuke INOUE  Kyogo OTA  Mamoru SAWAHASHI  Satoshi NAGATA  

     
    PAPER

      Pubricized:
    2021/03/17
      Vol:
    E104-B No:9
      Page(s):
    1120-1128

    This paper proposes a physical-layer cell identity (PCID) detection method that uses joint estimation of the frequency offset and secondary synchronization signal (SSS) sequence for the 5G new radio (NR) initial access with beamforming transmission at a base station. Computer simulation results show that using the PCID detection method with the proposed joint estimation yields an almost identical PCID detection probability as the primary synchronization signal (PSS) detection probability at an average received signal-to-noise ratio (SNR) of higher than approximately -5dB suggesting that the residual frequency offset is compensated to a sufficiently low level for the SSS sequence estimation. It is also shown that the PCID detection method achieves a high PCID detection probability of greater than 90% and 50% at the carrier frequency of 30 and 50GHz, respectively, at the average received SNR of 0dB for the frequency stability of a user equipment oscillator of 3ppm.

  • Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries Open Access

    Jun KURIHARA  Toru NAKAMURA  Ryu WATANABE  

     
    PAPER-Coding Theory

      Pubricized:
    2021/03/23
      Vol:
    E104-A No:9
      Page(s):
    1271-1283

    This paper investigates an adversarial model in the scenario of private information retrieval (PIR) from n coded storage servers, called Byzantine adversary. The Byzantine adversary is defined as the one altering b server responses and erasing u server responses to a user's query. In this paper, two types of Byzantine adversaries are considered; 1) the classic omniscient type that has the full knowledge on n servers as considered in existing literature, and 2) the reasonable limited-knowledge type that has information on only b+u servers, i.e., servers under the adversary's control. For these two types, this paper reveals that the resistance of a PIR scheme, i.e., the condition of b and u to correctly obtain the desired message, can be expressed in terms of a code parameter called the coset distance of linear codes employed in the scheme. For the omniscient type, the derived condition expressed by the coset distance is tighter and more precise than the estimation of the resistance by the minimum Hamming weight of the codes considered in existing researches. Furthermore, this paper also clarifies that if the adversary is limited-knowledge, the resistance of a PIR scheme could exceed that for the case of the omniscient type. Namely, PIR schemes can increase their resistance to Byzantine adversaries by allowing the limitation on adversary's knowledge.

1641-1660hit(30728hit)