Technical Program
Monday, October 29
Monday, October 29 9:00 - 10:00
Mo-AM-P: Plenary Talk 1
Alexander Vardy (University of California at San
Diego)
Room: Waterfront ballroom
Chair: Pascal Vontobel (The Chinese University of Hong Kong,
Hong Kong)
Monday, October 29 10:20 - 12:00
Mo-AM-1-1: Deletion/DNA Codes
Room 1 (Paradiso)
Chair: Han Mao Kiah (Nanyang Technological University,
Singapore)
- Cardinalities of BAD Correcting Codes
- An Improvement of Non-binary Code Correcting Single b-Burst of Insertions or Deletions
- Formalization of Insertion/Deletion Codes and the Levenshtein Metric in Lean
- Soft-Decision Decoding for DNA-Based Data Storage
- On Constant GC-content Cyclic DNA Codes With Long Codewords
Monday, October 29 10:20 - 11:40
Mo-AM-1-2: Machine Learning (Invited Session)
Room 2 (Cardinal)
Chair: Takafumi Kanamori (Tokyo Institute of Technology,
Japan)
- Scalable Machine Learning on Compact Data Representations
- Fast yet Simple Natural-Gradient Descent for Variational Inference in Complex Models
- Introduction to Bandit Convex Optimization Algorithms
- Combinatorial Online Prediction
Monday, October 29 10:20 - 12:00
Mo-AM-1-3: Statistical Analysis
Room 3 (Galleria III)
Chair: Hiroshi Fujisaki (Kanazawa University,
Japan)
- Generalized Dirichlet-Process-Means for Robust and Maximum Distortion Criteria
- Entropic Centrality for non-atomic Flow Networks
- Convexity of mutual information along the Ornstein-Uhlenbeck flow
- Sparse Bayesian Hierarchical Mixture of Experts and Variational Inference
- On Enumerating Distributions for Associated Vectors in the Entropy Space
Monday, October 29 10:20 - 11:40
Mo-AM-1-4: Signature Schemes
Room 4 (Falcon)
Chair: Bagus Santoso (The University of
Electro-Communications, Japan)
- Rank metric code-based signature
- A Generic Construction of an Identity-based Signature from a Sigma Protocol
- Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation
- A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO
Monday, October 29 14:00 - 15:40
Mo-PM-1-1: Index/Network Coding
Room 1 (Paradiso)
Chair: Tadashi Wadayama (Nagoya Institute of Technology,
Japan)
- Expected Error Rate of Probabilistic Network Codes over Gaussian Relay Network
- Reduced Dimensional Optimal Vector Linear Index Codes for Index Coding Problems with Symmetric Neighboring and Consecutive Side-information
- Index Codes for Interlinked Cycle Structures with Outer Cycles
- Optimal Scalar Linear Index Codes for Some Two-Sender Unicast Index Coding Problems
- On the Broadcast Rate of Index Coding Problems with Symmetric and Consecutive Interference
Monday, October 29 14:00 - 15:20
Mo-PM-1-2: Non-Asymptotic Information Theory (Invited Session)
Room 2 (Cardinal)
Chair: Vincent Y. F. Tan (National University of Singapore,
Singapore)
- Information Spectrum Analysis for Mismatched Decoding
- Privacy Amplification: Recent Developments and Applications
- Asymptotics of the random coding union bound
- Connections Between the Error Probability and the $r$-wise Hamming Distances
Monday, October 29 14:00 - 15:40
Mo-PM-1-3: Communication Systems
Room 3 (Galleria III)
Chair: Kenji Nakagawa (Nagaoka University of Technology,
Japan)
- Detection of Noisy and Corrupted Data Using Clustering Techniques
- Sparse Multiple Access and Code Design with Near Channel Capacity Performance
- Super Resolution Channel Estimation with Spread Spectrum Signal and Atomic Norm Minimization
- An Efficient Strategy for Applying Compute-and-Forward to the MARC
- Block-error Threshold Analysis of Protographs in 5G-Standard
Mo-PM-1-4: Security Models and Protocols
Room 4 (Falcon)
Chair: Toru Nakanishi (Hiroshima University,
Japan)
- On the Anonymization of Differentially Private Location Obfuscation
- A Succinct Model for Re-identification of Mobility Traces Based on Small Training Data
- How to generate transparent random numbers using blockchain
- Decentralized Netting Protocol over Consortium Blockchain
- Mobile Forensics for Cloud Storage Service on iOS Systems
Monday, October 29 16:00 - 17:40
Mo-PM-2-1: Lattice and Closest Vector Problem
Room 1 (Paradiso)
Chair: Jos H. Weber (Delft University of Technology, The
Netherlands)
- Shaping Gain of Lattices Based on Convolutional Codes and Construction A
- Reliability-Based Parametric LDLC Decoding
- The Double-Plane Algorithm: A simple algorithm for the closest vector problem
- On quotient metrics and decoding problems
- Further Results on the Error Correction Capability of Irregular LDPC Codes under the Gallager A Algorithm
Mo-PM-2-2: Cryptographic Protocols (1)
Room 2 (Cardinal)
Chair: Mitsugu Iwamoto (The University of
Electro-Communications, Japan)
- Multi-party Key Exchange Protocols from Supersingular Isogenies
- Secure Hybrid Authentication Protocols against Malicious Key Generation Center
- Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
- A Construction of the (4,n)-Threshold Visual Cryptography Scheme Using a 3-Design
- An algebraic interpretation of the XOR-based secret sharing schemes
Mo-PM-2-3: Graph-Based Analysis / Network Coding
Room 3 (Galleria III)
Chair: Kazushi Mimura (Hiroshima city university,
Japan)
- On the Power of Vector Linear Network Coding
- Complete Multipartite Graph Codes
- Entropy-based Graph Clustering - A Simulated Annealing Approach
- Analysis on Probabilistic Construction of Connected Dominating Sets over Regular Graph Ensembles
- k-connectivity of Random Graphs and Random Geometric Graphs in Node Fault Model
Mo-PM-2-4: Error Probability Analysis
Room 4 (Falcon)
Chair: Shigeaki Kuzuoka (Wakayama University,
Japan)
- Error Performance Analysis of the K-best Viterbi Decoding Algorithm
- Decision feedback scheme with criterion LR+Th for the ensemble of linear block codes
- On the Sphere Packing Error Exponent for Constant Subblock-Composition Codes
- Exact Analysis for Error Probability of Max-Log-MAP Decoding in Sequence Dependent Channels
- Error Exponents of Joint Channel Coding and Intrinsic Randomness for Memoryless Channels
Tuesday, October 30
Tuesday, October 30 9:00 - 10:00
Tu-AM-P: Plenary Talk 2
Chandra Nair (The Chinese University of Hong
Kong)
Room: Waterfront ballroom
Chair: Yasutada Oohama (University of Electro-Communications,
Japan)
Tuesday, October 30 10:20 - 12:00
Tu-AM-1-1: Erasure Correction
Room 1 (Paradiso)
Chair: Prakash Chaki (NEC Corporation, Japan)
- Erasure Correcting Codes by Using Shift Operation and Exclusive OR
- Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes
- Shifted Coded Slotted ALOHA
- On the Local Erasure Correction Capacity of Convolutional Codes
- Blind Reconstruction of Binary Cyclic Codes over Binary Erasure Channel
Tu-AM-1-2: Practical Security
Room 2 (Cardinal)
Chair: Hidenori Kuwakado (Kansai University,
Japan)
- An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields
- An Observation on the Randomness Assumption over Lattices
- An Analysis of a Defence Method against Slow HTTP DoS Attack
- A Watermarking Method for Embedding into the External Shapes of Objects
- Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif
Tuesday, October 30 10:20 - 11:40
Tu-AM-1-3: Quantum Information (1)
Room 3 (Galleria III)
Chair: Pascal Vontobel (The Chinese University of Hong Kong,
Hong Kong)
- Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory
- Performance of Nonbinary Cubic Codes
- Quantum Key Distribution using Extended Mean King's Problem
- Error performance and robustness of optimum quantum detection for MPSK signals in the presence of phase noise
Tuesday, October 30 10:20 - 12:00
Tu-AM-1-4: Shannon Theory
Room 4 (Falcon)
Chair: Shun Watanabe (Tokyo University of Agriculture and
Technology, Japan)
- A Study on the Problem of Channel Resolvability for Channels with Countable Input Alphabet
- Variable-Length Intrinsic Randomness Allowing Positive Value of the Average Variational Distance
- New Results on Variable-Length Lossy Compression Allowing Positive Overflow and Excess Distortion Probabilities
- Overflow Probability of Codeword Cost in Variable-Length Coding Problem Allowing Non-Vanishing Error Probability
- Achievable Rate Regions for Source Coding with Delayed Partial Side Information
Tuesday, October 30 14:00 - 15:00
Tu-PM-P: Tutorial Plenary
Kees Schouhamer Immink (Turing Machines
Inc.)
Room: Waterfront ballroom
Chair: Mehul Motani (National University of Singapore,
Singapore)
Tuesday, October 30 15:20 - 16:20
Tu-PM-1-1: LDPC Codes
Room 1 (Paradiso)
Chair: Takayuki Nozaki (Yamaguchi University,
Japan)
- Structured Concatenation of Protograph LDPC Codes and Markers for Insertion/Deletion Channels
- Error Floor Estimation of Spatially-Coupled Irregular LDPC Code Ensembles
- On the Decoding Radius Realized by Low-Complexity Decoded Non-Binary Irregular LDPC Codes
Tu-PM-1-2: Post-Quantum Cryptography (Invited Session)
Room 2 (Cardinal)
Chair: Noboru Kunihiro (The University of Tokyo,
Japan)
- An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme
- A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half
- LPS-type Ramanujan Graphs
Tu-PM-1-3: Applications of Information Theory
Room 3 (Galleria III)
Chair: Tetsuya Kojima (National Institute of Technology,
Tokyo College, Japan)
- Investigation of the Processors Evolution Using the Computer Capacity
- Adaptive Notch Howling Canceller Using Group Delay Information
- Chaos-Based Stream Cipher Using a Star Network of Chaotic Maps
Tu-PM-1-4: Compressed Sensing
Room 4 (Falcon)
Chair: Junichi Takeuchi (Kyushu University,
Japan)
- Variational Bayes method for matrix factorization to two sparse factorized matrices
- Recovery Guarantee of Sparse Binary Sensing Matrices under Greedy Algorithm
- Typical Performance of Sparse Signal Recovery from a Linear Measurement with Large Coherence
Tuesday, October 30 16:30 - 17:30
Tu-PM-2-1: Polar Codes
Room 1 (Paradiso)
Chair: Alexander Vardy (University of California San Diego,
USA)
- Improving Polar Codes by Spatial Coupling
- On the Properties of Bit-Reversal Shortening in Polar Codes
- Efficient SC Decoding of Convolutional Polar Codes
Tu-PM-2-2: Symmetric Key Cryptography
Room 2 (Cardinal)
Chair: Tadanori Teruya (National Institute of Advanced
Industrial Science and Technology, Japan)
- Integral Cryptanalysis of Reduced-round KASUMI
- Revisited Diffusion Analysis of Salsa and ChaCha
- Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions
Tu-PM-2-3: Quantum Information (2)
Room 3 (Galleria III)
Chair: Masakazu Yoshida (University of Nagasaki,
Japan)
- Semi-Quantum Key Distribution with Limited Measurement Capabilities
- Effect of Non-Symmetric Loss on Quantum Reading Using a Quasi-Bell State
- Applying a symmetrization method by coding to non-symmetric mixed-state signals
Tu-PM-2-4: Sequences
Room 4 (Falcon)
Chair: Hiroshi Kamabe (Gifu University, Japan)
- A Novel Construction of Quadtree-Structured Zero-Correlation Zone Sequence Sets
- Hadamard-type Matrices on Finite Fields and Their Applications to Sequence Generation
- A Study on Computational Methods of the Logistic Map over Integers for a Pseudorandom Number Generator
Wednesday, October 31
Wednesday, October 31 9:00 - 10:00
We-AM-Poster: Recent Results Poster Session
Room: Waterfront
ballroom
- Code Parameter Estimation from Noisy Data: TPC
- Improved LT Code Degree Distribution and its Performance Evaluation
- Probabilistic Shaping for BICM with Pseudorandom Sequence
- Attack on Multiple-Use Password Protected Secret Sharing
- Consideration on b-weight for cyclic codes over b-symbol read channels
- Enumeration of Compact Trees of AIFV Codes
- Some properties of NTU sequences
- A Thresholded Discriminative Metric Learning Approach for Deep Speaker Recognition
- Security of K(AII) ΣΠ PKC Along with a Challenge Problem
- A p-adic Analysis of Periodic Properties for Knuth's Quadratic Congruence Sequences
- Capacity Analysis for Hybrid FSO/RF Networks
- Evaluation of Leakage Information on Searchable Encryption Database
- Channel Model Divided into Cylinder for Free-Space Optical Links in Rain
- Performance Evaluation of Post-Quantum Cryptographic Algorithms using JavaScript
- Neural Network Detection of LDPC-Coded Random Access CDMA Systems
- Joint Secure Communication and Independent Random Number Generation against Eavesdropper
- Fundamental Trade-off among Identification, Secrecy and Template Rates in Identification System
- A novel Doppler resistant low complexity CS-CDMA system
- A New Bound of (r,δ)-Locally Repairable Codes over Finite Field of Small Order
- A Calculation Method using DFT Matrix for Roos Bound
- Expected Graph Evolution for Spatially ``Mt. Fuji'' Coupled LDPC Codes
- Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes
- A Construction of Secret Sharing Schemes with Threshold 3 for Countably Infinite Participants
- Generating Binary Quasi-Cyclic Reversible Codes
- Some Properties of Z 4 Sequences Obtained from Two Binary NTU A Sequences by the Gray Coding
- Research on Convolutional Codes for Dependable Storage Systems
- Probability Density Based Performance Analysis for Energy Harvesting Communications
- Detailed experimentation know-how about CPA against lightweight cipher implemented 8-bit microcontroller for tamper resistance test bench
- Dispensing with Noise Forward in the ``Weak'' Relay Eavesdropper Channel
- A Note on a Bound on the Rate of a Locally Recoverable Code with Multiple Recovering Sets
- Asymptotic Analysis of Classification in the Presence of Generalized Label Noise
- A study of error-control scheme for WBAN based on retransmission
Wednesday, October 31 10:20 - 12:00
We-AM-1-1: Coding for Various Models
Room 1 (Paradiso)
Chair: Manabu Hagiwara (Chiba University, Japan)
- Reducing the Average Delay in Gradient Coding
- Some classes of systematic polynomial codes correcting single- and adjacent transposition errors
- Codes for Endurance-Limited Memories
- Time-Varying Variable-Length Error-Correcting Codes
- Tree-Search Decoding Using Reduced-Size Stacks
We-AM-1-2: Cryptographic Protocols (2)
Room 2 (Cardinal)
Chair: Yuji Suga (Internet Initiative Japan Inc.,
Japan)
- On Hiding Access Timings in ORAM
- Improved Verifiable Delegated Private Set Intersection
- Tree-based Secure Comparison of Secret Shared Data
- Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
- Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol
Wednesday, October 31 10:20 - 11:40
We-AM-1-3: Data Compression
Room 3 (Galleria III)
Chair: Ken-ichi Iwata (University of Fukui,
Japan)
- A Consideration on Classification of Extended Binary Memoryless Sources Under Which Distinct Huffman Codes Are Constructed
- Dynamic AIFV Coding
- A Note on Lempel-Ziv Parser Tails and Substring Lengths
- Compression by Substring Enumeration with a Finite Alphabet Using Sorting
Wednesday, October 31 10:20 - 12:00
We-AM-1-4: Multiuser Information Theory
Room 4 (Falcon)
Chair: Hideki Yagi (University of Electro-Communications,
Japan)
- Novel Signal-Code Construction for Multiple Access System over Vector-Disjunctive Channel
- Recursive Construction of k-Ary Uniquely Decodable Codes for Multiple-Access Adder Channel
- Contributions to Successive Decoding for Multiple Access Channels
- Slepian-Wolf Coding with Side-Information Having Insertion/Deletion Errors
- Multi-terminal codes using constrained-random-number generators
Wednesday, October 31 13:30 - 15:10
We-PM-1-1: Bounds and Metrics
Room 1 (Paradiso)
Chair: Motohiko Isaka (Kwansei Gakuin University,
Japan)
- Improved Asymptotic Sphere-Packing Bounds for Subblock-Constrained Codes
- Lower Bound-oriented Parameter Calculation for AN coding
- Arbitrarily Low Redundancy Construction of Balanced Codes Using Realistic Resources
- An Upper Bound on the Generalized Cayley Distance
- Properties of Binary Pearson Codes
We-PM-1-2: Cryptanalysis
Room 2 (Cardinal)
Chair: Masayuki Yoshino (Hitachi, Ltd & The University of
Tokyo, Japan)
- Equivalent Secret Key Attack against Knapsack PKC based on Subset Sum Decision Problem
- Security of Knapsack Cryptosystem Using Subset-Sum Decision Problem against Alternative-Solution Attack
- Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P
- A Study on the Parameter Size of the Montgomery Trick for ECDLP
- A Study on the Parameter of the Distinguished Point Method in Pollard's Rho Method for ECDLP
Wednesday, October 31 13:30 - 14:50
We-PM-1-3: Data Compression and Related Topics
Room 3 (Galleria III)
Chair: Takahiro Ota (Nagano Prefectural Institute of
Technology, Japan)
- Examples of Formal Proofs about Data Compression
- Probability Approximation in Asymmetric Numeral Systems
- Invariant Measures for the Subshifts Associated with the Asymmetric Binary Systems
- On Minimum Expected Length Prefix Codes Satisfying a $(d,k)$ Runlength-Limited Constraint
Wednesday, October 31 13:30 - 15:10
We-PM-1-4: Information Theoretic Security / Multiterminal
Room 4 (Falcon)
Chair: Tetsunao Matsuta (Tokyo Institute of Technology,
Japan)
- On the Capacity of State-Dependent Gaussian Z-Interference Channel
- State-Dependent Gaussian Broadcast Channel with Common State Reconstructions
- On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys
- Secrecy Performance on Half-Duplex Two-Way Multi-Relay Transmission Technique Under Wireless Physical Layer Security
- The Symmetric Two-hop Channel with an Untrusted Relay
Wednesday, October 31 15:30 - 16:50
We-PM-2-1: Applications of Algebraic Coding
Room 1 (Paradiso)
Chair: Hajime Matsui (Toyota Technological Institute,
Japan)
- New Locator Polynomials for Cyclic Codes
- Joint Reconstruction of Reed-Solomon Encoder and Convolutional Interleaver in a Noisy Environment
- Some Constructions of Optimal Locally Repairable Codes
- Shortened Cyclic Codes for Correcting and Detecting Burst Errors
We-PM-2-2: Public-Key Cryptography
Room 2 (Cardinal)
Chair: Kazuki Yoneyama (Ibaraki University,
Japan)
- A New Key Encapsulation Combiner
- A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening
- Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
- Embedding Lemmas for Functional Encryption
We-PM-2-3: Fundamentals of Information Theory
Room 3 (Galleria III)
Chair: Jun Muramatsu (NTT Corporation, Japan)
- Asymptotic Behavior of Typical Sets and the Smallest High Probability Set
- Second-Order Optimal Test in Composite Hypothesis Testing
- Generalized Fano-Type Inequality for Countably Infinite Systems with List-Decoding
- Analysis for the Slow Convergence in Arimoto Algorithm
We-PM-2-4: Information Theoretic Security
Room 4 (Falcon)
Chair: Hiroki Koga (University of Tsukuba, Japan)
- Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys
- Distributed Hypothesis Testing with Privacy Constraints
- A new proof of an inequality between two secrecy exponents
- A Finite Block Length Achievability Bound for Low Probability of Detection Communication