Program for 2024 International Symposium on Information Theory and Its Applications

Back to ISITA2024 Top Page
Time (Taipei) Room 1 (IB101) Room 2 (IB201) Room 3 (IB202) Room 4 (IB301) IBB

Monday, November 11

09:00 am-10:00 am Mo-AM-P: Plenary Talk 1        
10:20 am-12:00 pm   Mo-AM-1-1: Coding Theory 1 Mo-AM-1-2: Quantum Information Theory Mo-AM-1-3: Statistical Learning 1  
02:00 pm-03:00 pm Mo-PM-P: Plenary Talk 2        
03:30 pm-04:50 pm   Mo-PM-1-1: Quantum Insertion/Deletion Errors Mo-PM-1-2: AI Security and Privacy Mo-PM-1-3: Communication Theory  

Tuesday, November 12

09:00 am-10:00 am Tu-AM-P: Plenary Talk 3        
10:20 am-12:00 pm   Tu-AM-1-1: Coding for Storage/Group Testing Tu-AM-1-2: Information Theory and Security Tu-AM-1-3: Statistical Learning 2  
01:50 pm-02:50 pm   Tu-PM-1-1: Integrated Circuit Design for Information Theory Tu-PM-1-2: Cryptography Tu-PM-1-3: Signal Processing  
02:50 pm-03:10 pm      
03:30 pm-04:50 pm   Tu-PM-2-1: Code Based Cryptography/Wiretap Coding Tu-PM-2-2: Biometrics and Authentication Tu-PM-2-3: Source Coding  

Wednesday, November 13

09:00 am-10:00 am         We-AM-Poster: Poster Session
10:10 am-11:50 am   We-AM-1-1: Coding Theory 2 We-AM-1-2: Symmetric-Key Encryption We-AM-1-3: Shannon Theory  

Monday, November 11

Monday, November 11 9:00 - 10:00

Mo-AM-P: Plenary Talk 1

Theory and Examples of One-Bit Secret Sharing
Hiroki Koga (University of Tsukuba, Japan)
Room 1 (IB101)

Monday, November 11 10:20 - 12:00

Mo-AM-1-1: Coding Theory 1

Room 2 (IB201)
Chair: Tadashi Wadayama (Nagoya Institute of Technology, Japan)
Improving Convergence Speed Of Neural Polar Decoder Using Weighted Loss Function
Yi-Wei Lu (National Tsing Hua University, Taiwan); Shan Lu and Takaya Yamazato (Nagoya University, Japan); Yeong-Luh Ueng (National Tsing Hua University, Taiwan)
BP Decoding and SGRAND for Partially Permuted Factor Graphs of Polar Codes
Kohei Yoshida and Hiroshi Kamabe (Gifu University, Japan); Shan Lu (Nagoya University, Japan)
Recursive Algorithm for Maximum Likelihood Decoding of Non-Binary Codes
Yingtao Zhou and Yuichi Kaji (Nagoya University, Japan)
Probabilistic Density Evolution Analysis of IRSA
Jin Wei Liu and Po-Ning Chen (National Yang Ming Chiao Tung University, Taiwan); Shin-Lin Shieh (National Tsing Hua University, Taiwan); Yu-Chih Huang (National Yang Ming Chiao Tung University, Taiwan)
ARQ Schemes for Broadcast Channel with Random Feedback Delay
Hikaru Shioda and Toshihiro Niinomi (Tokyo City University, Japan)

Mo-AM-1-2: Quantum Information Theory

Room 3 (IB202)
Chair: Manabu Hagiwara (Chiba University, Japan)
Generalized trace inequalities related to q uncertainty relations
Kenjiro Yanagi (Yamaguchi University, Japan)
Entanglement detection based on the generalized Landau-Pollak uncertainty relation for (N, M)-POVMs
Masakazu Yoshida (Osaka Sangyo University, Japan)
On Optimal Ternary Signal Constellation Maximizing Capacity under Energy Constraints
Shion Kitamura (Aichi Prefectural University, Japan); Tiancheng Wang (Kanagawa University, Japan); Souichi Takahira (Meijo University, Japan); Tsuyoshi Usuda (Aichi Prefectural University, Japan)
Property of classical reliability function for BPSK signals coded by simplex codes with SRM
Ken Masaki (Meijo University, Japan); Tiancheng Wang (Kanagawa University, Japan); Shogo Usami and Souichi Takahira (Meijo University, Japan); Tsuyoshi Usuda (Aichi Prefectural University, Japan)
Advance Sharing with Ogawa et al.'s Ramp Quantum Secret Sharing Scheme for Prime-Dimensional Quantum Systems
Satoshi Masumori (Tokyo Institute of Technology, Japan); Ryutaroh Matsumoto (Institute of Science Tokyo, Japan)

Mo-AM-1-3: Statistical Learning 1

Room 4 (IB301)
Chair: Shota Saito (Gunma University, Japan)
Out-of-Distribution Detection using Maximum Entropy Coding and Generative Networks
Mojtaba Abolfazli, Mohammad Amirani, Anders Høst-Madsen, June Zhang and Andras Bratincsak (University of Hawaii, USA)
Bounding Excess Minimum Risk via Rényi's Divergence
Ananya S Omanwar, Fady Alajaji and Tamas Linder (Queen's University, Canada)
A Bound for Learning Lossless Source Coding with Online Learning
Anders Høst-Madsen and Mohammad Amirani (University of Hawaii, USA); Narayana Prasad Santhanam (University of Hawaii at Manoa, USA)
Bayesian Decision-Theoretic Prediction with Ensemble of Meta-Trees for Classification Problems
Naoki Ichijo (Waseda University, Japan); Ryota Maniwa (KDDI Corporation, Japan); Yuta Nakahara, Koshi Shimada and Toshiyasu Matsushima (Waseda University, Japan)
Variational Bayesian Methods for a Tree-Structured Stick-Breaking Process Mixture of Gaussians by Application of the Bayes Codes for Context Tree Models
Yuta Nakahara (Waseda University, Japan)

Monday, November 11 2:00 - 3:00

Mo-PM-P: Plenary Talk 2

A Journey in Information Theory: From Second-Order Rates to Common Information
Vincent Y. F. Tan (National University of Singapore, Singapore)
Room 1 (IB101)

Monday, November 11 3:30 - 4:50

Mo-PM-1-1: Quantum Insertion/Deletion Errors

Room 2 (IB201)
Chair: Ryutaroh Matsumoto (Institute of Science Tokyo, Japan)
Pure States in Quantum Deletion Error-Correction
Manabu Hagiwara (Chiba University, Japan)
Decoding Algorithm Correcting Single-Insertion Plus Single-Deletion for Non-binary Quantum Codes
Ken Nakamura and Takayuki Nozaki (Yamaguchi University, Japan)
Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes
Koki Sasaki (Yamaguchi University & Dept. of Informatics, Japan); Takayuki Nozaki (Yamaguchi University, Japan)
Quantum Deletion/Insertion Errors in Optical Qubits due to Synchronization Error
Masaki Takekoshi and Shion Kitamura (Aichi Prefectural University, Japan); Tiancheng Wang (Kanagawa University, Japan); Tsuyoshi Usuda (Aichi Prefectural University, Japan)

Mo-PM-1-2: AI Security and Privacy

Room 3 (IB202)
Chair: Hidenori Kuwakado (Kansai University, Japan)
Generative Adversarial Networks for Imbalanced Dataset Intrusion Detection in Software-Defined Networking
S. M. Shamim, Muhammad Bisri Musthafa, Samsul Huda, Yuta Kodera and Yasuyuki Nogami (Okayama University, Japan)
\(k^m\)-Anonymization Meets Differential Privacy under Sampling
Masaya Kobayashi and Atsushi Fujioka (Kanagawa University, Japan); Koji Chida (Gunma University, Japan); Akira Nagai and Kan Yasuda (NTT, Japan)
Simple Privacy-Preserving Federated Learning with Different Encryption Keys
Haruto Yokomitsu and Ryo Nojima (Ritsumeikan University, Japan); Lihua Wang (National Institute of Information and Communications Technology (NICT), Japan)
Privacy-preserving Machine Learning for Generic Data
Tomoshi Yagishita and Atsuko Miyaji (Osaka University, Japan)

Mo-PM-1-3: Communication Theory

Room 4 (IB301)
Chair: Shan Lu (Nagoya University, Japan)
DPC-Coded MIMO Multiuser Communications using RIS with Discrete Phase Shifts
Chia-cheng Wu (National Yang Ming Chiao Tung University, Taiwan); Hsiao-feng Francis Lu (Taiwan)
Throughput Analysis of SIC-Based Two-Device Slotted ALOHA with Feedback Over Nakagami-m Fading Channels
Daiki Fukui and Yuhei Takahashi (Doshisha University, Japan); Guanghui Song (Xidian University, China); Tomotaka Kimura (Doshisha University, Japan); Zilong Liu (University of Essex, United Kingdom (Great Britain)); Jun Cheng (Doshisha University, Japan)
Modulation Scheme of Delayed Bit-Interleaved Coded Modulation for Continuous Transmission
Gou Hosoya (Osaka Sangyo University, Japan)
Golay complementary sequences of all sequence lengths
Ying Li (Yuan Ze University, Taiwan); Shu-Jui Yang (ASML Holding N. V., Taiwan)

Tuesday, November 12

Tuesday, November 12 9:00 - 10:00

Tu-AM-P: Plenary Talk 3

A Journey in belief propagation: From practical LDPC decoders to near-maximum likelihood Reed-Solomon decoders
Yeong-Luh Ueng (National Tsing Hua University, Taiwan)
Room 1 (IB101)

Tuesday, November 12 10:20 - 12:00

Tu-AM-1-1: Coding for Storage/Group Testing

Room 2 (IB201)
Chair: Hiroshi Kamabe (Gifu University, Japan)
Private Information Delivery from Coded Storage against Byzantine and Eavesdropping Attacks
Koki Nakano (University of Hyogo, Japan); Jun Kurihara (University of Hyogo & Zettant Inc., Japan); Toshiaki Tanaka (University of Hyogo, Japan)
Aggregable Generalized Deduplication
Riki Aoshima (University of Hyogo, Japan); Jun Kurihara (University of Hyogo & Zettant Inc., Japan); Toshiaki Tanaka (University of Hyogo, Japan)
One Bit-Flipping/Insertion/Deletion Correcting Code for Substrings of Binary Circular String
Takahiro Ota (Senshu University, Japan); Akiko Manada (Nagaoka University of Technology, Japan)
On flow equivalence of the subshifts associated with the stream version of asymmetric binary systems
Hiroshi Fujisaki (Kanazawa University, Japan)
Improved Quasi-Random Designs with Constant Pool Sizes for Group Testing
Ryouji Hamada (The University of Electro-Communications, Japan); Xiao-Nan Lu (Gifu University, Japan)

Tu-AM-1-2: Information Theory and Security

Room 3 (IB202)
Chair: Noboru Kunihiro (University of Tsukuba, Japan)
Achievable Cost Region for Erasure of Distributed Information Using a Common Random Number
Tetsunao Matsuta (Saitama University, Japan)
Bounds for message authentication with partially leaked secret key using conditional Rényi entropy
Yuta Saito and Shun Watanabe (Tokyo University of Agriculture and Technology, Japan)
Constructions of a Visual Cryptography Scheme Using an Affine Resolvable BIBD
Naoki Mitarai and Hiroki Koga (University of Tsukuba, Japan)
The Space Complexity of Generating Random Tent Codes
Naoaki Okada (Kyushu University, Japan); Shuji Kijima (Shiga University, Japan)
Complexity of Solving Hash Puzzles Using Revised Boyer Quantum Algorithm
Chris Idota and Yuichi Kaji (Nagoya University, Japan)

Tu-AM-1-3: Statistical Learning 2

Room 4 (IB301)
Chair: Yuta Nakahara (Waseda University, Japan)
An Efficient Image Segmentation Algorithm Based on Bayes Decision Theory and Its Application for Region Detection
Yilun Wang, Koshi Shimada and Toshiyasu Matsushima (Waseda University, Japan)
Adversarial Examples with Missing Perturbation Using Laser Irradiation
Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama and Toshihiro Ohigashi (Tokai University, Japan)
Semantic Segmentation with Attention-Modulated Feature Fusion in HRNet V2
Weijie Zhang and Shuhei Kaneko (Tokyo City University, Japan); Shuichi Arai (Graduate School of Engineering, Tokyo City University, Japan)
Object Detection for Low-illumination Scenes Based on Enhanced YOLOv7 Architecture
Chia Hsien Lin, Guan-Jie Peng and Chang Hong Lin (National Taiwan University of Science and Technology, Taiwan)
Enhancing Proximal Decoding for LDPC Codes through Deep Unfolding
Asahi Ito, Lantian Wei and Tadashi Wadayama (Nagoya Institute of Technology, Japan)

Tuesday, November 12 1:50 - 3:10

Tu-PM-1-1: Integrated Circuit Design for Information Theory

Room 2 (IB201)
Chair: Yeong-Luh Ueng (National Tsing Hua University, Taiwan)
Reformulated Euclidean Algorithm and Optimized (OREA) Architecture for Reed-Solomon Decoding
Chao Chen (Xidian, China); Zhongfeng Wang (Sun Yat-sen University, China); Yunghsiang Sam Han (University of Electronic Science and Technology of China, China); Baoming Bai (Xidian University, China)
Block-layered Sign-flipping Belief Propagation Decoder Architecture for Surface Codes
Hsuan Ku, Ting-An Hu, Tzu-Hsuan Huang and Yeong-Luh Ueng (National Tsing Hua University, Taiwan)
Investigating the Role of D Flip-Flop as a Synchronization Circuit for Enhancing Randomness and Stabilizing Bit Distribution in RO-Based RNG on FPGA
Mitsuki Fujiwara (Okayama University, Japan); Ryoichi Sato (Okayama University & None, Japan); Samsul Huda, Yasuyuki Nogami and Yuta Kodera (Okayama University, Japan)
Integrated High-gain Broadband Low Noise Amplifier Receiver with Ultra-wideband Antenna
Wen Cheng Lai (National Taiwan University of Science and Technology, Taiwan)

Tu-PM-1-2: Cryptography

Room 3 (IB202)
Chair: Yasuyuki Murakami (Osaka Electro-Communication University, Japan)
Checkable Key Generation and its Application to Hierarchical Identity-Based Signature
Atsushi Fujioka (Kanagawa University, Japan); Takahiro Oshima and Taiichi Saitoh (Tokyo Denki University, Japan)
Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification
Atsushi Fujioka (Kanagawa University, Japan); Keisuke Saito and Taiichi Saitoh (Tokyo Denki University, Japan); Keita Xagawa (Technology Innovation Institute, United Arab Emirates)
Fast and Secure Scalar Multiplication on Elliptic Curve GLS254
Ryosuke Kido and Atsuko Miyaji (Osaka University, Japan)
How to Certify Deletion with Constant-Length Verification Key
Duo XU (Nagoya University, Japan)

Tuesday, November 12 1:50 - 2:50

Tu-PM-1-3: Signal Processing

Room 4 (IB301)
Chair: Masayoshi Ohashi (Fukuoka University, Japan)
MZI-based Optical Circuit for MIMO Signal Detector Immune to Fabrication Errors
Takumi Nishiyama, Tadashi Wadayama and Ayano Nakai-Kasai (Nagoya Institute of Technology, Japan)
Deep Unfolding-Aided Design for Optical MIMO Signal Detection Circuit
Tomoya Kuno and Tadashi Wadayama (Nagoya Institute of Technology, Japan)
A Prototype of Proximity Warning System on the Sea, Utilizing Received Signal Strength
Hiroomi Isozaki (Japan Coast Guard Academy, Japan); Yasuhiro Sato (Osaka Electro-Communication University, Japan); Yoshinori Matsuura and Masaaki Yamanaka (Japan Coast Guard Academy, Japan)

Tuesday, November 12 3:30 - 4:50

Tu-PM-2-1: Code Based Cryptography/Wiretap Coding

Room 2 (IB201)
Chair: Masanori Hirotomo (Saga University, Japan)
Encrypted Numeric Vector Computations Based on Non-Systematic QC-MDPC Code Over Prime Field
Haruhiko Kaneko (Tokyo Institute of Technology, Japan)
Enhancement of Physical Layer Security based on NB LDPC Coded Modulation
Irina Bocharova, Boris D. Kudryashov and Vitaly Skachek (University of Tartu, Estonia); Stefano Alberico (Skudo OÜ, Estonia)
Lee Metric Code-based Signature
Chik How Tan and Theo Fanuela Prabowo (National University of Singapore, Singapore)
Achieving Optimal Short-Blocklength Secrecy Rate Using Multi-Kernel PAC Codes for the Binary Erasure Wiretap Channel
Hsuan-Yin Lin (Simula UiB, Norway); Yi-Sheng Su and Mao-Ching Chiu (National Chung Cheng University, Taiwan)

Tu-PM-2-2: Biometrics and Authentication

Room 3 (IB202)
Chair: Yuji Suga (Internet Initiative Japan Inc., Japan)
Proof of Origin: Creating Data Authenticity by Biometric Information
Takayuki Suzuki (Hitachi America, Ltd., USA); Ken Naganuma (Hitachi, The University of Tokyo, Japan); Kaiho Fukuchi and Takatoshi Ohara (Hitachi, Ltd., Japan)
Leakable Mnemonic Phrase: A New Orientation of Wallets Backup based on Biometric-key
Ken Naganuma (Hitachi Ltd., Japan); Takayuki Suzuki (Hitachi America, Ltd., USA); Takatoshi Ohara (Hitachi, Ltd., Japan)
Make Seeds Expire in TOTP Authentication
Keishiro Noda and Yuichi Kaji (Nagoya University, Japan)
Proposal of CAPTCHA using the Munker Illusion and Prototype Implimentation
Yasuyuki Murakami, Kotaro Yamaguchi, Hiroki Izumi and Motonori Doi (Osaka Electro-Communication University, Japan)

Tu-PM-2-3: Source Coding

Room 4 (IB301)
Chair: Shigeaki Kuzuoka (Wakayama University, Japan)
An Explicit Construction of a Coded Caching Scheme with Heterogeneous Cache Sizes
Akihito Nagaya and Hiroki Koga (University of Tsukuba, Japan)
An Upper Bound of Cumulant Generating Function of Codeword Lengths in Variable-Length Lossy Source Coding Under Logarithmic Loss
Shota Saito (Gunma University, Japan)
A Simple Proof of Multi-letter Converse Theorem for Distributed Lossless Source Coding
Jun Muramatsu (NTT Corporation, Japan)
Asymptotic Optimality of the Asymmetric Encoding-Decoding Scheme
Hirosuke Yamamoto (The University of Tokyo, Japan); Ken-ichi Iwata (University of Fukui, Japan)

Wednesday, November 13

Wednesday, November 13 9:00 - 10:00

We-AM-Poster: Poster Session

Room: IBB
Rate-Compatible Polar Coding Performance for LED-Propeller Based Image Sensor Communication
Shin Asaoka, Shan Lu, Takaya Yamazato and Zhengqiang Tang (Nagoya University, Japan)
On the Hadamard-Type Matrices of Even Orders on Finite Fields
Iori Kodama and Tetsuya Kojima (National Institute of Technology, Tokyo College, Japan)
Faster Computation of Private Key in ID-NIKS Using DLP with Distinguished Points and Montgomery Multiplication
Hayato Inoue, Mizuki Miki, Ryuichi Sakai and Yasuyuki Murakami (Osaka Electro-Communication University, Japan)
Distributed LT Coding of Correlated Sources for a Single-Output MAC with Erasures
Bo-Yu Lin (National Taiwan University of Science and Technology, Taiwan); Jen-Huan Huang and Jian-Jia Weng (National Chung Cheng University, Taiwan)
Maximal-Information Channel Optimized Scalar Quantization with Side-Information
Chen-An Cheng (National Chung Cheng University, Taiwan); Jian-Yu Lai (National Taiwan Ocean University, Taiwan); Jian-Jia Weng (National Chung Cheng University, Taiwan)
State-Dependent Joint Source-Channel Coding for Gilbert-Elliot Channels
Ting-Jhong Sie (National Taiwan Ocean University, Taiwan); Chen-An Cheng and Jian-Jia Weng (National Chung Cheng University, Taiwan)
Light-Trail Based Polar Coding Scheme of Visual Optical Communication in Drone Propellers
Chenyu CAO, Zhengqiang Tang, Takaya Yamazato and Shan Lu (Nagoya University, Japan)
Secure Spectrogram Masking Based on Extended Visual Cryptography
Yuuki Tachioka (Denso IT Laboratory, Japan)
Efficient Secret Reconstruction Quantum Circuit for Binary Stabilizer-Based Quantum Secret Sharing
Shogo Chiwaki (Tokyo Institute of Technology, Japan); Ryutaroh Matsumoto (Institute of Science Tokyo, Japan)
Sequential Matrix Completion Method Based on Variational Bayesian Methods
Shunsuke Obana, Yasuhiro Mochizuki and Shunsuke Horii (Waseda University, Japan)
A Computational Method to Approximate the Von Neumann Entropy of ASK Signals
Keisuke Goto and Shion Kitamura (Aichi Prefectural University, Japan); Tiancheng Wang (Kanagawa University, Japan); Tsuyoshi Usuda (Aichi Prefectural University, Japan)
Uniform Side Information Gain via Multilevel Lattice Codes over Integers
Juliana Gomes Ferreira de Souza (University of Campinas, Brazil)
Comparison of CT Numbers Using Quantum Ghost Imaging and Ordinary Imaging
Yasushi Horiba (Aichi Prefectural University, Japan); Tiancheng Wang (Kanagawa University, Japan); Tsuyoshi Usuda (Aichi Prefectural University, Japan)
Card-Based Threshold Function Protocols with a Fewer Cards by Using Directional Cards
Kanta Moriyama, Tomohiro Taguchi, Hayato Inoue and Yasuyuki Murakami (Osaka Electro-Communication University, Japan)
Implementation of Deep Learning Using Homomorphic Encryption Library
Masanori Hirotomo (Saga University, Japan); Yoshiaki Shiraishi (Kobe University, Japan)
Improvement of Fractal Compression with Domain Block Classification Based on DCT
Takashi Sakai and Natsuo Hayashi (The University of Kitakyushu, Japan); Takeru Miyazaki (Kyushu Institute of Information Sciences, Japan); Shunsuke Araki (Kyushu Institute of Technology, Japan); Satoshi Uehara (The University of Kitakyushu, Japan)
Other Variations on a Card Protocol for 6-Card 3-Party Equality Function (Six-Card Trick)
Yuji Suga (Internet Initiative Japan Inc., Japan)
A Modulation-Level Coding Design for Downlink SCMA Systems
Yi-Feng Chen (National Taiwan Ocean University, Taiwan); Jian-Jia Weng (National Chung Cheng University, Taiwan)

Wednesday, November 13 10:10 - 11:50

We-AM-1-1: Coding Theory 2

Room 2 (IB201)
Chair: Xiao-Nan Lu (Gifu University, Japan)
Object Tracking Using Multiset Color Coding
Chung Shue Chen (Nokia Bell Labs, France); Yuan-Hsun Lo (National Pingtung University, Taiwan); Wing Shing Wong (The Chinese University of Hong Kong, China); Yijin Zhang (Nanjing University of Science and Technology, China)
A Note on the Theoretical Support to Compute Dimension in Abelian Codes
José Joaquín Bernal (University of Murcia, Spain); Juan Jacobo Simón (Universidad de Murcia, Spain)
The Tight Upper Bound for the Size of Single Deletion Error Correcting Codes of Length 11
Kazuhisa Nakasho (Yamaguchi University, Japan); Manabu Hagiwara (Chiba University, Japan); Austin Anderson (Kapiolani Community College, USA); James Nation (University of Hawaii at Manoa, USA)
Necessary and Sufficient Conditions for Capacity-Achieving Private Information Retrieval and Its Construction Method
Atsushi Miki (Waseda University & Fujitsu, Japan); Yusuke Morishita and Toshiyasu Matsushima (Waseda University, Japan)
A Note on Parity Check Matrices of Private Information Retrieval Codes
Koki Kazama (Shonan Institute of Technology, Japan); Takahiro Yoshida (Nihon University, Japan)

We-AM-1-2: Symmetric-Key Encryption

Room 3 (IB202)
Chair: Atsushi Fujioka (Kanagawa University, Japan)
Development of an Outsourcing Password Evaluation System using Intel SGX
Takeki Kitayama and Yuma Nishihira (Tokai University, Japan); Akira Kanaoka (Toho University, Japan); Yoshio Kakizaki and Toshihiro Ohigashi (Tokai University, Japan)
Security Analysis on End-to-End Encryption of Zoom Mail
Shogo Shiraki and Takanori Isobe (University of Hyogo, Japan)
Formal Security Verification for Searchable Symmetric Encryption Using ProVerif
Mieno Takehiko (Shimonogo Otsu, Ueda City, Nagano & Epson Avasys Company, Japan); Hiroyuki Okazaki (Shinshu University Graduate School, Japan); Kenichi Arai (Nagasaki University, Japan); Yuichi Futa (Tokyo University of Technology, Japan); Yamamoto Hiroaki (Shinshu University, Japan)
Practical Key Management for Searchable Symmetric Encryption using Fuzzy Extractor
Dai Watanabe and Masayuki Yoshino (Hitachi, Ltd., Japan)
Integral Attack with Bit-Based Division Property on Block Cipher LBC-3
Naoki Shibayama and Yasutaka Igarashi (Tokyo University of Science, Japan)

We-AM-1-3: Shannon Theory

Room 4 (IB301)
Chair: Jun Muramatsu (NTT Corporation, Japan)
Capacity Region for Multiple-Access Channels Employing Relay Nodes
Kaito Suzuki and Tomohiko Uyematsu (Institute of Science Tokyo, Japan)
A New Algorithm for Computing α-Capacity
Akira Kamatsuka and Koki Kazama (Shonan Institute of Technology, Japan); Takahiro Yoshida (Nihon University, Japan)
Coding Theorems for Source Coding with Cost
Shigeaki Kuzuoka (Wakayama University, Japan)
Sum Rate Computation for the Gaussian Many-Help-One Problem
Yasutada Oohama (University of Electro-Communications, Japan)
Simulation of Individual Sequences Using Training Data
Tomohiko Uyematsu (Institute of Science Tokyo, Japan)