-
Kazuki Azami, Shigenori Uchiyama
2014 Volume 6 Pages
1-4
Published: 2014
Released on J-STAGE: January 31, 2014
JOURNAL
FREE ACCESS
In 1969, Riesel proposed a primality test for natural numbers of the form $h \cdot 2^n-1$, which includes the case $h=n$, the Woodall numbers $W_ {n} = n \cdot 2 ^ {n} -1$. In this paper, we utilize Riesel's primality test for Woodall numbers, and propose a primality testing algorithm for Woodall numbers. The implementations of the algorithm and its optimization are discussed.
View full abstract
-
Junichi Yarimizu, Yukihiro Uchida, Shigenori Uchiyama
2014 Volume 6 Pages
5-7
Published: 2014
Released on J-STAGE: March 20, 2014
JOURNAL
FREE ACCESS
In 1948, Ward defined elliptic divisibility sequences satisfying a certain recurrence relation. An elliptic divisibility sequence arises from any choice of elliptic curve and initial point on that curve. In this paper, we define a hard problem in the theory of elliptic divisibility sequences (EDS-DH problem), which is computationally equivalent to the elliptic curve Diffie-Hellman problem.
View full abstract
-
Tomoaki Okayama
2014 Volume 6 Pages
9-11
Published: 2014
Released on J-STAGE: April 17, 2014
JOURNAL
FREE ACCESS
The tanh rule and the double-exponential (DE) formula are known empirically and theoretically as quite efficient quadrature formulas, especially for integrals with endpoint singularity, including algebraic singularity and logarithmic singularity. Furthermore, in the case of integrals with algebraic singularity, explicit error bounds have been given for those formulas, which enables us to guarantee their approximation accuracy. In the case of integrals with logarithmic singularity, however, such explicit error bounds have not ever given thus far, although those formulas should work accurately in this case as well. This paper presents the desired theoretical explicit error bounds, with numerical experiments.
View full abstract
-
Takumi Tomita, Tsuyoshi Takagi
2014 Volume 6 Pages
13-16
Published: 2014
Released on J-STAGE: May 16, 2014
JOURNAL
FREE ACCESS
Boneh and Franklin proposed a practical Identity-Based Encryption (IBE) in 2001 [1]. In order to embed an identity of users in the IBE, we need a hash function, called HashToPoint. The dominant computation of HashToPoint is the scalar multiplication by a large cofactor $c$, which is relatively expensive compared with other cryptographic functions in the IBE. In this paper, we present a list of cofactor $c$ with Hamming weight two, which can accelerate the computation of HashToPoint. Indeed the timing of our implementation of HashToPoint using the proposed cofactor is reduced by about 30% on a desktop PC.
View full abstract
-
Hidemi Aihara, Jirô Akahori, Edouard Grenier
2014 Volume 6 Pages
17-20
Published: 2014
Released on J-STAGE: May 16, 2014
JOURNAL
FREE ACCESS
In the real market, the term structure of forward rates exhibits some humps. The quadratic Gaussian term structure models or affine term structure models well explain this phenomena. In this research, we give a new insight, where we understand the humps as multi-soliton that are related to KdV solitons.
View full abstract
-
Jeff Irion, Naoki Saito
2014 Volume 6 Pages
21-24
Published: 2014
Released on J-STAGE: May 16, 2014
JOURNAL
FREE ACCESS
We describe a new transform that generates a dictionary of bases for handling data on a graph by combining recursive partitioning of the graph and the Laplacian eigenvectors of each subgraph. Similar to the wavelet packet and local cosine dictionaries for regularly sampled signals, this dictionary of bases on the graph allows one to select an orthonormal basis that is most suitable to one's task at hand using a best-basis type algorithm. We also describe a few related transforms including a version of the Haar wavelet transform on a graph, each of which may be useful in its own right.
View full abstract
-
Fumio Kikuchi, Daisuke Koyama
2014 Volume 6 Pages
25-28
Published: 2014
Released on J-STAGE: July 23, 2014
JOURNAL
FREE ACCESS
In a preceding paper, we proved the discrete compactness properties of Rellich type for some 2D discontinuous Galerkin finite element methods (DGFEM), that is, the strong $L^2$ convergence of some subfamily of finite element functions bounded in an $H^1$-like mesh-dependent norm. In this note, we will show the strong $L^p$ convergence of the above subfamily for $1 \le p < \infty$. To this end, we will utilize the duality mappings and special auxiliary problems. The results are applicable to numerical analysis of various semi-linear problems.
View full abstract
-
Hideyuki Azegami, Kohji Ohtsuka, Masato Kimura
2014 Volume 6 Pages
29-32
Published: 2014
Released on J-STAGE: July 23, 2014
JOURNAL
FREE ACCESS
This paper presents analytic solutions of the shape derivatives (Fréchet derivatives with respect to domain variation) for singular points of cost functions in shape-optimization problems for the domain in which the boundary value problem of a partial differential equation is defined. A design variable is given by a domain mapping. Cost functions are defined as functionals of the design variable and the solution to the boundary value problem. The analytic solutions for singular points such as crack tips and boundary points of the mixed boundary conditions on a smooth boundary are obtained by using the generalized $J$ integral.
View full abstract
-
Masao Oi
2014 Volume 6 Pages
33-36
Published: 2014
Released on J-STAGE: August 01, 2014
JOURNAL
FREE ACCESS
We give an algorithm which computes $r$, defined by K. Kato in the paper [1], which is an important invariant for Artin-Schreier extensions of surfaces $X$ over fields of positive characteristic. The Swan conductor gives the invariant of ramifications concerning codimension 1 subvarieties of $X$. This $r$ gives the invariant of ramifications concerning codimension 2 subvarieties of $X$. The invariant $r$ is important to calculate the Euler Poincaré characteristic of some smooth $l$-adic sheaf of rank 1 on an open dense subscheme $U$ of $X$.
View full abstract
-
Yasunori Mineo, Shigenori Uchiyama
2014 Volume 6 Pages
37-39
Published: 2014
Released on J-STAGE: August 01, 2014
JOURNAL
FREE ACCESS
This paper analyzes the problem of speeding up single-scalar multiplication of a recently introduced type of elliptic curve, so-called ``twisted Edwards curve", and also presents a new construction of addition chains using the extended double-base number system. Our method uses the Fibonacci sequence. It was found through numerical investigation that our double-base chains can save time, compared with other methods in previous work.
View full abstract
-
Takahiro Aoyama, Kazuhiro Yoshikawa
2014 Volume 6 Pages
41-44
Published: 2014
Released on J-STAGE: August 13, 2014
JOURNAL
FREE ACCESS
In the studies of mathematical statistics, we often consider discrete distributions and their corresponding stochastic processes. Especially, probabilistic limit theorems of them may give us some progress in mathematical finance. There exist not so many properties of discrete distributions on $\mathbb{R}^d$. In this paper, we treat multiple zeta functions as to define several forms of discrete distributions on $\mathbb{R}^d$ including those with infinitely many mass points. Our purpose is to obtain new methods in the relations between multiple infinite series and high dimensional integral calculus, which can provide us more opportunities to handle high dimensional phenomenon.
View full abstract
-
Takahiro Aoyama, Nobutaka Shimizu
2014 Volume 6 Pages
45-48
Published: 2014
Released on J-STAGE: August 13, 2014
JOURNAL
FREE ACCESS
There exist not many treatable multivariable functions with respect to multidimensional discrete distributions. In this paper, we pick up multidimensional finite Euler products and show when they can generate characteristic functions. Moreover, the infinite divisibility of them are studied as well as non-infinite divisibility which are rarely seen in multidimensional discrete case with infinitely many mass points. The relation between series representations of zeta functions is also studied by adjusting to the Shintani zeta type.
View full abstract
-
Suguru Yamanaka, Masaaki Otaka
2014 Volume 6 Pages
49-52
Published: 2014
Released on J-STAGE: November 03, 2014
JOURNAL
FREE ACCESS
In this paper we propose a practical cost-effective model to estimate the credit risk of a large portfolio of real estate non-recourse loans. It uses information that is as easy to get and update as possible, such as real estate investment indices and macroeconomic indices. Empirical characteristics of real estates can be taken into account, such as serial correlations, cross-sectional correlations within individual properties, lagged effects of macroeconomic factors.
View full abstract
-
Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takag ...
2014 Volume 6 Pages
53-56
Published: 2014
Released on J-STAGE: November 03, 2014
JOURNAL
FREE ACCESS
The security of the optimal Ate pairing using the BN curves is based on the hardness of the DLP over $\text{GF}(p^{12})$. At CRYPTO 2006, Joux et al. proposed the number field sieve over $\text{GF}(p^n)$, but the number field sieve needs multi-dimensional sieving. In this paper, we deal with the multi-dimensional sieving, and discuss its parameter sizes such as the dimension of sieving and the size of the sieving region from some experiments of the multi-dimensional sieving. Using efficient parameters, we have solved the DLP over $\text{GF}(p^{12})$ of 203 bits in about 43 hours using a PC of 16 CPU cores.
View full abstract
-
Yusaku Yamamoto, Zhang Lan, Shuhei Kudo
2014 Volume 6 Pages
57-60
Published: 2014
Released on J-STAGE: November 24, 2014
JOURNAL
FREE ACCESS
We analyze convergence properties of the parallel classical block Jacobi method for the symmetric eigenvalue problem using dynamic ordering strategy of Bečka et al. It is shown that the method is globally convergent. It is also shown that the order of convergence is ultimately quadratic if there are no multiple eigenvalues.
View full abstract
-
Hiroto Tadano, Youichi Ishikawa, Akira Imakura
2014 Volume 6 Pages
61-64
Published: 2014
Released on J-STAGE: November 29, 2014
JOURNAL
FREE ACCESS
Block Krylov subspace methods are efficient solvers for linear systems with multiple right-hand sides in terms of the number of iterations and computational time. As one of Block Krylov subspace methods, the Block BiCR method has been proposed by Zhang et al. in 2013. This method often shows a smooth convergence behavior compared with the Block BiCG method. However, the accuracy of the approximate solution generated by the Block BiCR method often deteriorates. In this paper we propose a modified Block BiCR method in order to improve the accuracy of the approximate solutions.
View full abstract
-
Shusaku Saito, Hiroto Tadano, Akira Imakura
2014 Volume 6 Pages
65-68
Published: 2014
Released on J-STAGE: November 29, 2014
JOURNAL
FREE ACCESS
In this paper, we derive the Block BiCGSTAB($\ell$) method which is developed by extending the BiCGSTAB($\ell$) method. We also propose some techniques to improve convergence properties by applying orthogonalization and to improve the accuracy of the approximate solutions by additional matrix multiplications. Some numerical experiments indicate that the performance of the Block BiCGSTAB($\ell$) method with those stabilization techniques can be higher than that of the Block BiCGSTAB method.
View full abstract
-
Yang Liu, Naoki Kanayama, Kazutaka Saito, Tadanori Teruya, Shigenori U ...
2014 Volume 6 Pages
69-72
Published: 2014
Released on J-STAGE: November 30, 2014
JOURNAL
FREE ACCESS
The pairing-based cryptosystem was proposed in 2001, and it provides efficient implementations of identity-based encryption (IBE) and attribute-based encryption (ABE). In 2010, Costello and Stebila introduced the concept of fixed argument pairing, which can be applied to many applications of pairings, and, to compute these pairings, they proposed an efficient algorithm based on the Miller algorithm. In this paper, we propose a method for computing fixed argument pairings, based on the elliptic net method proposed by Stange.
View full abstract
-
Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayas ...
2014 Volume 6 Pages
73-76
Published: 2014
Released on J-STAGE: November 30, 2014
JOURNAL
FREE ACCESS
Estimating the number of pairing-friendly elliptic curves is important for obtaining such a curve with a suitable security level and high efficiency. For 128-bit security level, M. Naehrig and J. Boxall estimated the number of Barreto-Naehrig (BN) curves. For future use, we extend their results to higher security levels, that is, to count Kachisa-Schaefer-Scott (KSS) curves with 192- and 224-bit security levels. Our efficient counting is based on a number-theoretic conjecture, called the Bateman-Horn conjecture. We verify the validity of using the conjecture and confirm that an enough amount of KSS curves can be obtained for practical use.
View full abstract
-
Jirô Akahori, Yuuki Ida
2014 Volume 6 Pages
77-80
Published: 2014
Released on J-STAGE: December 05, 2014
JOURNAL
FREE ACCESS
In the present paper, we introduce a framework of a discrete stochastic calculus based on
Parisian walk, a special kind of symmetric random walk in the complex plane, listing some results analogue to those for complex Brownian motion. We also discuss, as an application to mathematical finance, a Parisian-walk analogue of Heston's stochastic volatility model.
View full abstract
-
Tomonori Kouya
2014 Volume 6 Pages
81-84
Published: 2014
Released on J-STAGE: December 17, 2014
JOURNAL
FREE ACCESS
The Strassen algorithm and Winograd's variant accelerate matrix multiplication by using fewer arithmetic operations than standard matrix multiplication. Although many papers have been published to accelerate single- as well as double-precision matrix multiplication by using these algorithms, no research to date has been undertaken to accelerate multiple precision matrix multiplication. In this paper, we propose a multiple precision matrix multiplication program for matrices of any size and test its performance. We also reveal special properties of our program through its application to LU decomposition.
View full abstract
-
Attila Bérczes, Lajos Hajdu, Noriko Hirata-Kohno, Tünde Kovács, Attila ...
2014 Volume 6 Pages
85-88
Published: 2014
Released on J-STAGE: December 17, 2014
JOURNAL
FREE ACCESS
The aim of this article is to present a cryptosystem with a new key exchange protocol based on Diophantine equations of polynomial type. Our protocol is inspired by that of H. Yosh whose security comes from a translation of Diophantine equations. We suggest here a key exchange protocol relying on the hardness of solving Diophantine equations in the ring of $S$-integers.
View full abstract
-
Kouhei Shintani, Hideyuki Azegami
2014 Volume 6 Pages
89-92
Published: 2014
Released on J-STAGE: December 21, 2014
JOURNAL
FREE ACCESS
The present paper describes a solution to a non-parametric shape optimization problem of a rubber bushing in order to adjust a function of the reaction force with respect to static displacement to a desired function. The main problem is defined as a static hyperelastic problem considering a large deformation and a non-linear constitutive equation. The squared error norm of the work done by compulsory displacement and the volume are chosen as cost functions. The shape derivatives of the cost functions are derived theoretically. An iterative algorithm based on the $H^1$ gradient method is used to solve the shape optimization problem.
View full abstract