IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E101.A, Issue 12
Displaying 51-61 of 61 articles from this issue
Special Section on Signal Design and Its Applications in Communications
  • Deng TANG, Shaojing FU, Yang YANG
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 12 Pages 2402-2404
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    Semi-bent functions have very high nonlinearity and hence they have many applications in symmetric-key cryptography, binary sequence design for communications, and combinatorics. In this paper, we focus on studying the additive autocorrelation of semi-bent functions. We provide a lower bound on the maximum additive autocorrelation absolute value of semi-bent functions with three-level additive autocorrelation. Semi-bent functions with three-level additive autocorrelation achieving this bound with equality are said to have perfect three-level additive autocorrelation. We present two classes of balanced semi-bent functions with optimal algebraic degree and perfect three-level additive autocorrelation.

    Download PDF (278K)
  • Tatsuya CHUMAN, Hitoshi KIYA
    Article type: LETTER
    Subject area: Image
    2018 Volume E101.A Issue 12 Pages 2405-2408
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces against brute-force attacks, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, we evaluate the security of encrypted images including JPEG distortion by using automatic jigsaw puzzle solvers.

    Download PDF (1277K)
  • Fanxin ZENG, Xiping HE, Guojun LI, Guixin XUAN, Zhenyu ZHANG, Yanni PE ...
    Article type: LETTER
    Subject area: Information Theory
    2018 Volume E101.A Issue 12 Pages 2409-2414
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    This paper improves the family size of quadrature amplitude modulation (QAM) complementary sequences with binary inputs. By employing new mathematical description: B-type-2 of 4q-QAM constellation (integer q ≥ 2), a new construction yielding 4q-QAM complementary sequences (CSs) with length 2m (integer m ≥ 2) is developed. The resultant sequences include the known QAM CSs with binary inputs as special cases, and the family sizes of new sequences are approximately 22·2q-4q-1(22·2q-3-1) times as many as the known. Also, both new sequences and the known have the same the peak envelope power (PEP) upper bounds, when they are used in an orthogonal frequency-division multiplexing communication system.

    Download PDF (342K)
  • Takahiro MATSUMOTO, Hideyuki TORII, Yuta IDA, Shinya MATSUFUJI
    Article type: LETTER
    Subject area: Spread Spectrum Technologies and Applications
    2018 Volume E101.A Issue 12 Pages 2415-2418
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this paper, we propose a generation method of new mutually zero-correlation zone set of optical orthogonal sequences (MZCZ-OOS) consisting of binary and bi-phase sequence pairs based on the optical zero-correlation zone (ZCZ) sequence set. The MZCZ-OOS is composed of several small orthogonal sequence sets. The sequences that belong to same subsets are orthogonal, and there is a ZCZ between the sequence that belong to different subsets. The set is suitable for the M-ary quasi-synchronous optical code-division multiple access (M-ary/QS-OCDMA) system. The product of set size S and family size M of proposed MMZCZ-OOS is more than the upper bound of optical ZCZ sequence set, and is fewer than the that of optical orthogonal sequence set.

    Download PDF (305K)
Regular Section
  • Seiji MIYOSHI, Yoshinobu KAJIKAWA
    Article type: PAPER
    Subject area: Digital Signal Processing
    2018 Volume E101.A Issue 12 Pages 2419-2433
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    We analyze the behaviors of the FXLMS algorithm using a statistical-mechanical method. The cross-correlation between a primary path and an adaptive filter and the autocorrelation of the adaptive filter are treated as macroscopic variables. We obtain simultaneous differential equations that describe the dynamical behaviors of the macroscopic variables under the condition that the tapped-delay line is sufficiently long. The obtained equations are deterministic and closed-form. We analytically solve the equations to obtain the correlations and finally compute the mean-square error. The obtained theory can quantitatively predict the behaviors of computer simulations including the cases of both not only white but also nonwhite reference signals. The theory also gives the upper limit of the step size in the FXLMS algorithm.

    Download PDF (773K)
  • Yuma ABE, Hiroyuki TSUJI, Amane MIURA, Shuichi ADACHI
    Article type: PAPER
    Subject area: Systems and Control
    2018 Volume E101.A Issue 12 Pages 2434-2445
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    We propose an approach to allocate bandwidth for a satellite communications (SATCOM) system that includes the recent high-throughput satellite (HTS) with frequency flexibility. To efficiently operate the system, we manage the limited bandwidth resources available for SATCOM by employing a control method that allows the allocated bandwidths to exceed the communication demand of user terminals per HTS beam. To this end, we consider bandwidth allocation for SATCOM as an optimal control problem. Then, assuming that the model of communication requests is available, we propose an optimal control method by combining model predictive control and sparse optimization. The resulting control method enables the efficient use of the limited bandwidth and reduces the bandwidth loss and number of control actions for the HTS compared to a setup with conventional frequency allocation and no frequency flexibility. Furthermore, the proposed method allows to allocate bandwidth depending on various control objectives and beam priorities by tuning the corresponding weighting matrices. These findings were verified through numerical simulations by using a simple time variation model of the communication requests and predicted aircraft communication demand obtained from the analysis of actual flight tracking data.

    Download PDF (2244K)
  • Taishin NAKAMURA, Hisashi YAMAMOTO, Tomoaki AKIBA
    Article type: PAPER
    Subject area: Reliability, Maintainability and Safety Analysis
    2018 Volume E101.A Issue 12 Pages 2446-2453
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    An optimal arrangement problem involves finding a component arrangement to maximize system reliability, namely, the optimal arrangement. It is useful to obtain the optimal arrangement when we design a practical system. An existing study developed an algorithm for finding the optimal arrangement of a connected-(r, s)-out-of-(m, n): F lattice system with r=m-1 and n<2s. However, the algorithm is time-consuming to find the optimal arrangement of a system having many components. In this study, we develop an algorithm for efficiently finding the optimal arrangement of the system with r=m-1 and s=n-1 based on the depth-first branch-and-bound method. In the algorithm, before enumerating arrangements, we assign some components without computing the system reliability. As a result, we can find the optimal arrangement effectively because the number of components which must be assigned decreases. Furthermore, we develop an efficient method for computing the system reliability. The numerical experiment demonstrates the effectiveness of our proposed algorithm.

    Download PDF (1299K)
  • Honglong DAI, Jinying CHANG, Zhenduo HOU, Maozhi XU
    Article type: PAPER
    Subject area: Information Theory
    2018 Volume E101.A Issue 12 Pages 2454-2463
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    The enhanced chosen-ciphertext security (ECCA) is motivated by the concept of randomness recovering encryption, which was presented by Dana Dachman-Soled et al. in PKC 2014 [9]. ECCA security is the enhanced version of CCA security. CCA security often appears to be somewhat too strong, so ECCA security is also too strong: there exist encryption schemes that are not ECCA secure but still have some practical application. Canetti et al. proposed a relaxed variant of CCA security called Replayable CCA (RCCA) security in CRYPTO 2003 [3]. In this paper, we propose a relaxed variant of ECCA security called Replayable security (RECCA). RECCA security is the enhanced version of RCCA security. Since RCCA security suffices for the most existing application of CCA security, RECCA security also suffices for them, too. Moreover, RECCA security provides a useful general version of security against active attacks.

    Download PDF (1063K)
  • Kaijie ZHOU, Huali WANG, Peipei CAO, Zhangkai LUO
    Article type: PAPER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 12 Pages 2464-2471
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    Excitation of Extremely Low Frequency (ELF)/Very Low Frequency (VLF) from ionosphere,which is artificial modulated by High Frequency (HF) waves can provide a way of antenna generation for deep submarine communication. In this paper, based on plasma energy conservation equation, the theoretical model of amplitude modulation HF pump heating low ionosphere for ELF/VLF generation is established. The linear frequency modulation technique of up-chirp and down-chirp have good self-correlation and cross-correlation, by which information can be transmitted by up-chirp and down-chirp. Thus, the linear frequency modulation technique can be applied to the ionosphere ELF/VLF communication. Based on this, a Chirp-BOK (Binary Orthogonal Keying) communication scheme is proposed. Indeed the Chirp-BOK amplitude and power modulation function are designed by combining the linear frequency modulation technique with the square wave amplitude modulation technique. The simulation results show in the condition that the ionosphere is heated by the Chirp-BOK power modulation HF waves, the temperature of ionospheric electronic and the variations of conductivity have obvious frequency modulation characteristics which are the same as that of power modulation, so does the variation of ionospheric current. Thus, when the ionosphere is heated by Chirp-BOK power modulation HF waves, the up-chirp (symbol ‘0’) and down-chirp (symbol ‘1’) ELF/VLF signals can be generated.

    Download PDF (1178K)
  • Shijie LIN, Chen DONG, Zhiqiang WANG, Wenzhong GUO, Zhenyi CHEN, Yin Y ...
    Article type: LETTER
    Subject area: Algorithms and Data Structures
    2018 Volume E101.A Issue 12 Pages 2472-2476
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    A Lévy search strategy based chaotic artificial bee colony algorithm (LABC) is proposed in this paper. The chaotic sequence, global optimal mechanism and Lévy flight mechanism were introduced respectively into the initialization, the employed bee search and the onlooker bee search. The experiments show that the proposed algorithm performed better in convergence speed, global search ability and optimization accuracy than other improved ABC.

    Download PDF (1529K)
  • Yanyan JI, Jinyong CHANG, Honglong DAI, Maozhi XU
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 12 Pages 2477-2480
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL RESTRICTED ACCESS

    Network coding signature (NCS) scheme is a cryptographic tool for network coding against pollution attacks. In [5], Chang et al. first introduced the related-key attack (RKA) to the NCS schemes and tried to give an instantiation of it. However, their instantiation is based on the random oracle (RO) model. In this letter, we present a standard-model instantiation. In particular, we prove that standard-model-based NCS scheme introduced by Boneh et al. in [4] (BFKW scheme, for short) can achieve Φ-RKA security if the underlying signature scheme is also Φ-RKA secure, where Φ is any family of functions defined on signing keys of NCS schemes.

    Download PDF (166K)
feedback
Top