-
Suguru TAMAKI
2022 Volume E105.A Issue 9 Pages
1180
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
JOURNAL
FREE ACCESS
-
Tetsuya ARAKI, Hiroyuki MIYATA, Shin-ichi NAKANO
Article type: PAPER
Subject area: Algorithms and Data Structures
2022 Volume E105.A Issue 9 Pages
1181-1186
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 08, 2022
JOURNAL
RESTRICTED ACCESS
Given a set of n disjoint intervals on a line and an integer k, we want to find k points in the intervals so that the minimum pairwise distance of the k points is maximized. Intuitively, given a set of n disjoint time intervals on a timeline, each of which is a time span we are allowed to check something, and an integer k, which is the number of times we will check something, we plan k checking times so that the checks occur at equal time intervals as much as possible, that is, we want to maximize the minimum time interval between the k checking times. We call the problem the k-dispersion problem on intervals. If we need to choose exactly one point in each interval, so k=n, and the disjoint intervals are given in the sorted order on the line, then two O(n) time algorithms to solve the problem are known. In this paper we give the first O(n) time algorithm to solve the problem for any constant k. Our algorithm works even if the disjoint intervals are given in any (not sorted) order. If the disjoint intervals are given in the sorted order on the line, then, by slightly modifying the algorithm, one can solve the problem in O(log n) time. This is the first sublinear time algorithm to solve the problem. Also we show some results on the k-dispersion problem on disks, including an FPTAS.
View full abstract
-
Chuzo IWAMOTO, Tatsuya IDE
Article type: PAPER
Subject area: Algorithms and Data Structures
2022 Volume E105.A Issue 9 Pages
1187-1194
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 01, 2022
JOURNAL
RESTRICTED ACCESS
Moon-or-Sun, Nagareru, and Nurimeizu are Nikoli's pencil puzzles. We study the computational complexity of Moon-or-Sun, Nagareru, and Nurimeizu puzzles. It is shown that deciding whether a given instance of each puzzle has a solution is NP-complete.
View full abstract
-
Hiroshi FUJIWARA, Kanaho HANJI, Hiroaki YAMAMOTO
Article type: PAPER
Subject area: Algorithms and Data Structures
2022 Volume E105.A Issue 9 Pages
1195-1202
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 08, 2022
JOURNAL
FREE ACCESS
In the online removable knapsack problem, a sequence of items, each labeled with its value and its size, is given one by one. At each arrival of an item, a player has to decide whether to put it into a knapsack or to discard it. The player is also allowed to discard some of the items that are already in the knapsack. The objective is to maximize the total value of the knapsack. Iwama and Taketomi gave an optimal algorithm for the case where the value of each item is equal to its size. In this paper we consider a case with an additional constraint that the capacity of the knapsack is a positive integer N and that the sizes of items are all integral. For each positive integer N, we design an algorithm and prove its optimality. It is revealed that the competitive ratio is not monotonic with respect to N.
View full abstract
-
Takanori MAEHARA, Kazutoshi ANDO
Article type: PAPER
Subject area: Algorithms and Data Structures, Graphs and Networks
2022 Volume E105.A Issue 9 Pages
1203-1210
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: April 19, 2022
JOURNAL
RESTRICTED ACCESS
In this paper, we address the problem of finding a representation of a subtree distance, which is an extension of a tree metric. We show that a minimal representation is uniquely determined by a given subtree distance, and give an O(n2) time algorithm that finds such a representation, where n is the size of the ground set. Since a lower bound of the problem is Ω(n2), our algorithm achieves the optimal time complexity.
View full abstract
-
Hiroshi ETO, Takehiro ITO, Zhilong LIU, Eiji MIYANO
Article type: PAPER
Subject area: Algorithms and Data Structures, Graphs and Networks
2022 Volume E105.A Issue 9 Pages
1211-1222
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 09, 2022
JOURNAL
RESTRICTED ACCESS
This paper studies generalized variants of the MAXIMUM INDEPENDENT SET problem, called the Maximum Distance-d Independent Set problem (MaxDdIS for short). For an integer d≥2, a distance-d independent set of an unweighted graph G=(V, E) is a subset S⊆V of vertices such that for any pair of vertices u, v∈S, the number of edges in any path between u and v is at least d in G. Given an unweighted graph G, the goal of MaxDdIS is to find a maximum-cardinality distance-d independent set of G. In this paper, we analyze the (in)approximability of the problem on r-regular graphs (r≥3) and planar graphs, as follows: (1) For every fixed integers d≥3 and r≥3, MaxDdIS on r-regular graphs is APX-hard. (2) We design polynomial-time O(rd-1)-approximation and O(rd-2/d)-approximation algorithms for MaxDdIS on r-regular graphs. (3) We sharpen the above O(rd-2/d)-approximation algorithms when restricted to d=r=3, and give a polynomial-time 2-approximation algorithm for MaxD3IS on cubic graphs. (4) Finally, we show that MaxDdIS admits a polynomial-time approximation scheme (PTAS) for planar graphs.
View full abstract
-
Asahi TAKAOKA
Article type: PAPER
Subject area: Graphs and Networks, Algorithms and Data Structures
2022 Volume E105.A Issue 9 Pages
1223-1227
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 07, 2022
JOURNAL
RESTRICTED ACCESS
We studied whether a statement similar to the Ghouila-Houri's theorem might hold for alternating orientations of cocomparability graphs. In this paper, we give the negative answer. We prove that it is NP-complete to decide whether a cocomparability graph has an orientation that is alternating and acyclic. Hence, cocomparability graphs with an acyclic alternating orientation form a proper subclass of alternately orientable cocomparability graphs. We also provide a separating example, that is, an alternately orientable cocomparability graph such that no alternating orientation is acyclic.
View full abstract
-
Kazuyuki MIURA
Article type: PAPER
Subject area: Graphs and Networks, Algorithms and Data Structures
2022 Volume E105.A Issue 9 Pages
1228-1234
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: February 16, 2022
JOURNAL
RESTRICTED ACCESS
A grid drawing of a plane graph G is a drawing of G on the plane so that all vertices of G are put on plane grid points and all edges are drawn as straight line segments between their endpoints without any edge-intersection. In this paper we give a linear-time algorithm to find a grid drawing of any given 5-connected plane graph G with five or more vertices on the outer face. The size of the drawing satisfies W + H≤n - 2, where n is the number of vertices in G, W is the width and H is the height of the grid drawing.
View full abstract
-
Masatoshi OSUMI
Article type: PAPER
Subject area: Graphs and Networks
2022 Volume E105.A Issue 9 Pages
1235-1240
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 24, 2022
JOURNAL
FREE ACCESS
We initiate the study of Ramsey numbers of trails. Let k≥2 be a positive integer. The Ramsey number of trails with k vertices is defined as the the smallest number n such that for every graph H with n vertices, H or the complete H contains a trail with k vertices. We prove that the Ramsey number of trails with k vertices is at most k and at least 2√k+Θ(1). This improves the trivial upper bound of ⌊3k/2⌋-1.
View full abstract
-
Kazuho KANAHARA, Kengo KATAYAMA, Etsuji TOMITA
Article type: PAPER
Subject area: Numerical Analysis and Optimization, Algorithms and Data Structures, Graphs and Networks
2022 Volume E105.A Issue 9 Pages
1241-1251
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 18, 2022
JOURNAL
RESTRICTED ACCESS
The Graph Coloring Problem (GCP) is a fundamental combinatorial optimization problem that has many practical applications. Degree of SATURation (DSATUR) and Recursive Largest First (RLF) are well known as typical solution construction algorithms for GCP. It is necessary to update the vertex degree in the subgraph induced by uncolored vertices when selecting vertices to be colored in both DSATUR and RLF. There is an issue that the higher the edge density of a given graph, the longer the processing time. The purposes of this paper are to propose a degree updating method called Adaptive Degree Updating (ADU for short) that improves the issue, and to evaluate the effectiveness of ADU for DSATUR and RLF on DIMACS benchmark graphs as well as random graphs having a wide range of sizes and densities. Experimental results show that the construction algorithms with ADU are faster than the conventional algorithms for many graphs and that the ADU method yields significant speed-ups relative to the conventional algorithms, especially in the case of large graphs with higher edge density.
View full abstract
-
Ren ISHIBASHI, Kazuki YONEYAMA
Article type: PAPER
Subject area: Cryptography and Information Security
2022 Volume E105.A Issue 9 Pages
1252-1269
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 24, 2022
JOURNAL
RESTRICTED ACCESS
Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
View full abstract
-
Hikaru TSUCHIDA, Takashi NISHIDE
Article type: PAPER
Subject area: Cryptography and Information Security
2022 Volume E105.A Issue 9 Pages
1270-1288
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 09, 2022
JOURNAL
RESTRICTED ACCESS
Multiparty computation (MPC) is a cryptographic method that enables a set of parties to compute an arbitrary joint function of the private inputs of all parties and does not reveal any information other than the output. MPC based on a secret sharing scheme (SS-MPC) and garbled circuit (GC) is known as the most common MPC schemes. Another cryptographic method, homomorphic encryption (HE), computes an arbitrary function represented as a circuit by using ciphertexts without decrypting them. These technologies are in a trade-off relationship for the communication/round complexities, and the computation cost. The private decision tree evaluation (PDTE) is one of the key applications of these technologies. There exist several constant-round PDTE protocols based on GC, HE, or the hybrid schemes that are secure even if a malicious adversary who can deviate from protocol specifications corrupts some parties. There also exist other protocols based only on SS-MPC that are secure only if a semi-honest adversary who follows the protocol specification corrupts some parties. However, to the best of our knowledge, there are currently no constant-round PDTE protocols based only on SS-MPC that are secure against a malicious adversary. In this work, we propose a constant-round four-party PDTE protocol that achieves malicious security. Our protocol provides the PDTE securely and efficiently even when the communication environment has a large latency.
View full abstract
-
Gengxin NING, Yushen LIN, Shenjie JIANG, Jun ZHANG
Article type: PAPER
Subject area: Digital Signal Processing
2022 Volume E105.A Issue 9 Pages
1289-1297
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 09, 2022
JOURNAL
RESTRICTED ACCESS
The performance of conventional direction of arrival (DOA) methods is susceptible to the uncertainty of acoustic velocity in the underwater environment. To solve this problem, an underwater DOA estimation method with L-shaped array for wide-band signals under unknown acoustic velocity is proposed in this paper. The proposed method refers to the idea of incoherent signal subspace method and Root-MUSIC to obtain two sets of average roots corresponding to the subarray of the L-shaped array. And the geometric relationship between two vertical linear arrays is employed to derive the expression of DOA estimation with respect to the two average roots. The acoustic velocity variable in the DOA estimation expression can be eliminated in the proposed method. The simulation results demonstrate that the proposed method is more accurate and robust than other methods in an unknown acoustic velocity environment.
View full abstract
-
Tomu MAKITA, Atsuki NAGAO, Tatsuki OKADA, Kazuhisa SETO, Junichi TERUY ...
Article type: PAPER
Subject area: Algorithms and Data Structures
2022 Volume E105.A Issue 9 Pages
1298-1308
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 08, 2022
JOURNAL
FREE ACCESS
A branching program is a well-studied model of computation and a representation for Boolean functions. It is a directed acyclic graph with a unique root node, some accepting nodes, and some rejecting nodes. Except for the accepting and rejecting nodes, each node has a label with a variable and each outgoing edge of the node has a label with a 0/1 assignment of the variable. The satisfiability problem for branching programs is, given a branching program with n variables and m nodes, to determine if there exists some assignment that activates a consistent path from the root to an accepting node. The width of a branching program is the maximum number of nodes at any level. The satisfiability problem for width-2 branching programs is known to be NP-complete. In this paper, we present a satisfiability algorithm for width-2 branching programs with n variables and cn nodes, and show that its running time is poly(n)·2(1-µ(c))n, where µ(c)=1/2O(c log c). Our algorithm consists of two phases. First, we transform a given width-2 branching program to a set of some structured formulas that consist of AND and Exclusive-OR gates. Then, we check the satisfiability of these formulas by a greedy restriction method depending on the frequency of the occurrence of variables.
View full abstract
-
Nobuyuki SUGIO, Yasutaka IGARASHI, Sadayuki HONGO
Article type: PAPER
Subject area: Cryptography and Information Security
2022 Volume E105.A Issue 9 Pages
1309-1316
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: April 22, 2022
JOURNAL
RESTRICTED ACCESS
Integral cryptanalysis is one of the most powerful attacks on symmetric key block ciphers. Attackers preliminarily search integral characteristics of a target cipher and use them to perform the key recovery attack. Todo proposed a novel technique named the bit-based division property to find integral characteristics. Xiang et al. extended the Mixed Integer Linear Programming (MILP) method to search integral characteristics of lightweight block ciphers based on the bit-based division property. In this paper, we apply these techniques to the symmetric key block cipher KASUMI which was developed by modifying MISTY1. As a result, we found new 4.5-round characteristics of KASUMI for the first time. We show that 7-round KASUMI is attackable with 263 data and 2120 encryptions.
View full abstract
-
Luozhong GONG, Shangzhao LI
Article type: PAPER
Subject area: Cryptography and Information Security
2022 Volume E105.A Issue 9 Pages
1317-1321
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 10, 2022
JOURNAL
FREE ACCESS
The r-th nonlinearity of Boolean functions is an important cryptographic criterion associated with higher order linearity attacks on stream and block ciphers. In this paper, we tighten the lower bound of the second-order nonlinearity of a class of Boolean function over finite field F2n, fλ(x)=Tr(λxd), where λ∈F*2r, d=22r+2r+1 and n=7r. This bound is much better than the lower bound of Iwata-Kurosawa.
View full abstract
-
Rong CHENG, Yu ZHOU, Xinfeng DONG, Xiaoni DU
Article type: PAPER
Subject area: Cryptography and Information Security
2022 Volume E105.A Issue 9 Pages
1322-1329
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 10, 2022
JOURNAL
RESTRICTED ACCESS
S-box is one of the core components of symmetric cryptographic algorithms, but differential distribution table (DDT) is an important tool to research some properties of S-boxes to resist differential attacks. In this paper, we give a relationship between the sum-of-squares of DDT and the sum-of-squares indicator of (n, m)-functions based on the autocorrelation coefficients. We also get some upper and lower bounds on the sum-of-squares of DDT of balanced (n, m)-functions, and prove that the sum-of-squares of DDT of (n, m)-functions is affine invariant under affine affine equivalent. Furthermore, we obtain a relationship between the sum-of-squares of DDT and the signal-to-noise ratio of (n, m)-functions. In addition, we calculate the distributions of the sum-of-squares of DDT for all 3-bit S-boxes, the 4-bit optimal S-boxes and all 302 balanced S-boxes (up to affine equivalence), data experiments verify our results.
View full abstract
-
Ningkang CHEN, Ping WEI, Lin GAO, Huaguo ZHANG, Hongshu LIAO
Article type: PAPER
Subject area: Communication Theory and Signals
2022 Volume E105.A Issue 9 Pages
1330-1339
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 14, 2022
JOURNAL
RESTRICTED ACCESS
This paper aims to design multiple-input multiple-output (MIMO) radar receiving weights and transmitting waveforms, in order to obtain better spatial filtering performance and enhance the robustness in the case of signal-dependent interference and jointly inaccurate estimated angles of target and interference. Generally, an alternate iterative optimization algorithm is proposed for the joint design problem. Specifically, the receiving weights are designed by the generalized eigenvalue decomposition of the matrix which contains the estimated information of the target and interference. As the cost function of the transmitting waveform design is fractional, the fractional optimization problem is first converted into a secondary optimization problem. Based on the proposed algorithm, a closed-form solution of the waveform is given using the alternating projection. At the analysis stage, in the presence of estimated errors under the environment of signal-dependent interference, a robust signal-to-interference and noise ratio (SINR) performance is obtained using a small amount of calculation with an iterative procedure. Numerical examples verify the effectiveness of the performances of the designed waveform in terms of the SINR, beampattern and pulse compression.
View full abstract
-
Yuanwei HOU, Yu GU, Weiping LI, Zhi LIU
Article type: PAPER
Subject area: Mobile Information Network and Personal Communications
2022 Volume E105.A Issue 9 Pages
1340-1347
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: April 01, 2022
JOURNAL
RESTRICTED ACCESS
The fast evolving credential attacks have been a great security challenge to current password-based information systems. Recently, biometrics factors like facial, iris, or fingerprint that are difficult to forge rise as key elements for designing passwordless authentication. However, capturing and analyzing such factors usually require special devices, hindering their feasibility and practicality. To this end, we present WiASK, a device-free WiFi sensing enabled Authentication System exploring Keystroke dynamics. More specifically, WiASK captures keystrokes of a user typing a pre-defined easy-to-remember string leveraging the existing WiFi infrastructure. But instead of focusing on the string itself which are vulnerable to password attacks, WiASK interprets the way it is typed, i.e., keystroke dynamics, into user identity, based on the biologically validated correlation between them. We prototype WiASK on the low-cost off-the-shelf WiFi devices and verify its performance in three real environments. Empirical results show that WiASK achieves on average 93.7% authentication accuracy, 2.5% false accept rate, and 5.1% false reject rate.
View full abstract
-
Takahiro OGURA, Haiyan WANG, Qiyao WANG, Atsuki KIUCHI, Chetan GUPTA, ...
Article type: PAPER
Subject area: Mathematical Systems Science
2022 Volume E105.A Issue 9 Pages
1348-1357
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: February 25, 2022
JOURNAL
FREE ACCESS
We propose a penalty-based and constraint Bayesian optimization methods with an agent-based supply-chain (SC) simulator as a new Monte Carlo optimization approach for multi-echelon inventory management to improve key performance indicators such as inventory cost and sales opportunity loss. First, we formulate the multi-echelon inventory problem and introduce an agent-based SC simulator architecture for the optimization. Second, we define the optimization framework for the formulation. Finally, we discuss the evaluation of the effectiveness of the proposed methods by benchmarking it against the most commonly used genetic algorithm (GA) in simulation-based inventory optimization. Our results indicate that the constraint Bayesian optimization can minimize SC inventory cost with lower sales opportunity loss rates and converge to the optimal solution 22 times faster than GA in the best case.
View full abstract
-
Daisuke SATOH, Takemi MOCHIDA
Article type: PAPER
Subject area: General Fundamentals and Boundaries
2022 Volume E105.A Issue 9 Pages
1358-1371
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: May 10, 2022
JOURNAL
FREE ACCESS
The road space rationing (RSR) method regulates a period in which a user group can make telephone calls in order to decrease the call attempt rate and induce calling parties to shorten their calls during disaster congestion. This paper investigates what settings of this indirect control induce more self-restraint and how the settings change calling parties' behavior using experimental psychology. Our experiments revealed that the length of the regulated period differently affected calling parties' behavior (call duration and call attempt rate) and indicated that the 60-min RSR method (i.e., 10 six-min periods) is the most effective setting against disaster congestion.
View full abstract
-
Binhao HE, Meiting XUE, Shubiao LIU, Feng YU, Weijie CHEN
Article type: LETTER
Subject area: Digital Signal Processing
2022 Volume E105.A Issue 9 Pages
1372-1376
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 02, 2022
JOURNAL
RESTRICTED ACCESS
The top-K sorting is a variant of sorting used heavily in applications such as database management systems. Recently, the use of field programmable gate arrays (FPGAs) to accelerate sorting operation has attracted the interest of researchers. However, existing hardware top-K sorting algorithms are either resource-intensive or of low throughput. In this paper, we present a resource-efficient top-K sorting architecture that is composed of L cascading sorting units, and each sorting unit is composed of P sorting cells. K=PL largest elements are produced when a variable length input sequence is processed. This architecture can operate at a high frequency while consuming fewer resources. The experimental results show that our architecture achieved a maximum 1.2x throughput-to-resource improvement compared to previous studies.
View full abstract
-
Kento SAKA, Toshimichi SAITO
Article type: LETTER
Subject area: Nonlinear Problems
2022 Volume E105.A Issue 9 Pages
1377-1380
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: March 29, 2022
JOURNAL
RESTRICTED ACCESS
This letter studies a biobjective optimization problem in binary associative memories characterized by ternary connection parameters. First, we introduce a condition of parameters that guarantees storage of any desired memories and suppression of oscillatory behavior. Second, we define a biobjective problem based on two objectives that evaluate uniform stability of desired memories and sparsity of connection parameters. Performing precise numerical analysis for typical examples, we have clarified existence of a trade-off between the two objectives.
View full abstract
-
Wei HE, Yu ZHANG, Yin LI
Article type: LETTER
Subject area: Numerical Analysis and Optimization
2022 Volume E105.A Issue 9 Pages
1381-1384
Published: September 01, 2022
Released on J-STAGE: September 01, 2022
Advance online publication: April 26, 2022
JOURNAL
FREE ACCESS
We introduce a new type of exponentiation algorithm in GF(2m) using Euclidean inversion. Our approach is based on the fact that Euclidean inversion cost much less logic gates than ordinary multiplication in GF(2m). By applying signed binary form of the exponent instead of classic binary form, the proposed algorithm can reduce the number of operations further compared with the classic algorithms.
View full abstract