IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E105.A, Issue 9
Displaying 1-24 of 24 articles from this issue
Special Section on Discrete Mathematics and Its Applications
  • Suguru TAMAKI
    2022 Volume E105.A Issue 9 Pages 1180
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    JOURNAL FREE ACCESS
    Download PDF (246K)
  • Tetsuya ARAKI, Hiroyuki MIYATA, Shin-ichi NAKANO
    Article type: PAPER
    Subject area: Algorithms and Data Structures
    2022 Volume E105.A Issue 9 Pages 1181-1186
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 08, 2022
    JOURNAL RESTRICTED ACCESS

    Given a set of n disjoint intervals on a line and an integer k, we want to find k points in the intervals so that the minimum pairwise distance of the k points is maximized. Intuitively, given a set of n disjoint time intervals on a timeline, each of which is a time span we are allowed to check something, and an integer k, which is the number of times we will check something, we plan k checking times so that the checks occur at equal time intervals as much as possible, that is, we want to maximize the minimum time interval between the k checking times. We call the problem the k-dispersion problem on intervals. If we need to choose exactly one point in each interval, so k=n, and the disjoint intervals are given in the sorted order on the line, then two O(n) time algorithms to solve the problem are known. In this paper we give the first O(n) time algorithm to solve the problem for any constant k. Our algorithm works even if the disjoint intervals are given in any (not sorted) order. If the disjoint intervals are given in the sorted order on the line, then, by slightly modifying the algorithm, one can solve the problem in O(log n) time. This is the first sublinear time algorithm to solve the problem. Also we show some results on the k-dispersion problem on disks, including an FPTAS.

    Download PDF (981K)
  • Chuzo IWAMOTO, Tatsuya IDE
    Article type: PAPER
    Subject area: Algorithms and Data Structures
    2022 Volume E105.A Issue 9 Pages 1187-1194
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 01, 2022
    JOURNAL RESTRICTED ACCESS

    Moon-or-Sun, Nagareru, and Nurimeizu are Nikoli's pencil puzzles. We study the computational complexity of Moon-or-Sun, Nagareru, and Nurimeizu puzzles. It is shown that deciding whether a given instance of each puzzle has a solution is NP-complete.

    Download PDF (1451K)
  • Hiroshi FUJIWARA, Kanaho HANJI, Hiroaki YAMAMOTO
    Article type: PAPER
    Subject area: Algorithms and Data Structures
    2022 Volume E105.A Issue 9 Pages 1195-1202
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 08, 2022
    JOURNAL FREE ACCESS

    In the online removable knapsack problem, a sequence of items, each labeled with its value and its size, is given one by one. At each arrival of an item, a player has to decide whether to put it into a knapsack or to discard it. The player is also allowed to discard some of the items that are already in the knapsack. The objective is to maximize the total value of the knapsack. Iwama and Taketomi gave an optimal algorithm for the case where the value of each item is equal to its size. In this paper we consider a case with an additional constraint that the capacity of the knapsack is a positive integer N and that the sizes of items are all integral. For each positive integer N, we design an algorithm and prove its optimality. It is revealed that the competitive ratio is not monotonic with respect to N.

    Download PDF (1638K)
  • Takanori MAEHARA, Kazutoshi ANDO
    Article type: PAPER
    Subject area: Algorithms and Data Structures, Graphs and Networks
    2022 Volume E105.A Issue 9 Pages 1203-1210
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: April 19, 2022
    JOURNAL RESTRICTED ACCESS

    In this paper, we address the problem of finding a representation of a subtree distance, which is an extension of a tree metric. We show that a minimal representation is uniquely determined by a given subtree distance, and give an O(n2) time algorithm that finds such a representation, where n is the size of the ground set. Since a lower bound of the problem is Ω(n2), our algorithm achieves the optimal time complexity.

    Download PDF (1037K)
  • Hiroshi ETO, Takehiro ITO, Zhilong LIU, Eiji MIYANO
    Article type: PAPER
    Subject area: Algorithms and Data Structures, Graphs and Networks
    2022 Volume E105.A Issue 9 Pages 1211-1222
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 09, 2022
    JOURNAL RESTRICTED ACCESS

    This paper studies generalized variants of the MAXIMUM INDEPENDENT SET problem, called the Maximum Distance-d Independent Set problem (MaxDdIS for short). For an integer d≥2, a distance-d independent set of an unweighted graph G=(V, E) is a subset SV of vertices such that for any pair of vertices u, vS, the number of edges in any path between u and v is at least d in G. Given an unweighted graph G, the goal of MaxDdIS is to find a maximum-cardinality distance-d independent set of G. In this paper, we analyze the (in)approximability of the problem on r-regular graphs (r≥3) and planar graphs, as follows: (1) For every fixed integers d≥3 and r≥3, MaxDdIS on r-regular graphs is APX-hard. (2) We design polynomial-time O(rd-1)-approximation and O(rd-2/d)-approximation algorithms for MaxDdIS on r-regular graphs. (3) We sharpen the above O(rd-2/d)-approximation algorithms when restricted to d=r=3, and give a polynomial-time 2-approximation algorithm for MaxD3IS on cubic graphs. (4) Finally, we show that MaxDdIS admits a polynomial-time approximation scheme (PTAS) for planar graphs.

    Download PDF (1926K)
  • Asahi TAKAOKA
    Article type: PAPER
    Subject area: Graphs and Networks, Algorithms and Data Structures
    2022 Volume E105.A Issue 9 Pages 1223-1227
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 07, 2022
    JOURNAL RESTRICTED ACCESS

    We studied whether a statement similar to the Ghouila-Houri's theorem might hold for alternating orientations of cocomparability graphs. In this paper, we give the negative answer. We prove that it is NP-complete to decide whether a cocomparability graph has an orientation that is alternating and acyclic. Hence, cocomparability graphs with an acyclic alternating orientation form a proper subclass of alternately orientable cocomparability graphs. We also provide a separating example, that is, an alternately orientable cocomparability graph such that no alternating orientation is acyclic.

    Download PDF (802K)
  • Kazuyuki MIURA
    Article type: PAPER
    Subject area: Graphs and Networks, Algorithms and Data Structures
    2022 Volume E105.A Issue 9 Pages 1228-1234
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: February 16, 2022
    JOURNAL RESTRICTED ACCESS

    A grid drawing of a plane graph G is a drawing of G on the plane so that all vertices of G are put on plane grid points and all edges are drawn as straight line segments between their endpoints without any edge-intersection. In this paper we give a linear-time algorithm to find a grid drawing of any given 5-connected plane graph G with five or more vertices on the outer face. The size of the drawing satisfies W + Hn - 2, where n is the number of vertices in G, W is the width and H is the height of the grid drawing.

    Download PDF (1001K)
  • Masatoshi OSUMI
    Article type: PAPER
    Subject area: Graphs and Networks
    2022 Volume E105.A Issue 9 Pages 1235-1240
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 24, 2022
    JOURNAL FREE ACCESS

    We initiate the study of Ramsey numbers of trails. Let k≥2 be a positive integer. The Ramsey number of trails with k vertices is defined as the the smallest number n such that for every graph H with n vertices, H or the complete H contains a trail with k vertices. We prove that the Ramsey number of trails with k vertices is at most k and at least 2√k+Θ(1). This improves the trivial upper bound of ⌊3k/2⌋-1.

    Download PDF (562K)
  • Kazuho KANAHARA, Kengo KATAYAMA, Etsuji TOMITA
    Article type: PAPER
    Subject area: Numerical Analysis and Optimization, Algorithms and Data Structures, Graphs and Networks
    2022 Volume E105.A Issue 9 Pages 1241-1251
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 18, 2022
    JOURNAL RESTRICTED ACCESS

    The Graph Coloring Problem (GCP) is a fundamental combinatorial optimization problem that has many practical applications. Degree of SATURation (DSATUR) and Recursive Largest First (RLF) are well known as typical solution construction algorithms for GCP. It is necessary to update the vertex degree in the subgraph induced by uncolored vertices when selecting vertices to be colored in both DSATUR and RLF. There is an issue that the higher the edge density of a given graph, the longer the processing time. The purposes of this paper are to propose a degree updating method called Adaptive Degree Updating (ADU for short) that improves the issue, and to evaluate the effectiveness of ADU for DSATUR and RLF on DIMACS benchmark graphs as well as random graphs having a wide range of sizes and densities. Experimental results show that the construction algorithms with ADU are faster than the conventional algorithms for many graphs and that the ADU method yields significant speed-ups relative to the conventional algorithms, especially in the case of large graphs with higher edge density.

    Download PDF (2789K)
  • Ren ISHIBASHI, Kazuki YONEYAMA
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2022 Volume E105.A Issue 9 Pages 1252-1269
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 24, 2022
    JOURNAL RESTRICTED ACCESS

    Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).

    Download PDF (853K)
  • Hikaru TSUCHIDA, Takashi NISHIDE
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2022 Volume E105.A Issue 9 Pages 1270-1288
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 09, 2022
    JOURNAL RESTRICTED ACCESS

    Multiparty computation (MPC) is a cryptographic method that enables a set of parties to compute an arbitrary joint function of the private inputs of all parties and does not reveal any information other than the output. MPC based on a secret sharing scheme (SS-MPC) and garbled circuit (GC) is known as the most common MPC schemes. Another cryptographic method, homomorphic encryption (HE), computes an arbitrary function represented as a circuit by using ciphertexts without decrypting them. These technologies are in a trade-off relationship for the communication/round complexities, and the computation cost. The private decision tree evaluation (PDTE) is one of the key applications of these technologies. There exist several constant-round PDTE protocols based on GC, HE, or the hybrid schemes that are secure even if a malicious adversary who can deviate from protocol specifications corrupts some parties. There also exist other protocols based only on SS-MPC that are secure only if a semi-honest adversary who follows the protocol specification corrupts some parties. However, to the best of our knowledge, there are currently no constant-round PDTE protocols based only on SS-MPC that are secure against a malicious adversary. In this work, we propose a constant-round four-party PDTE protocol that achieves malicious security. Our protocol provides the PDTE securely and efficiently even when the communication environment has a large latency.

    Download PDF (1219K)
Regular Section
  • Gengxin NING, Yushen LIN, Shenjie JIANG, Jun ZHANG
    Article type: PAPER
    Subject area: Digital Signal Processing
    2022 Volume E105.A Issue 9 Pages 1289-1297
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 09, 2022
    JOURNAL RESTRICTED ACCESS

    The performance of conventional direction of arrival (DOA) methods is susceptible to the uncertainty of acoustic velocity in the underwater environment. To solve this problem, an underwater DOA estimation method with L-shaped array for wide-band signals under unknown acoustic velocity is proposed in this paper. The proposed method refers to the idea of incoherent signal subspace method and Root-MUSIC to obtain two sets of average roots corresponding to the subarray of the L-shaped array. And the geometric relationship between two vertical linear arrays is employed to derive the expression of DOA estimation with respect to the two average roots. The acoustic velocity variable in the DOA estimation expression can be eliminated in the proposed method. The simulation results demonstrate that the proposed method is more accurate and robust than other methods in an unknown acoustic velocity environment.

    Download PDF (1471K)
  • Tomu MAKITA, Atsuki NAGAO, Tatsuki OKADA, Kazuhisa SETO, Junichi TERUY ...
    Article type: PAPER
    Subject area: Algorithms and Data Structures
    2022 Volume E105.A Issue 9 Pages 1298-1308
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 08, 2022
    JOURNAL FREE ACCESS

    A branching program is a well-studied model of computation and a representation for Boolean functions. It is a directed acyclic graph with a unique root node, some accepting nodes, and some rejecting nodes. Except for the accepting and rejecting nodes, each node has a label with a variable and each outgoing edge of the node has a label with a 0/1 assignment of the variable. The satisfiability problem for branching programs is, given a branching program with n variables and m nodes, to determine if there exists some assignment that activates a consistent path from the root to an accepting node. The width of a branching program is the maximum number of nodes at any level. The satisfiability problem for width-2 branching programs is known to be NP-complete. In this paper, we present a satisfiability algorithm for width-2 branching programs with n variables and cn nodes, and show that its running time is poly(n)·2(1-µ(c))n, where µ(c)=1/2O(c log c). Our algorithm consists of two phases. First, we transform a given width-2 branching program to a set of some structured formulas that consist of AND and Exclusive-OR gates. Then, we check the satisfiability of these formulas by a greedy restriction method depending on the frequency of the occurrence of variables.

    Download PDF (1876K)
  • Nobuyuki SUGIO, Yasutaka IGARASHI, Sadayuki HONGO
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2022 Volume E105.A Issue 9 Pages 1309-1316
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: April 22, 2022
    JOURNAL RESTRICTED ACCESS

    Integral cryptanalysis is one of the most powerful attacks on symmetric key block ciphers. Attackers preliminarily search integral characteristics of a target cipher and use them to perform the key recovery attack. Todo proposed a novel technique named the bit-based division property to find integral characteristics. Xiang et al. extended the Mixed Integer Linear Programming (MILP) method to search integral characteristics of lightweight block ciphers based on the bit-based division property. In this paper, we apply these techniques to the symmetric key block cipher KASUMI which was developed by modifying MISTY1. As a result, we found new 4.5-round characteristics of KASUMI for the first time. We show that 7-round KASUMI is attackable with 263 data and 2120 encryptions.

    Download PDF (1498K)
  • Luozhong GONG, Shangzhao LI
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2022 Volume E105.A Issue 9 Pages 1317-1321
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 10, 2022
    JOURNAL FREE ACCESS

    The r-th nonlinearity of Boolean functions is an important cryptographic criterion associated with higher order linearity attacks on stream and block ciphers. In this paper, we tighten the lower bound of the second-order nonlinearity of a class of Boolean function over finite field F2n, fλ(x)=Trxd), where λ∈F*2r, d=22r+2r+1 and n=7r. This bound is much better than the lower bound of Iwata-Kurosawa.

    Download PDF (793K)
  • Rong CHENG, Yu ZHOU, Xinfeng DONG, Xiaoni DU
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2022 Volume E105.A Issue 9 Pages 1322-1329
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 10, 2022
    JOURNAL RESTRICTED ACCESS

    S-box is one of the core components of symmetric cryptographic algorithms, but differential distribution table (DDT) is an important tool to research some properties of S-boxes to resist differential attacks. In this paper, we give a relationship between the sum-of-squares of DDT and the sum-of-squares indicator of (n, m)-functions based on the autocorrelation coefficients. We also get some upper and lower bounds on the sum-of-squares of DDT of balanced (n, m)-functions, and prove that the sum-of-squares of DDT of (n, m)-functions is affine invariant under affine affine equivalent. Furthermore, we obtain a relationship between the sum-of-squares of DDT and the signal-to-noise ratio of (n, m)-functions. In addition, we calculate the distributions of the sum-of-squares of DDT for all 3-bit S-boxes, the 4-bit optimal S-boxes and all 302 balanced S-boxes (up to affine equivalence), data experiments verify our results.

    Download PDF (1351K)
  • Ningkang CHEN, Ping WEI, Lin GAO, Huaguo ZHANG, Hongshu LIAO
    Article type: PAPER
    Subject area: Communication Theory and Signals
    2022 Volume E105.A Issue 9 Pages 1330-1339
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 14, 2022
    JOURNAL RESTRICTED ACCESS

    This paper aims to design multiple-input multiple-output (MIMO) radar receiving weights and transmitting waveforms, in order to obtain better spatial filtering performance and enhance the robustness in the case of signal-dependent interference and jointly inaccurate estimated angles of target and interference. Generally, an alternate iterative optimization algorithm is proposed for the joint design problem. Specifically, the receiving weights are designed by the generalized eigenvalue decomposition of the matrix which contains the estimated information of the target and interference. As the cost function of the transmitting waveform design is fractional, the fractional optimization problem is first converted into a secondary optimization problem. Based on the proposed algorithm, a closed-form solution of the waveform is given using the alternating projection. At the analysis stage, in the presence of estimated errors under the environment of signal-dependent interference, a robust signal-to-interference and noise ratio (SINR) performance is obtained using a small amount of calculation with an iterative procedure. Numerical examples verify the effectiveness of the performances of the designed waveform in terms of the SINR, beampattern and pulse compression.

    Download PDF (1749K)
  • Yuanwei HOU, Yu GU, Weiping LI, Zhi LIU
    Article type: PAPER
    Subject area: Mobile Information Network and Personal Communications
    2022 Volume E105.A Issue 9 Pages 1340-1347
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: April 01, 2022
    JOURNAL RESTRICTED ACCESS

    The fast evolving credential attacks have been a great security challenge to current password-based information systems. Recently, biometrics factors like facial, iris, or fingerprint that are difficult to forge rise as key elements for designing passwordless authentication. However, capturing and analyzing such factors usually require special devices, hindering their feasibility and practicality. To this end, we present WiASK, a device-free WiFi sensing enabled Authentication System exploring Keystroke dynamics. More specifically, WiASK captures keystrokes of a user typing a pre-defined easy-to-remember string leveraging the existing WiFi infrastructure. But instead of focusing on the string itself which are vulnerable to password attacks, WiASK interprets the way it is typed, i.e., keystroke dynamics, into user identity, based on the biologically validated correlation between them. We prototype WiASK on the low-cost off-the-shelf WiFi devices and verify its performance in three real environments. Empirical results show that WiASK achieves on average 93.7% authentication accuracy, 2.5% false accept rate, and 5.1% false reject rate.

    Download PDF (6215K)
  • Takahiro OGURA, Haiyan WANG, Qiyao WANG, Atsuki KIUCHI, Chetan GUPTA, ...
    Article type: PAPER
    Subject area: Mathematical Systems Science
    2022 Volume E105.A Issue 9 Pages 1348-1357
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: February 25, 2022
    JOURNAL FREE ACCESS

    We propose a penalty-based and constraint Bayesian optimization methods with an agent-based supply-chain (SC) simulator as a new Monte Carlo optimization approach for multi-echelon inventory management to improve key performance indicators such as inventory cost and sales opportunity loss. First, we formulate the multi-echelon inventory problem and introduce an agent-based SC simulator architecture for the optimization. Second, we define the optimization framework for the formulation. Finally, we discuss the evaluation of the effectiveness of the proposed methods by benchmarking it against the most commonly used genetic algorithm (GA) in simulation-based inventory optimization. Our results indicate that the constraint Bayesian optimization can minimize SC inventory cost with lower sales opportunity loss rates and converge to the optimal solution 22 times faster than GA in the best case.

    Download PDF (3106K)
  • Daisuke SATOH, Takemi MOCHIDA
    Article type: PAPER
    Subject area: General Fundamentals and Boundaries
    2022 Volume E105.A Issue 9 Pages 1358-1371
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: May 10, 2022
    JOURNAL FREE ACCESS

    The road space rationing (RSR) method regulates a period in which a user group can make telephone calls in order to decrease the call attempt rate and induce calling parties to shorten their calls during disaster congestion. This paper investigates what settings of this indirect control induce more self-restraint and how the settings change calling parties' behavior using experimental psychology. Our experiments revealed that the length of the regulated period differently affected calling parties' behavior (call duration and call attempt rate) and indicated that the 60-min RSR method (i.e., 10 six-min periods) is the most effective setting against disaster congestion.

    Download PDF (2384K)
  • Binhao HE, Meiting XUE, Shubiao LIU, Feng YU, Weijie CHEN
    Article type: LETTER
    Subject area: Digital Signal Processing
    2022 Volume E105.A Issue 9 Pages 1372-1376
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 02, 2022
    JOURNAL RESTRICTED ACCESS

    The top-K sorting is a variant of sorting used heavily in applications such as database management systems. Recently, the use of field programmable gate arrays (FPGAs) to accelerate sorting operation has attracted the interest of researchers. However, existing hardware top-K sorting algorithms are either resource-intensive or of low throughput. In this paper, we present a resource-efficient top-K sorting architecture that is composed of L cascading sorting units, and each sorting unit is composed of P sorting cells. K=PL largest elements are produced when a variable length input sequence is processed. This architecture can operate at a high frequency while consuming fewer resources. The experimental results show that our architecture achieved a maximum 1.2x throughput-to-resource improvement compared to previous studies.

    Download PDF (605K)
  • Kento SAKA, Toshimichi SAITO
    Article type: LETTER
    Subject area: Nonlinear Problems
    2022 Volume E105.A Issue 9 Pages 1377-1380
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: March 29, 2022
    JOURNAL RESTRICTED ACCESS

    This letter studies a biobjective optimization problem in binary associative memories characterized by ternary connection parameters. First, we introduce a condition of parameters that guarantees storage of any desired memories and suppression of oscillatory behavior. Second, we define a biobjective problem based on two objectives that evaluate uniform stability of desired memories and sparsity of connection parameters. Performing precise numerical analysis for typical examples, we have clarified existence of a trade-off between the two objectives.

    Download PDF (698K)
  • Wei HE, Yu ZHANG, Yin LI
    Article type: LETTER
    Subject area: Numerical Analysis and Optimization
    2022 Volume E105.A Issue 9 Pages 1381-1384
    Published: September 01, 2022
    Released on J-STAGE: September 01, 2022
    Advance online publication: April 26, 2022
    JOURNAL FREE ACCESS

    We introduce a new type of exponentiation algorithm in GF(2m) using Euclidean inversion. Our approach is based on the fact that Euclidean inversion cost much less logic gates than ordinary multiplication in GF(2m). By applying signed binary form of the exponent instead of classic binary form, the proposed algorithm can reduce the number of operations further compared with the classic algorithms.

    Download PDF (253K)
feedback
Top