IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
E105.A 巻, 9 号
選択された号の論文の24件中1~24を表示しています
Special Section on Discrete Mathematics and Its Applications
  • Suguru TAMAKI
    2022 年 E105.A 巻 9 号 p. 1180
    発行日: 2022/09/01
    公開日: 2022/09/01
    ジャーナル フリー
  • Tetsuya ARAKI, Hiroyuki MIYATA, Shin-ichi NAKANO
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures
    2022 年 E105.A 巻 9 号 p. 1181-1186
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/08
    ジャーナル 認証あり

    Given a set of n disjoint intervals on a line and an integer k, we want to find k points in the intervals so that the minimum pairwise distance of the k points is maximized. Intuitively, given a set of n disjoint time intervals on a timeline, each of which is a time span we are allowed to check something, and an integer k, which is the number of times we will check something, we plan k checking times so that the checks occur at equal time intervals as much as possible, that is, we want to maximize the minimum time interval between the k checking times. We call the problem the k-dispersion problem on intervals. If we need to choose exactly one point in each interval, so k=n, and the disjoint intervals are given in the sorted order on the line, then two O(n) time algorithms to solve the problem are known. In this paper we give the first O(n) time algorithm to solve the problem for any constant k. Our algorithm works even if the disjoint intervals are given in any (not sorted) order. If the disjoint intervals are given in the sorted order on the line, then, by slightly modifying the algorithm, one can solve the problem in O(log n) time. This is the first sublinear time algorithm to solve the problem. Also we show some results on the k-dispersion problem on disks, including an FPTAS.

  • Chuzo IWAMOTO, Tatsuya IDE
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures
    2022 年 E105.A 巻 9 号 p. 1187-1194
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/01
    ジャーナル 認証あり

    Moon-or-Sun, Nagareru, and Nurimeizu are Nikoli's pencil puzzles. We study the computational complexity of Moon-or-Sun, Nagareru, and Nurimeizu puzzles. It is shown that deciding whether a given instance of each puzzle has a solution is NP-complete.

  • Hiroshi FUJIWARA, Kanaho HANJI, Hiroaki YAMAMOTO
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures
    2022 年 E105.A 巻 9 号 p. 1195-1202
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/08
    ジャーナル フリー

    In the online removable knapsack problem, a sequence of items, each labeled with its value and its size, is given one by one. At each arrival of an item, a player has to decide whether to put it into a knapsack or to discard it. The player is also allowed to discard some of the items that are already in the knapsack. The objective is to maximize the total value of the knapsack. Iwama and Taketomi gave an optimal algorithm for the case where the value of each item is equal to its size. In this paper we consider a case with an additional constraint that the capacity of the knapsack is a positive integer N and that the sizes of items are all integral. For each positive integer N, we design an algorithm and prove its optimality. It is revealed that the competitive ratio is not monotonic with respect to N.

  • Takanori MAEHARA, Kazutoshi ANDO
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures, Graphs and Networks
    2022 年 E105.A 巻 9 号 p. 1203-1210
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/04/19
    ジャーナル 認証あり

    In this paper, we address the problem of finding a representation of a subtree distance, which is an extension of a tree metric. We show that a minimal representation is uniquely determined by a given subtree distance, and give an O(n2) time algorithm that finds such a representation, where n is the size of the ground set. Since a lower bound of the problem is Ω(n2), our algorithm achieves the optimal time complexity.

  • Hiroshi ETO, Takehiro ITO, Zhilong LIU, Eiji MIYANO
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures, Graphs and Networks
    2022 年 E105.A 巻 9 号 p. 1211-1222
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/09
    ジャーナル 認証あり

    This paper studies generalized variants of the MAXIMUM INDEPENDENT SET problem, called the Maximum Distance-d Independent Set problem (MaxDdIS for short). For an integer d≥2, a distance-d independent set of an unweighted graph G=(V, E) is a subset SV of vertices such that for any pair of vertices u, vS, the number of edges in any path between u and v is at least d in G. Given an unweighted graph G, the goal of MaxDdIS is to find a maximum-cardinality distance-d independent set of G. In this paper, we analyze the (in)approximability of the problem on r-regular graphs (r≥3) and planar graphs, as follows: (1) For every fixed integers d≥3 and r≥3, MaxDdIS on r-regular graphs is APX-hard. (2) We design polynomial-time O(rd-1)-approximation and O(rd-2/d)-approximation algorithms for MaxDdIS on r-regular graphs. (3) We sharpen the above O(rd-2/d)-approximation algorithms when restricted to d=r=3, and give a polynomial-time 2-approximation algorithm for MaxD3IS on cubic graphs. (4) Finally, we show that MaxDdIS admits a polynomial-time approximation scheme (PTAS) for planar graphs.

  • Asahi TAKAOKA
    原稿種別: PAPER
    専門分野: Graphs and Networks, Algorithms and Data Structures
    2022 年 E105.A 巻 9 号 p. 1223-1227
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/07
    ジャーナル 認証あり

    We studied whether a statement similar to the Ghouila-Houri's theorem might hold for alternating orientations of cocomparability graphs. In this paper, we give the negative answer. We prove that it is NP-complete to decide whether a cocomparability graph has an orientation that is alternating and acyclic. Hence, cocomparability graphs with an acyclic alternating orientation form a proper subclass of alternately orientable cocomparability graphs. We also provide a separating example, that is, an alternately orientable cocomparability graph such that no alternating orientation is acyclic.

  • Kazuyuki MIURA
    原稿種別: PAPER
    専門分野: Graphs and Networks, Algorithms and Data Structures
    2022 年 E105.A 巻 9 号 p. 1228-1234
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/02/16
    ジャーナル 認証あり

    A grid drawing of a plane graph G is a drawing of G on the plane so that all vertices of G are put on plane grid points and all edges are drawn as straight line segments between their endpoints without any edge-intersection. In this paper we give a linear-time algorithm to find a grid drawing of any given 5-connected plane graph G with five or more vertices on the outer face. The size of the drawing satisfies W + Hn - 2, where n is the number of vertices in G, W is the width and H is the height of the grid drawing.

  • Masatoshi OSUMI
    原稿種別: PAPER
    専門分野: Graphs and Networks
    2022 年 E105.A 巻 9 号 p. 1235-1240
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/24
    ジャーナル フリー

    We initiate the study of Ramsey numbers of trails. Let k≥2 be a positive integer. The Ramsey number of trails with k vertices is defined as the the smallest number n such that for every graph H with n vertices, H or the complete H contains a trail with k vertices. We prove that the Ramsey number of trails with k vertices is at most k and at least 2√k+Θ(1). This improves the trivial upper bound of ⌊3k/2⌋-1.

  • Kazuho KANAHARA, Kengo KATAYAMA, Etsuji TOMITA
    原稿種別: PAPER
    専門分野: Numerical Analysis and Optimization, Algorithms and Data Structures, Graphs and Networks
    2022 年 E105.A 巻 9 号 p. 1241-1251
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/18
    ジャーナル 認証あり

    The Graph Coloring Problem (GCP) is a fundamental combinatorial optimization problem that has many practical applications. Degree of SATURation (DSATUR) and Recursive Largest First (RLF) are well known as typical solution construction algorithms for GCP. It is necessary to update the vertex degree in the subgraph induced by uncolored vertices when selecting vertices to be colored in both DSATUR and RLF. There is an issue that the higher the edge density of a given graph, the longer the processing time. The purposes of this paper are to propose a degree updating method called Adaptive Degree Updating (ADU for short) that improves the issue, and to evaluate the effectiveness of ADU for DSATUR and RLF on DIMACS benchmark graphs as well as random graphs having a wide range of sizes and densities. Experimental results show that the construction algorithms with ADU are faster than the conventional algorithms for many graphs and that the ADU method yields significant speed-ups relative to the conventional algorithms, especially in the case of large graphs with higher edge density.

  • Ren ISHIBASHI, Kazuki YONEYAMA
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2022 年 E105.A 巻 9 号 p. 1252-1269
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/24
    ジャーナル 認証あり

    Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).

  • Hikaru TSUCHIDA, Takashi NISHIDE
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2022 年 E105.A 巻 9 号 p. 1270-1288
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/09
    ジャーナル 認証あり

    Multiparty computation (MPC) is a cryptographic method that enables a set of parties to compute an arbitrary joint function of the private inputs of all parties and does not reveal any information other than the output. MPC based on a secret sharing scheme (SS-MPC) and garbled circuit (GC) is known as the most common MPC schemes. Another cryptographic method, homomorphic encryption (HE), computes an arbitrary function represented as a circuit by using ciphertexts without decrypting them. These technologies are in a trade-off relationship for the communication/round complexities, and the computation cost. The private decision tree evaluation (PDTE) is one of the key applications of these technologies. There exist several constant-round PDTE protocols based on GC, HE, or the hybrid schemes that are secure even if a malicious adversary who can deviate from protocol specifications corrupts some parties. There also exist other protocols based only on SS-MPC that are secure only if a semi-honest adversary who follows the protocol specification corrupts some parties. However, to the best of our knowledge, there are currently no constant-round PDTE protocols based only on SS-MPC that are secure against a malicious adversary. In this work, we propose a constant-round four-party PDTE protocol that achieves malicious security. Our protocol provides the PDTE securely and efficiently even when the communication environment has a large latency.

Regular Section
  • Gengxin NING, Yushen LIN, Shenjie JIANG, Jun ZHANG
    原稿種別: PAPER
    専門分野: Digital Signal Processing
    2022 年 E105.A 巻 9 号 p. 1289-1297
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/09
    ジャーナル 認証あり

    The performance of conventional direction of arrival (DOA) methods is susceptible to the uncertainty of acoustic velocity in the underwater environment. To solve this problem, an underwater DOA estimation method with L-shaped array for wide-band signals under unknown acoustic velocity is proposed in this paper. The proposed method refers to the idea of incoherent signal subspace method and Root-MUSIC to obtain two sets of average roots corresponding to the subarray of the L-shaped array. And the geometric relationship between two vertical linear arrays is employed to derive the expression of DOA estimation with respect to the two average roots. The acoustic velocity variable in the DOA estimation expression can be eliminated in the proposed method. The simulation results demonstrate that the proposed method is more accurate and robust than other methods in an unknown acoustic velocity environment.

  • Tomu MAKITA, Atsuki NAGAO, Tatsuki OKADA, Kazuhisa SETO, Junichi TERUY ...
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures
    2022 年 E105.A 巻 9 号 p. 1298-1308
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/08
    ジャーナル フリー

    A branching program is a well-studied model of computation and a representation for Boolean functions. It is a directed acyclic graph with a unique root node, some accepting nodes, and some rejecting nodes. Except for the accepting and rejecting nodes, each node has a label with a variable and each outgoing edge of the node has a label with a 0/1 assignment of the variable. The satisfiability problem for branching programs is, given a branching program with n variables and m nodes, to determine if there exists some assignment that activates a consistent path from the root to an accepting node. The width of a branching program is the maximum number of nodes at any level. The satisfiability problem for width-2 branching programs is known to be NP-complete. In this paper, we present a satisfiability algorithm for width-2 branching programs with n variables and cn nodes, and show that its running time is poly(n)·2(1-µ(c))n, where µ(c)=1/2O(c log c). Our algorithm consists of two phases. First, we transform a given width-2 branching program to a set of some structured formulas that consist of AND and Exclusive-OR gates. Then, we check the satisfiability of these formulas by a greedy restriction method depending on the frequency of the occurrence of variables.

  • Nobuyuki SUGIO, Yasutaka IGARASHI, Sadayuki HONGO
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2022 年 E105.A 巻 9 号 p. 1309-1316
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/04/22
    ジャーナル 認証あり

    Integral cryptanalysis is one of the most powerful attacks on symmetric key block ciphers. Attackers preliminarily search integral characteristics of a target cipher and use them to perform the key recovery attack. Todo proposed a novel technique named the bit-based division property to find integral characteristics. Xiang et al. extended the Mixed Integer Linear Programming (MILP) method to search integral characteristics of lightweight block ciphers based on the bit-based division property. In this paper, we apply these techniques to the symmetric key block cipher KASUMI which was developed by modifying MISTY1. As a result, we found new 4.5-round characteristics of KASUMI for the first time. We show that 7-round KASUMI is attackable with 263 data and 2120 encryptions.

  • Luozhong GONG, Shangzhao LI
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2022 年 E105.A 巻 9 号 p. 1317-1321
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/10
    ジャーナル フリー

    The r-th nonlinearity of Boolean functions is an important cryptographic criterion associated with higher order linearity attacks on stream and block ciphers. In this paper, we tighten the lower bound of the second-order nonlinearity of a class of Boolean function over finite field F2n, fλ(x)=Trxd), where λ∈F*2r, d=22r+2r+1 and n=7r. This bound is much better than the lower bound of Iwata-Kurosawa.

  • Rong CHENG, Yu ZHOU, Xinfeng DONG, Xiaoni DU
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2022 年 E105.A 巻 9 号 p. 1322-1329
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/10
    ジャーナル 認証あり

    S-box is one of the core components of symmetric cryptographic algorithms, but differential distribution table (DDT) is an important tool to research some properties of S-boxes to resist differential attacks. In this paper, we give a relationship between the sum-of-squares of DDT and the sum-of-squares indicator of (n, m)-functions based on the autocorrelation coefficients. We also get some upper and lower bounds on the sum-of-squares of DDT of balanced (n, m)-functions, and prove that the sum-of-squares of DDT of (n, m)-functions is affine invariant under affine affine equivalent. Furthermore, we obtain a relationship between the sum-of-squares of DDT and the signal-to-noise ratio of (n, m)-functions. In addition, we calculate the distributions of the sum-of-squares of DDT for all 3-bit S-boxes, the 4-bit optimal S-boxes and all 302 balanced S-boxes (up to affine equivalence), data experiments verify our results.

  • Ningkang CHEN, Ping WEI, Lin GAO, Huaguo ZHANG, Hongshu LIAO
    原稿種別: PAPER
    専門分野: Communication Theory and Signals
    2022 年 E105.A 巻 9 号 p. 1330-1339
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/14
    ジャーナル 認証あり

    This paper aims to design multiple-input multiple-output (MIMO) radar receiving weights and transmitting waveforms, in order to obtain better spatial filtering performance and enhance the robustness in the case of signal-dependent interference and jointly inaccurate estimated angles of target and interference. Generally, an alternate iterative optimization algorithm is proposed for the joint design problem. Specifically, the receiving weights are designed by the generalized eigenvalue decomposition of the matrix which contains the estimated information of the target and interference. As the cost function of the transmitting waveform design is fractional, the fractional optimization problem is first converted into a secondary optimization problem. Based on the proposed algorithm, a closed-form solution of the waveform is given using the alternating projection. At the analysis stage, in the presence of estimated errors under the environment of signal-dependent interference, a robust signal-to-interference and noise ratio (SINR) performance is obtained using a small amount of calculation with an iterative procedure. Numerical examples verify the effectiveness of the performances of the designed waveform in terms of the SINR, beampattern and pulse compression.

  • Yuanwei HOU, Yu GU, Weiping LI, Zhi LIU
    原稿種別: PAPER
    専門分野: Mobile Information Network and Personal Communications
    2022 年 E105.A 巻 9 号 p. 1340-1347
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/04/01
    ジャーナル 認証あり

    The fast evolving credential attacks have been a great security challenge to current password-based information systems. Recently, biometrics factors like facial, iris, or fingerprint that are difficult to forge rise as key elements for designing passwordless authentication. However, capturing and analyzing such factors usually require special devices, hindering their feasibility and practicality. To this end, we present WiASK, a device-free WiFi sensing enabled Authentication System exploring Keystroke dynamics. More specifically, WiASK captures keystrokes of a user typing a pre-defined easy-to-remember string leveraging the existing WiFi infrastructure. But instead of focusing on the string itself which are vulnerable to password attacks, WiASK interprets the way it is typed, i.e., keystroke dynamics, into user identity, based on the biologically validated correlation between them. We prototype WiASK on the low-cost off-the-shelf WiFi devices and verify its performance in three real environments. Empirical results show that WiASK achieves on average 93.7% authentication accuracy, 2.5% false accept rate, and 5.1% false reject rate.

  • Takahiro OGURA, Haiyan WANG, Qiyao WANG, Atsuki KIUCHI, Chetan GUPTA, ...
    原稿種別: PAPER
    専門分野: Mathematical Systems Science
    2022 年 E105.A 巻 9 号 p. 1348-1357
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/02/25
    ジャーナル フリー

    We propose a penalty-based and constraint Bayesian optimization methods with an agent-based supply-chain (SC) simulator as a new Monte Carlo optimization approach for multi-echelon inventory management to improve key performance indicators such as inventory cost and sales opportunity loss. First, we formulate the multi-echelon inventory problem and introduce an agent-based SC simulator architecture for the optimization. Second, we define the optimization framework for the formulation. Finally, we discuss the evaluation of the effectiveness of the proposed methods by benchmarking it against the most commonly used genetic algorithm (GA) in simulation-based inventory optimization. Our results indicate that the constraint Bayesian optimization can minimize SC inventory cost with lower sales opportunity loss rates and converge to the optimal solution 22 times faster than GA in the best case.

  • Daisuke SATOH, Takemi MOCHIDA
    原稿種別: PAPER
    専門分野: General Fundamentals and Boundaries
    2022 年 E105.A 巻 9 号 p. 1358-1371
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/05/10
    ジャーナル フリー

    The road space rationing (RSR) method regulates a period in which a user group can make telephone calls in order to decrease the call attempt rate and induce calling parties to shorten their calls during disaster congestion. This paper investigates what settings of this indirect control induce more self-restraint and how the settings change calling parties' behavior using experimental psychology. Our experiments revealed that the length of the regulated period differently affected calling parties' behavior (call duration and call attempt rate) and indicated that the 60-min RSR method (i.e., 10 six-min periods) is the most effective setting against disaster congestion.

  • Binhao HE, Meiting XUE, Shubiao LIU, Feng YU, Weijie CHEN
    原稿種別: LETTER
    専門分野: Digital Signal Processing
    2022 年 E105.A 巻 9 号 p. 1372-1376
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/02
    ジャーナル 認証あり

    The top-K sorting is a variant of sorting used heavily in applications such as database management systems. Recently, the use of field programmable gate arrays (FPGAs) to accelerate sorting operation has attracted the interest of researchers. However, existing hardware top-K sorting algorithms are either resource-intensive or of low throughput. In this paper, we present a resource-efficient top-K sorting architecture that is composed of L cascading sorting units, and each sorting unit is composed of P sorting cells. K=PL largest elements are produced when a variable length input sequence is processed. This architecture can operate at a high frequency while consuming fewer resources. The experimental results show that our architecture achieved a maximum 1.2x throughput-to-resource improvement compared to previous studies.

  • Kento SAKA, Toshimichi SAITO
    原稿種別: LETTER
    専門分野: Nonlinear Problems
    2022 年 E105.A 巻 9 号 p. 1377-1380
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/03/29
    ジャーナル 認証あり

    This letter studies a biobjective optimization problem in binary associative memories characterized by ternary connection parameters. First, we introduce a condition of parameters that guarantees storage of any desired memories and suppression of oscillatory behavior. Second, we define a biobjective problem based on two objectives that evaluate uniform stability of desired memories and sparsity of connection parameters. Performing precise numerical analysis for typical examples, we have clarified existence of a trade-off between the two objectives.

  • Wei HE, Yu ZHANG, Yin LI
    原稿種別: LETTER
    専門分野: Numerical Analysis and Optimization
    2022 年 E105.A 巻 9 号 p. 1381-1384
    発行日: 2022/09/01
    公開日: 2022/09/01
    [早期公開] 公開日: 2022/04/26
    ジャーナル フリー

    We introduce a new type of exponentiation algorithm in GF(2m) using Euclidean inversion. Our approach is based on the fact that Euclidean inversion cost much less logic gates than ordinary multiplication in GF(2m). By applying signed binary form of the exponent instead of classic binary form, the proposed algorithm can reduce the number of operations further compared with the classic algorithms.

feedback
Top