IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
E106.A 巻, 12 号
選択された号の論文の20件中1~20を表示しています
Special Section on Signal Design and Its Applications in Communications
  • Pingzhi FAN, Tetsuya KOJIMA
    2023 年 E106.A 巻 12 号 p. 1450-1451
    発行日: 2023/12/01
    公開日: 2023/12/01
    ジャーナル フリー
  • Arne WINTERHOF
    原稿種別: INVITED PAPER
    専門分野: Cryptography and Information Security
    2023 年 E106.A 巻 12 号 p. 1452-1460
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/05/31
    ジャーナル フリー

    In this survey we summarize properties of pseudorandomness and non-randomness of some number-theoretic sequences and present results on their behaviour under the following measures of pseudorandomness: balance, linear complexity, correlation measure of order k, expansion complexity and 2-adic complexity. The number-theoretic sequences are the Legendre sequence and the two-prime generator, the Thue-Morse sequence and its sub-sequence along squares, and the prime omega sequences for integers and polynomials.

  • Serdar BOZTAŞ, Ferruh ÖZBUDAK, Eda TEKİN
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2023 年 E106.A 巻 12 号 p. 1461-1469
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/10
    ジャーナル フリー

    In this paper we obtain a new method to compute the correlation values of two arbitrary sequences defined by a mapping from 𝔽4n to 𝔽4. We apply this method to demonstrate that the usual nonbinary maximal length sequences have almost ideal correlation under the canonical complex correlation definition and investigate some decimations giving good cross correlation. The techniques we develop are of independent interest for future investigation of sequence design and related problems, including Boolean functions.

  • Hao WU, Xiaoni DU, Xingbin QIAO
    原稿種別: PAPER
    専門分野: Coding Theory
    2023 年 E106.A 巻 12 号 p. 1470-1474
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/16
    ジャーナル フリー

    Linear codes have wide applications in many fields such as data storage, communication, cryptography, combinatorics. As a subclass of linear codes, minimal linear codes can be used to construct secret sharing schemes with good access structures. In this paper, we first construct some new classes of linear codes by selecting definition set properly. Then, the lengths, dimensions and the weight distribution of the codes are determined by investigating whether the intersections of the supports of vectors and the definition sets are empty. Results show that both wide and narrow minimal linear codes are contained in the new codes. Finally, we extend some existing results to general cases.

  • Shinya MATSUFUJI, Sho KURODA, Yuta IDA, Takahiro MATSUMOTO, Naoki SUEH ...
    原稿種別: PAPER
    専門分野: Information Theory
    2023 年 E106.A 巻 12 号 p. 1475-1483
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/09/05
    ジャーナル フリー

    A set consisting of K subsets of Msequences of length L is called a complementary sequence set expressed by A(L, K, M), if the sum of the out-of-phase aperiodic autocorrelation functions of the sequences within a subset and the sum of the cross-correlation functions between the corresponding sequences in any two subsets are zero at any phase shift. Suehiro et al. first proposed complementary set A(Nn, N, N) where N and n are positive integers greater than or equal to 2. Recently, several complementary sets related to Suehiro's construction, such as N being a power of a prime number, have been proposed. However, there is no discussion about their inclusion relation and properties of sequences. This paper rigorously formulates and investigates the (generalized) logic functions of the complementary sets by Suehiro et al. in order to understand its construction method and the properties of sequences. As a result, it is shown that there exists a case where the logic function is bent when n is even. This means that each series can be guaranteed to have pseudo-random properties to some extent. In other words, it means that the complementary set can be successfully applied to communication on fluctuating channels. The logic functions also allow simplification of sequence generators and their matched filters.

  • Ting WANG, Xianhua NIU, Yaoxuan WANG, Jianhong ZHOU, Ling XIONG
    原稿種別: PAPER
    専門分野: Information Theory
    2023 年 E106.A 巻 12 号 p. 1484-1492
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/16
    ジャーナル フリー

    The frequency hopping sequence plays a crucial role in determining the system's anti-jamming performance, in frequency hopping communication systems. If the adjacent frequency points of FHS can ensure wide-gap, it will better improve the anti-interference capability of the FH communication system. Moreover, if the period of the sequence is expanded, and each frequency point does not repeat in the same sequence, the system's ability to resist electromagnetic interference will be enhanced. And a one-coincidence frequency-hopping sequence set consists of FHSs with maximum Hamming autocorrelation 0 and cross-correlation 1. In this paper, we present two constructions of wide-gap frequency-hopping sequence sets. One construction is a new class of wide-gap one-coincidence FHS set, and the other is a WGFHS set with long period. These two WGFHS sets are optimal with respect to WG-Peng-Fan bound. And each sequence of these WGFHS sets is optimal with respect to WG-Lempel-Greenberger bound.

  • Dody ICHWANA PUTRA, Muhammad HARRY BINTANG PRATAMA, Ryotaro ISSHIKI, Y ...
    原稿種別: PAPER
    専門分野: Digital Signal Processing
    2023 年 E106.A 巻 12 号 p. 1493-1503
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/22
    ジャーナル フリー

    This paper presents a unified software and hardware wireless AI platform (USHWAP) for developing and evaluating machine learning in wireless systems. The platform integrates multi-software development such as MATLAB and Python with hardware platforms like FPGA and SDR, allowing for flexible and scalable device and edge computing application development. The USHWAP is implemented and validated using FPGAs and SDRs. Wireless signal classification, wireless LAN sensing, and rate adaptation are used as examples to showcase the platform's capabilities. The platform enables versatile development, including software simulation and real-time hardware implementation, offering flexibility and scalability for multiple applications. It is intended to be used by wireless-AI researchers to develop and evaluate intelligent algorithms in a laboratory environment.

  • Ali ARDALANI, Alexander POTT
    原稿種別: PAPER
    専門分野: Digital Signal Processing
    2023 年 E106.A 巻 12 号 p. 1504-1510
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/24
    ジャーナル フリー

    A Costas array of size n is an n × n binary matrix such that no two of the $\binom{n}{2}$ line segments connecting 1s have the same length and slope. Costas arrays are found by finite-field-based construction methods and their manipulations (systematically constructed) and exhaustive search methods. The arrays found exhaustively, which are of completely unknown origin, are called sporadic. Most studies in Costas arrays have tended to focus on systematically constructed Costas arrays rather than sporadic ones, which reveals the hardness of examining a link between systematically constructed Costas arrays and sporadic ones. This paper introduces a new transformation that preserves the Costas property for some Costas arrays, but not all. We observed that this transformation could transform some systematically constructed Costas arrays to sporadic ones and vice versa. Moreover, we introduce a family of arrays with the property that the auto-correlation of each array and the cross-correlation between any two arrays in this family is bounded above by two.

  • Yuta KODERA
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2023 年 E106.A 巻 12 号 p. 1511-1515
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/08
    ジャーナル フリー

    This paper focuses on a pseudorandom number generator called an NTU sequence for use in cryptography. The generator is defined with an m-sequence and Legendre symbol over an odd characteristic field. Since the previous researches have shown that the generator has maximum complexity; however, its bit distribution property is not balanced. To address this drawback, the author introduces dynamic mapping for the generation process and evaluates the period and some distribution properties in this paper.

  • Bing LIU, Rong LUO, Yong WANG
    原稿種別: LETTER
    専門分野: Coding Theory
    2023 年 E106.A 巻 12 号 p. 1516-1520
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/08
    ジャーナル フリー

    Even correlation and odd correlation of sequences are two kinds of measures for their similarities. Both kinds of correlation have important applications in communication and radar. Compared with vast knowledge on sequences with good even correlation, relatively little is known on sequences with preferable odd correlation. In this paper, a generic construction of sequences with low odd correlation is proposed via interleaving technique. Notably, it can generate new sets of binary sequences with optimal odd correlation asymptotically meeting the Sarwate bound.

  • Chenchen LIU, Wenyi ZHANG, Xiaoni DU
    原稿種別: LETTER
    専門分野: Communication Theory and Signals
    2023 年 E106.A 巻 12 号 p. 1521-1524
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/08/08
    ジャーナル フリー

    The calculation of cross-correlation between a sequence with good autocorrelation and its decimated sequence is an interesting problem in the field of sequence design. In this letter, we consider a class of ternary sequences with perfect autocorrelation, proposed by Shedd and Sarwate (IEEE Trans. Inf. Theory, 1979, DOI: 10.1109/TIT.1979.1055998), which is generated based on the cross-correlation between m-sequence and its d-decimation sequence. We calculate the cross-correlation distribution between a certain pair of such ternary perfect sequences and show that the cross-correlation takes three different values.

Regular Section
  • Yu ZHOU, Jianyong HU, Xudong MIAO, Xiaoni DU
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2023 年 E106.A 巻 12 号 p. 1525-1530
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/05/24
    ジャーナル フリー

    Low confusion coefficient values can make side-channel attacks harder for vector Boolean functions in Block cipher. In this paper, we give new results of confusion coefficient for fg, fg, fg and fg for different Boolean functions f and g, respectively. And we deduce a relationship on the sum-of-squares of the confusion coefficient between one n-variable function and two (n - 1)-variable decomposition functions. Finally, we find that the confusion coefficient of vector Boolean functions is affine invariant.

  • Yuto NAKAZAWA, Toru NAKANISHI
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2023 年 E106.A 巻 12 号 p. 1531-1543
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/06/29
    ジャーナル フリー

    A group signature scheme allows us to anonymously sign a message on behalf of a group. One of important issues in the group signatures is user revocation, and thus lots of revocable group signature (RGS) schemes have been proposed so far. One of the applications suitable to the group signature is privacy-enhancing crowdsensing, where the group signature allows mobile sensing users to be anonymously authenticated to hide the location. In the mobile environment, verifier-local revocation (VLR) type of RGS schemes are suitable, since revocation list (RL) is not needed in the user side. However, in the conventional VLR-RGS schemes, the revocation check in the verifier needs O(R) cryptographic operations for the number R of revoked users. On this background, VLR-RGS schemes with efficient revocation check have been recently proposed, where the revocation check is just (bit-string) matching. However, in the existing schemes, signatures are linkable in the same interval or in the same application-independent task with a public index. The linkability is useful in some scenarios, but users want the unlinkability for the stronger anonymity. In this paper, by introducing a property that at most K unlinkable signatures can be issued by a signer during each interval for a fixed integer K, we propose a VLR-RGS scheme with the revocation token matching. In our scheme, even the signatures during the same interval are unlinkable. Furthermore, since used indexes are hidden, the strong anonymity remains. The overheads are the computational costs of the revocation algorithm and the RL size. We show that the overheads are practical in use cases of crowdsensing.

  • Xi CHEN, Guodong JIANG, Kaikai CHI, Shubin ZHANG, Gang CHEN, Jiang LIU
    原稿種別: PAPER
    専門分野: Communication Theory and Signals
    2023 年 E106.A 巻 12 号 p. 1544-1554
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/06/19
    ジャーナル フリー

    Many nodes in Internet of Things (IoT) rely on batteries for power. Additionally, the demand for executing compute-intensive and latency-sensitive tasks is increasing for IoT nodes. In some practical scenarios, the computation tasks of WDs have the non-separable characteristic, that is, binary offloading strategies should be used. In this paper, we focus on the design of an efficient binary offloading algorithm that minimizes system energy consumption (EC) for TDMA-based wireless-powered multi-access edge computing networks, where WDs either compute tasks locally or offload them to hybrid access points (H-APs). We formulate the EC minimization problem which is a non-convex problem and decompose it into a master problem optimizing binary offloading decision and a subproblem optimizing WPT duration and task offloading transmission durations. For the master problem, a DRL based method is applied to obtain the near-optimal offloading decision. For the subproblem, we firstly consider the scenario where the nodes do not have completion time constraints and obtain the optimal analytical solution. Then we consider the scenario with the constraints. By jointly using the Golden Section Method and bisection method, the optimal solution can be obtained due to the convexity of the constraint function. Simulation results show that the proposed offloading algorithm based on DRL can achieve the near-minimal EC.

  • Weitao JIAN, Ming CAI, Wei HUANG, Shichang LI
    原稿種別: PAPER
    専門分野: Intelligent Transport System
    2023 年 E106.A 巻 12 号 p. 1555-1568
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/06/26
    ジャーナル フリー

    Mobility as a Service (MaaS) is a smart mobility model that integrates mobility services to deliver transportation needs through a single interface, offering users flexible and personalizd mobility. This paper presents a structural approach for developing a MaaS system architecture under Autonomous Transportation Systems (ATS), which is a new transition from the Intelligent Transportation Systems (ITS) with emerging technologies. Five primary components, including system elements, user needs, services, functions, and technologies, are defined to represent the system architecture. Based on the components, we introduce three architecture elements: functional architecture, logical architecture and physical architecture. Furthermore, this paper presents an evaluation process, links the architecture elements during the process and develops a three-layer structure for system performance evaluation. The proposed MaaS system architecture design can help the administration make services planning and implement planned services in an organized way, and support further technical deployment of mobility services.

  • Atikur RAHMAN, Nozomi KINJO, Isao NAKANISHI
    原稿種別: PAPER
    専門分野: Biometrics
    2023 年 E106.A 巻 12 号 p. 1569-1576
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/06/19
    ジャーナル フリー

    Person authentication using biometric information has recently become popular among researchers. User management based on biometrics is more reliable than that using conventional methods. To secure private information, it is necessary to build continuous authentication-based user management systems. Brain waves are suitable biometric modalities for continuous authentication. This study is based on biometric authentication using brain waves evoked by invisible visual stimuli. Invisible visual stimulation is considered over visual stimulation to overcome the obstacles faced by a user when using a system. Invisible stimuli are confirmed by changing the intensity of the image and presenting high-speed stimulation. To ensure invisibility, stimuli of different intensities were tested, and the stimuli with an intensity of 5% was confirmed to be invisible. To improve the verification performance, a continuous wavelet transform was introduced over the Fourier transform because it extracts both time and frequency information from the brain wave. The scalogram obtained by the wavelet transform was used as an individual feature and for synchronizing the template and test data. Furthermore, to improve the synchronization performance, the waveband was split based on the power distribution of the scalogram. A performance evaluation using 20 subjects showed an equal error rate of 3.8%.

  • Ho-Lim CHOI
    原稿種別: LETTER
    専門分野: Systems and Control
    2023 年 E106.A 巻 12 号 p. 1577-1579
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/06/12
    ジャーナル フリー

    In this letter, we study the adaptive regulation problem for a chain of integrators in which there are different individual delays in measured feedback states for a controller. These delays are considered to be unknown and time-varying, and they can be arbitrarily fast-varying. We analytically show that a feedback controller with a dynamic gain can adaptively regulate a chain of integrators in the presence of unknown individual state delays. A simulation result is given for illustration.

  • Shuichi FUKUNAGA
    原稿種別: LETTER
    専門分野: Systems and Control
    2023 年 E106.A 巻 12 号 p. 1580-1584
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/06/02
    ジャーナル フリー

    The robust recursive identification method of ARX models is proposed using the beta divergence. The proposed parameter update law suppresses the effect of outliers using a weight function that is automatically determined by minimizing the beta divergence. A numerical example illustrates the efficacy of the proposed method.

  • Masahiro KAMINAGA
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2023 年 E106.A 巻 12 号 p. 1585-1588
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/05/30
    ジャーナル フリー

    This paper shows that upper bounds on the coefficients of the shortest vector of a lattice can be represented using the smallest eigenvalue of the Gram matrix for the lattice, obtains its distribution for high-dimensional random Goldstein-Mayer lattice, and applies it to determine the percentage of zeros of coefficient vector.

  • Lin-Zhi SHEN, Yu-Jie WANG
    原稿種別: LETTER
    専門分野: Coding Theory
    2023 年 E106.A 巻 12 号 p. 1589-1592
    発行日: 2023/12/01
    公開日: 2023/12/01
    [早期公開] 公開日: 2023/05/30
    ジャーナル フリー

    For an [n, k, d] (r, δ)-locally repairable codes ((r, δ)-LRCs), its minimum distance d satisfies the Singleton-like bound. The construction of optimal (r, δ)-LRC, attaining this Singleton-like bound, is an important research problem in recent years for thier applications in distributed storage systems. In this letter, we use Reed-Solomon codes to construct two classes of optimal (r, δ)-LRCs. The optimal LRCs are given by the evaluations of multiple polynomials of degree at most r - 1 at some points in 𝔽q. The first class gives the [(r + δ - 1)t, rt - s, δ + s] optimal (r, δ)-LRC over 𝔽q provided that r + δ + s - 1≤q, s≤δ, s<r, and any positive t. The code length is unbounded. The second class gives the [r + r' + d + δ - 2, r + r', d] optimal (r, δ)-LRC over 𝔽q provided that r - r'd - δ and r + d - 1≤q + 1, which will produce optimal (r, δ)-LRCs with large minimum distance.

feedback
Top