Skip to main content

Showing 1–33 of 33 results for author: Yamamoto, H

  1. arXiv:2303.18222  [pdf, other

    cs.GT cs.DS

    Shipper collaboration matching: fast enumeration of triangular transports with high cooperation effects

    Authors: Akifumi Kira, Nobuo Terajima, Yasuhiko Watanabe, Hirotaka Yamamoto

    Abstract: The logistics industry in Japan is facing a severe shortage of labor. Therefore, there is an increasing need for joint transportation allowing large amounts of cargo to be transported using fewer trucks. In recent years, the use of artificial intelligence and other new technologies has gained wide attention for improving matching efficiency. However, it is difficult to develop a system that can in… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: 16 pages, 7 figures

  2. arXiv:2303.04467  [pdf

    q-bio.PE cs.CY nlin.AO physics.soc-ph

    The evolution of cooperation and diversity by integrated indirect reciprocity

    Authors: Tatsuya Sasaki, Satoshi Uchida, Isamu Okada, Hitoshi Yamamoto

    Abstract: Indirect reciprocity is one of the major mechanisms for the evolution of cooperation in human societies. There are two types of indirect reciprocity: upstream and downstream. Cooperation in downstream reciprocity follows the pattern, 'You helped someone, and I will help you'. The direction of cooperation is reversed in upstream reciprocity, which instead follows the pattern, 'You helped me, and I… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

    Comments: 14 pages, 4 figures, 2 tables

    Journal ref: Games 2024, 15(2),15

  3. arXiv:2211.16305  [pdf, other

    cs.SI cs.CY

    How Many Tweets DoWe Need?: Efficient Mining of Short-Term Polarized Topics on Twitter: A Case Study From Japan

    Authors: Tomoki Fukuma, Koki Noda, Hiroki Kumagai, Hiroki Yamamoto, Yoshiharu Ichikawa, Kyosuke Kambe, Yu Maubuchi, Fujio Toriumi

    Abstract: In recent years, social media has been criticized for yielding polarization. Identifying emerging disagreements and growing polarization is important for journalists to create alerts and provide more balanced coverage. While recent studies have shown the existence of polarization on social media, they primarily focused on limited topics such as politics with a large volume of data collected in the… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: 9 pages, 9 figures

  4. arXiv:2211.01091  [pdf, ps, other

    eess.AS cs.AI cs.SD

    I4U System Description for NIST SRE'20 CTS Challenge

    Authors: Kong Aik Lee, Tomi Kinnunen, Daniele Colibro, Claudio Vair, Andreas Nautsch, Hanwu Sun, Liang He, Tianyu Liang, Qiongqiong Wang, Mickael Rouvier, Pierre-Michel Bousquet, Rohan Kumar Das, Ignacio Viñals Bailo, Meng Liu, Héctor Deldago, Xuechen Liu, Md Sahidullah, Sandro Cumani, Boning Zhang, Koji Okabe, Hitoshi Yamamoto, Ruijie Tao, Haizhou Li, Alfonso Ortega Giménez, Longbiao Wang , et al. (1 additional authors not shown)

    Abstract: This manuscript describes the I4U submission to the 2020 NIST Speaker Recognition Evaluation (SRE'20) Conversational Telephone Speech (CTS) Challenge. The I4U's submission was resulted from active collaboration among researchers across eight research teams - I$^2$R (Singapore), UEF (Finland), VALPT (Italy, Spain), NEC (Japan), THUEE (China), LIA (France), NUS (Singapore), INRIA (France) and TJU (C… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: SRE 2021, NIST Speaker Recognition Evaluation Workshop, CTS Speaker Recognition Challenge, 14-12 December 2021

  5. arXiv:2108.12128  [pdf, ps, other

    cs.SD cs.AI eess.AS

    Task-aware Warping Factors in Mask-based Speech Enhancement

    Authors: Qiongqiong Wang, Kong Aik Lee, Takafumi Koshinaka, Koji Okabe, Hitoshi Yamamoto

    Abstract: This paper proposes the use of two task-aware warping factors in mask-based speech enhancement (SE). One controls the balance between speech-maintenance and noise-removal in training phases, while the other controls SE power applied to specific downstream tasks in testing phases. Our intention is to alleviate the problem that SE systems trained to improve speech quality often fail to improve other… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

    Comments: EUSIPCO 2021 (the 29th European Signal Processing Conference)

  6. arXiv:2103.03209  [pdf, ps, other

    cs.CR cs.CY

    Requirement Analyses and Evaluations of Blockchain Platforms per Possible Use Cases

    Authors: Kenji Saito, Akimitsu Shiseki, Mitsuyasu Takada, Hiroki Yamamoto, Masaaki Saitoh, Hiroaki Ohkawa, Hirofumi Andou, Naotake Miyamoto, Kazuaki Yamakawa, Kiyoshi Kurakawa, Tomohiro Yabushita, Yuji Yamada, Go Masuda, Kazuyuki Masuda

    Abstract: It is said that blockchain will contribute to the digital transformation of society in a wide range of ways, from the management of public and private documents to the traceability in various industries, as well as digital currencies. A number of so-called blockchain platforms have been developed, and experiments and applications have been carried out on them. But are these platforms really conduc… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 50 pages, 3 figures

  7. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  8. arXiv:1904.07386  [pdf, other

    eess.AS cs.CL cs.SD

    I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

    Authors: Kong Aik Lee, Ville Hautamaki, Tomi Kinnunen, Hitoshi Yamamoto, Koji Okabe, Ville Vestman, Jing Huang, Guohong Ding, Hanwu Sun, Anthony Larcher, Rohan Kumar Das, Haizhou Li, Mickael Rouvier, Pierre-Michel Bousquet, Wei Rao, Qing Wang, Chunlei Zhang, Fahimeh Bahmaninezhad, Hector Delgado, Jose Patino, Qiongqiong Wang, Ling Guo, Takafumi Koshinaka, Jiacen Zhang, Koichi Shinoda , et al. (21 additional authors not shown)

    Abstract: The I4U consortium was established to facilitate a joint entry to NIST speaker recognition evaluations (SRE). The latest edition of such joint submission was in SRE 2018, in which the I4U submission was among the best-performing systems. SRE'18 also marks the 10-year anniversary of I4U consortium into NIST SRE series of evaluation. The primary objective of the current paper is to summarize the res… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: 5 pages

  9. arXiv:1809.09311  [pdf, ps, other

    cs.SD eess.AS

    Attention Mechanism in Speaker Recognition: What Does It Learn in Deep Speaker Embedding?

    Authors: Qiongqiong Wang, Koji Okabe, Kong Aik Lee, Hitoshi Yamamoto, Takafumi Koshinaka

    Abstract: This paper presents an experimental study on deep speaker embedding with an attention mechanism that has been found to be a powerful representation learning technique in speaker recognition. In this framework, an attention model works as a frame selector that computes an attention weight for each frame-level feature vector, in accord with which an utterancelevel representation is produced at the p… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Comments: SLT 2018 (Workshop on Spoken Language Technology)

  10. arXiv:1807.10881  [pdf, other

    cs.IT

    On the Capacity of Symmetric $M$-user Gaussian Interference Channels with Feedback

    Authors: Lan V. Truong, Hirosuke Yamamoto

    Abstract: A general time-varying feedback coding scheme is proposed for $M$-user fully connected symmetric Gaussian interference channels. Based on the analysis of the general coding scheme, we prove a theorem which gives a criterion for designing good time-varying feedback codes for Gaussian interference channels. The proposed scheme improves the Suh-Tse and Kramer inner bounds of the channel capacity for… ▽ More

    Submitted 28 September, 2019; v1 submitted 27 July, 2018; originally announced July 2018.

    Comments: Accepted to IEEE Transactions on Information Theory in Sept. 2019

  11. arXiv:1709.04620  [pdf, ps, other

    q-fin.PM cond-mat.dis-nn cs.CE cs.LG math.OC

    Random matrix approach for primal-dual portfolio optimization problems

    Authors: Daichi Tada, Hisashi Yamamoto, Takashi Shinzato

    Abstract: In this paper, we revisit the portfolio optimization problems of the minimization/maximization of investment risk under constraints of budget and investment concentration (primal problem) and the maximization/minimization of investment concentration under constraints of budget and investment risk (dual problem) for the case that the variances of the return rates of the assets are identical. We ana… ▽ More

    Submitted 20 September, 2017; v1 submitted 14 September, 2017; originally announced September 2017.

    Comments: 24 pages, 4 figures

  12. arXiv:1707.08567  [pdf

    cs.IT

    Proceedings of Workshop AEW10: Concepts in Information Theory and Communications

    Authors: Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan , et al. (9 additional authors not shown)

    Abstract: The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017. It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989. The idea of the workshop is threefold: 1) to improve the communication between the scientist in the different p… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: 44 pages, editors for the proceedings: Yanling Chen and A. J. Han Vinck

    MSC Class: 68P30; 94A05

  13. arXiv:1706.06775  [pdf, ps, other

    cs.IT

    Variable-to-Fixed Length Homophonic Coding Suitable for Asymmetric Channel Coding

    Authors: Junya Honda, Hirosuke Yamamoto

    Abstract: In communication through asymmetric channels the capacity-achieving input distribution is not uniform in general. Homophonic coding is a framework to invertibly convert a (usually uniform) message into a sequence with some target distribution, and is a promising candidate to generate codewords with the nonuniform target distribution for asymmetric channels. In particular, a Variable-to-Fixed lengt… ▽ More

    Submitted 29 June, 2017; v1 submitted 21 June, 2017; originally announced June 2017.

    Comments: Full version of the paper to appear in 2017 IEEE International Symposium on Information Theory (ISIT2017)

  14. arXiv:1703.03943  [pdf, ps, other

    physics.soc-ph cs.MA cs.NE q-bio.PE

    A norm knockout method on indirect reciprocity to reveal indispensable norms

    Authors: Hitoshi Yamamoto, Isamu Okada, Satoshi Uchida, Tatsuya Sasaki

    Abstract: Although various norms for reciprocity-based cooperation have been suggested that are evolutionarily stable against invasion from free riders, the process of alternation of norms and the role of diversified norms remain unclear in the evolution of cooperation. We clarify the co-evolutionary dynamics of norms and cooperation in indirect reciprocity and also identify the indispensable norms for the… ▽ More

    Submitted 11 March, 2017; originally announced March 2017.

    Comments: 15 pages (incl. supplementary materials), 6 figures, 7 table

    Journal ref: Scientific Reports 7, 44146 (2017)

  15. arXiv:1702.07426  [pdf, other

    cs.NE q-bio.NC q-bio.QM

    Control of the Correlation of Spontaneous Neuron Activity in Biological and Noise-activated CMOS Artificial Neural Microcircuits

    Authors: Ramin M. Hasani, Giorgio Ferrari, Hideaki Yamamoto, Sho Kono, Koji Ishihara, Soya Fujimori, Takashi Tanii, Enrico Prati

    Abstract: There are several indications that brain is organized not on a basis of individual unreliable neurons, but on a micro-circuital scale providing Lego blocks employed to create complex architectures. At such an intermediate scale, the firing activity in the microcircuits is governed by collective effects emerging by the background noise soliciting spontaneous firing, the degree of mutual connections… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

  16. arXiv:1701.06153  [pdf

    physics.soc-ph cs.SI q-bio.PE

    The Evolution of Reputation-Based Cooperation in Regular Networks

    Authors: Tatsuya Sasaki, Hitoshi Yamamoto, Isamu Okada, Satoshi Uchida

    Abstract: Despite recent advances in reputation technologies, it is not clear how reputation systems can affect human cooperation in social networks. Although it is known that two of the major mechanisms in the evolution of cooperation are spatial selection and reputation-based reciprocity, theoretical study of the interplay between both mechanisms remains almost uncharted. Here, we present a new individual… ▽ More

    Submitted 22 January, 2017; originally announced January 2017.

    Comments: 15 pages, 6 figures, and 1 table

    Journal ref: Games 2017, 8(1), 8 (published 21 January 2017)

  17. arXiv:1607.07247  [pdf, ps, other

    cs.IT

    Worst-case Redundancy of Optimal Binary AIFV Codes and their Extended Codes

    Authors: Weihua Hu, Hirosuke Yamamoto, Junya Honda

    Abstract: Binary AIFV codes are lossless codes that generalize the class of instantaneous FV codes. The code uses two code trees and assigns source symbols to incomplete internal nodes as well as to leaves. AIFV codes are empirically shown to attain better compression ratio than Huffman codes. Nevertheless, an upper bound on the redundancy of optimal binary AIFV codes is only known to be 1, which is the sam… ▽ More

    Submitted 1 August, 2017; v1 submitted 25 July, 2016; originally announced July 2016.

    Comments: IEEE Transactions on Information Theory, vol.63, no.8, pp.5074-5086, Aug. 2017

  18. arXiv:1607.06914  [pdf, ps, other

    cs.IT

    Variable-to-Fixed Length Homophonic Coding with a Modified Shannon-Fano-Elias Code

    Authors: Junya Honda, Hirosuke Yamamoto

    Abstract: Homophonic coding is a framework to reversibly convert a message into a sequence with some target distribution. This is a promising tool to generate a codeword with a biased code-symbol distribution, which is required for capacity-achieving communication by asymmetric channels. It is known that asymptotically optimal homophonic coding can be realized by a Fixed-to-Variable (FV) length code using a… ▽ More

    Submitted 23 July, 2016; originally announced July 2016.

    Comments: 5 pages

  19. arXiv:1507.08733  [pdf, ps, other

    cs.IT

    Almost Instantaneous Fix-to-Variable Length Codes

    Authors: Hirosuke Yamamoto, Masato Tsuchihashi, Junya Honda

    Abstract: We propose almost instantaneous fixed-to-variable-length (AIFV) codes such that two (resp. $K-1$) code trees are used if code symbols are binary (resp. $K$-ary for $K \geq 3$), and source symbols are assigned to incomplete internal nodes in addition to leaves. Although the AIFV codes are not instantaneous codes, they are devised such that the decoding delay is at most two bits (resp. one code symb… ▽ More

    Submitted 30 July, 2015; originally announced July 2015.

    Comments: Submitted to the IEEE Transactions on Information Theory in October 2014, and revised in July 205

  20. arXiv:1501.04887  [pdf, ps, other

    cs.IT

    On Using Feedback in a Gaussian Channel

    Authors: Marat V. Burnashev, Hirosuke Yamamoto

    Abstract: For information transmission a discrete time channel with independent additive Gaussian noise is used. There is also another channel with independent additive Gaussian noise (the feedback channel), and the transmitter observes without delay all outputs of the forward channel via that channel. Transmission of nonexponential number of messages is considered (i.e. transmission rate equals zero) and t… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.

    Comments: arXiv admin note: text overlap with arXiv:1208.2786

    Journal ref: Problems of Information Transmission, vol. 50, no. 3, pp. 19--34, 2014

  21. On the Capacity of Symmetric Gaussian Interference Channels with Feedback

    Authors: Lan V. Truong, Hirosuke Yamamoto

    Abstract: In this paper, we propose a new coding scheme for symmetric Gaussian interference channels with feedback based on the ideas of time-varying coding schemes. The proposed scheme improves the Suh-Tse and Kramer inner bounds of the channel capacity for the cases of weak and not very strong interference. This improvement is more significant when the signal-to-noise ratio (SNR) is not very high. It is s… ▽ More

    Submitted 21 April, 2015; v1 submitted 14 January, 2015; originally announced January 2015.

    Comments: To appear in Proc. of IEEE International Symposium on Information Theory (ISIT), Hong Kong, June 14-19, 2015

  22. Private Information Retrieval for Coded Storage

    Authors: Terence H. Chan, Siu-Wai Ho, Hirosuke Yamamoto

    Abstract: Private information retrieval scheme for coded data storage is considered in this paper. We focus on the case where the size of each data record is large and hence only the download cost (but not the upload cost for transmitting retrieval queries) is of interest. We prove that the tradeoff between storage cost and retrieval/download cost depends on the number of data records in the system. We also… ▽ More

    Submitted 20 October, 2014; originally announced October 2014.

    Comments: submitted to IEEE Journal of Selected Topics in Signal Processing

  23. arXiv:1410.4612  [pdf, ps, other

    cs.IT

    Identification Codes to Identify Multiple Objects

    Authors: Hirosuke Yamamoto, Masashi Ueda

    Abstract: In the case of ordinary identification coding, a code is devised to identify a single object among $N$ objects. But, in this paper, we consider an identification coding problem to identify $K$ objects at once among $N$ objects in the both cases that $K$ objects are ranked or not ranked. By combining Kurosawa-Yoshida scheme with Moulin-Koetter scheme, an efficient identification coding scheme is pr… ▽ More

    Submitted 16 October, 2014; originally announced October 2014.

    Comments: 14 pages, submitted to IEEE Transactions on Information Theory

  24. arXiv:1404.2520  [pdf, ps, other

    cs.IT

    Posterior Matching for Gaussian Broadcast Channels with Feedback

    Authors: Lan V. Truong, Hirosuke Yamamoto

    Abstract: In this paper, the posterior matching scheme proposed by Shayevits and Feder is extended to the Gaussian broadcast channel with feedback, and the error probabilities and achievable rate region are derived for this coding strategy by using the iterated random function theory. A variant of the Ozarow-Leung code for the general two-user broadcast channel with feedback can be realized as a special cas… ▽ More

    Submitted 29 December, 2016; v1 submitted 5 April, 2014; originally announced April 2014.

    Comments: Submitted to the IEICE Transactions on Fundamentals (Revised December, 2016)

    Journal ref: IEICE Transactions on Fundamentals, Vol. E100-A, No. 5, pp. 1165 - 1178, May 2017

  25. arXiv:1306.3032  [pdf

    cs.CV

    A Face-like Structure Detection on Planet and Satellite Surfaces using Image Processing

    Authors: Kazutaka Kurihara, Masakazu Takasu, Kazuhiro Sasao, Hal Seki, Takayuki Narabu, Mitsuo Yamamoto, Satoshi Iida, Hiroyuki Yamamoto

    Abstract: This paper demonstrates that face-like structures are everywhere, and can be de-tected automatically even with computers. Huge amount of satellite images of the Earth, the Moon, the Mars are explored and many interesting face-like structure are detected. Throughout this fact, we believe that science and technologies can alert people not to easily become an occultist.

    Submitted 13 June, 2013; originally announced June 2013.

    Comments: 4 pages

    Journal ref: ACE 2013, LNCS 8253, Springer, pp. 564-567, 2013

  26. arXiv:1208.2786  [pdf, ps, other

    cs.IT

    On Reliability Function of Gaussian Channel with Noisy Feedback: Zero Transmission Rate

    Authors: M. V. Burnashev, H. Yamamoto

    Abstract: For information transmission a discrete time channel with independent additive Gaussian noise is used. There is also feedback channel with independent additive Gaussian noise, and the transmitter observes without delay all outputs of the forward channel via that feedback channel. Transmission of nonexponential number of messages is considered and the achievable decoding error exponent for such a c… ▽ More

    Submitted 14 August, 2012; originally announced August 2012.

    Comments: Published in Problems of Information Transmission, vol. 48, no. 3, pp. 3--23, 2012

  27. arXiv:1011.2180  [pdf, ps, other

    cs.IT

    On Reliability Function of BSC with Noisy Feedback

    Authors: M. V. Burnashev, H. Yamamoto

    Abstract: For information transmission a binary symmetric channel is used. There is also another noisy binary symmetric channel (feedback channel), and the transmitter observes without delay all the outputs of the forward channel via that feedback channel. The transmission of an exponential number of messages (i.e. the transmission rate is positive) is considered. The achievable decoding error exponent for… ▽ More

    Submitted 9 November, 2010; originally announced November 2010.

    Comments: 24 pages, 4 figures

    Journal ref: published in Problems of Inform. Transm. vol. 46, no. 2, pp. 3--23, 2010

  28. arXiv:1004.4530  [pdf, ps, other

    cs.IT cs.CR

    Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks

    Authors: Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto

    Abstract: In this paper, we discuss coding theorems on a $(2, 2)$--threshold scheme in the presence of an opponent who impersonates one of the two shareholders in an asymptotic setup. We consider a situation where $n$ secrets $S^n$ from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to $S^n$ with permitting negligible decoding error. We introduce correlation level of… ▽ More

    Submitted 18 February, 2012; v1 submitted 26 April, 2010; originally announced April 2010.

    Comments: 25 pages, 3 figures. Submitted to IEEE Trans. Inf. Theory

  29. arXiv:0808.2092  [pdf, ps, other

    cs.IT

    On zero-rate error exponent for BSC with noisy feedback

    Authors: Marat V. Burnashev, Hirosuke Yamamoto

    Abstract: For the information transmission a binary symmetric channel is used. There is also another noisy binary symmetric channel (feedback channel), and the transmitter observes without delay all the outputs of the forward channel via that feedback channel. The transmission of a nonexponential number of messages (i.e. the transmission rate equals zero) is considered. The achievable decoding error expon… ▽ More

    Submitted 15 August, 2008; originally announced August 2008.

    Comments: 23 Pages including 4 figures

    ACM Class: H.1.1

    Journal ref: Problems of Information Transmission, vol. 44, no. 3, pp. 33-49, 2008

  30. arXiv:cs/0509047  [pdf, ps, other

    cs.IT cs.CR

    Secure multiplex coding to attain the channel capacity in wiretap channels

    Authors: Daisuke Kobayashi, Hirosuke Yamamoto, Tomohiro Ogawa

    Abstract: It is known that a message can be transmitted safely against any wiretapper via a noisy channel without a secret key if the coding rate is less than the so-called secrecy capacity $C_S$, which is usually smaller than the channel capacity $C$. In order to remove the loss $C - C_S$, we propose a multiplex coding scheme with plural independent messages. In this paper, it is shown that the proposed… ▽ More

    Submitted 16 September, 2005; originally announced September 2005.

    Comments: 15 pages, submitted to the IEEE Transactions on Information Theory

    ACM Class: E.4; H.1.1

  31. arXiv:cs/0507001  [pdf, ps, other

    cs.IT cs.CR

    Asymptotically Optimal Tree-based Group Key Management Schemes

    Authors: Hideyuki Sakai, Hirosuke Yamamoto

    Abstract: In key management schemes that realize secure multicast communications encrypted by group keys on a public network, tree structures are often used to update the group keys efficiently. Selcuk and Sidhu have proposed an efficient scheme which updates dynamically the tree structures based on the withdrawal probabilities of members. In this paper, it is shown that Selcuk-Sidhu scheme is asymptotica… ▽ More

    Submitted 30 June, 2005; originally announced July 2005.

    Comments: 15 pages including 1 figure and 2 tables, submitted to the IEEE Transactions on Information Theory

    ACM Class: E.4; H.1.1

  32. arXiv:cs/0506065  [pdf, ps, other

    cs.CR cs.IT

    Strongly secure ramp secret sharing schemes for general access structures

    Authors: Mitsugu Iwamoto, Hirosuke Yamamoto

    Abstract: Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp… ▽ More

    Submitted 15 June, 2005; originally announced June 2005.

  33. arXiv:cs/0506064  [pdf, ps, other

    cs.CR cs.IT

    Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures

    Authors: Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa

    Abstract: It is known that for any general access structure, a secret sharing scheme (SSS) can be constructed from an (m,m)-threshold scheme by using the so-called cumulative map or from a (t,m)-threshold SSS by a modified cumulative map. However, such constructed SSSs are not efficient generally. In this paper, we propose a new method to construct a SSS from a $(t,m)$-threshold scheme for any given gener… ▽ More

    Submitted 15 June, 2005; originally announced June 2005.