Skip to main content

Showing 1–11 of 11 results for author: Iwamoto, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16355  [pdf, other

    cs.LG eess.SY

    Compact Model Parameter Extraction via Derivative-Free Optimization

    Authors: Rafael Perez Martinez, Masaya Iwamoto, Kelly Woo, Zhengliang Bian, Roberto Tinti, Stephen Boyd, Srabanti Chowdhury

    Abstract: In this paper, we address the problem of compact model parameter extraction to simultaneously extract tens of parameters via derivative-free optimization. Traditionally, parameter extraction is performed manually by dividing the complete set of parameters into smaller subsets, each targeting different operational regions of the device, a process that can take several days or even weeks. Our approa… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  2. arXiv:2402.16290  [pdf, ps, other

    cs.CR

    Card-Based Overwriting Protocol for Equality Function and Applications

    Authors: Suthee Ruangwises, Tomoki Ono, Yoshiki Abe, Kyosuke Hatsugai, Mitsugu Iwamoto

    Abstract: Research in the area of secure multi-party computation with an unconventional method of using a physical deck of playing cards began in 1989 when den Boar proposed a protocol to compute the logical AND function using five cards. Since then, the area has gained interest from many researchers and several card-based protocols to compute various functions have been developed. In this paper, we propose… ▽ More

    Submitted 25 February, 2024; originally announced February 2024.

  3. Printing Protocol: Physical ZKPs for Decomposition Puzzles

    Authors: Suthee Ruangwises, Mitsugu Iwamoto

    Abstract: Decomposition puzzles are pencil-and-paper logic puzzles that involve partitioning a rectangular grid into several regions to satisfy certain rules. In this paper, we construct a generic card-based protocol called printing protocol, which can be used to physically verify solutions of decompositon puzzles. We apply the printing protocol to develop card-based zero-knowledge proof protocols for two s… ▽ More

    Submitted 30 November, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: A preliminary version of this paper has appeared at LATINCRYPT 2023

  4. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  5. arXiv:1707.08567  [pdf

    cs.IT

    Proceedings of Workshop AEW10: Concepts in Information Theory and Communications

    Authors: Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan , et al. (9 additional authors not shown)

    Abstract: The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017. It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989. The idea of the workshop is threefold: 1) to improve the communication between the scientist in the different p… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: 44 pages, editors for the proceedings: Yanling Chen and A. J. Han Vinck

    MSC Class: 68P30; 94A05

  6. arXiv:1410.1120  [pdf, ps, other

    cs.CR cs.IT

    Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography

    Authors: Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata

    Abstract: This paper revisits formalizations of information-theoretic security for symmetric-key encryption and key agreement protocols which are very fundamental primitives in cryptography. In general, we can formalize information-theoretic security in various ways: some of them can be formalized as stand-alone security by extending (or relaxing) Shannon's perfect secrecy or by other ways such as semantic… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: 25 pages. Submitted to IEEE Trans. Inf. Theory

  7. Secret Sharing Schemes Based on Min-Entropies

    Authors: Mitsugu Iwamoto, Junji Shikata

    Abstract: Fundamental results on secret sharing schemes (SSSs) are discussed in the setting where security and share size are measured by (conditional) min-entropies. We first formalize a unified framework of SSSs based on (conditional) Rényi entropies, which includes SSSs based on Shannon and min entropies etc. as special cases. By deriving the lower bound of share sizes in terms of Rényi entropies based… ▽ More

    Submitted 28 April, 2014; v1 submitted 23 January, 2014; originally announced January 2014.

    Comments: 7 pages, This is the full version of the paper to appear at IEEE ISIT2014

  8. arXiv:1106.1731  [pdf, ps, other

    cs.CR

    Security Notions for Information Theoretically Secure Encryptions

    Authors: Mitsugu Iwamoto, Kazuo Ohta

    Abstract: This paper is concerned with several security notions for information theoretically secure encryptions defined by the variational (statistical) distance. To ensure the perfect secrecy (PS), the mutual information is often used to evaluate the statistical independence between a message and a cryptogram. On the other hand, in order to recognize the information theoretically secure encryptions and co… ▽ More

    Submitted 4 January, 2012; v1 submitted 9 June, 2011; originally announced June 2011.

    Comments: 6 pages, presented at ISIT 2011

  9. arXiv:1004.4530  [pdf, ps, other

    cs.IT cs.CR

    Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks

    Authors: Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto

    Abstract: In this paper, we discuss coding theorems on a $(2, 2)$--threshold scheme in the presence of an opponent who impersonates one of the two shareholders in an asymptotic setup. We consider a situation where $n$ secrets $S^n$ from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to $S^n$ with permitting negligible decoding error. We introduce correlation level of… ▽ More

    Submitted 18 February, 2012; v1 submitted 26 April, 2010; originally announced April 2010.

    Comments: 25 pages, 3 figures. Submitted to IEEE Trans. Inf. Theory

  10. arXiv:cs/0506065  [pdf, ps, other

    cs.CR cs.IT

    Strongly secure ramp secret sharing schemes for general access structures

    Authors: Mitsugu Iwamoto, Hirosuke Yamamoto

    Abstract: Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp… ▽ More

    Submitted 15 June, 2005; originally announced June 2005.

  11. arXiv:cs/0506064  [pdf, ps, other

    cs.CR cs.IT

    Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures

    Authors: Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa

    Abstract: It is known that for any general access structure, a secret sharing scheme (SSS) can be constructed from an (m,m)-threshold scheme by using the so-called cumulative map or from a (t,m)-threshold SSS by a modified cumulative map. However, such constructed SSSs are not efficient generally. In this paper, we propose a new method to construct a SSS from a $(t,m)$-threshold scheme for any given gener… ▽ More

    Submitted 15 June, 2005; originally announced June 2005.