Updated on 2026/04/28

写真a

 
ITO TOSHIYA
 
Organization
Office of Institute Strategy Institute Professor
Title
Institute Professor
External link

Research Areas

  • Informatics / Theory of informatics  / Discrete Algorithms

  • Informatics / Theory of informatics  / Online Algorithms

  • Informatics / Computational science  / Probabilistic Methond

  • Informatics / Computational science  / Linear Algebra Method

Education

  • Tokyo Institute of Technology

    1988.12

      More details

  • Tokyo Institute of Technology   Graduate School of Science and Engineering   Dept. of Electrical and Electronic Engineering

    1982.4 - 1984.3

      More details

  • Tokyo Institute of Technology   Faculty of Engineering   Dept. of Electrical and Electronic Engineering

    1978.4 - 1982.3

      More details

Research History

  • Institute of Science Tokyo   School of Computing   Professor

    2024.10

      More details

  • Tokyo Institute of Technology

    2019.4

      More details

  • Tokyo Institute of Technology   Dept. of Mathematican and Computing Science   Professor

    2016.4

      More details

  • Tokyo Institute of Technology   Global Scientific Information and Computing Center   Professor

    2001.4 - 2016.3

      More details

  • Tokyo Institute of Technology   Dept. of Information Processing   Associate Professor

    1992.4 - 2001.3

      More details

  • Tokyo Institute of Technology   Dept. of Information Processing   Lecturer

    1990.3 - 1992.3

      More details

  • Tokyo Institute of Technology   Dept. of Electrical and Electronic Engineering   Assistant Professor

    1985.12 - 1990.2

      More details

▼display all

Papers

  • A Nearly Optimal Deterministic Algorithm for Online Transportation Problem Reviewed

    Tsubasa Harada, Toshiya Itoh

    International Colloquium on Automata, Languages, and Programming (ICALP)   2025.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.4230/LIPIcs.ICALP.2025.94

    researchmap

  • Popularity on the 3D-Euclidean Stable Roommates Reviewed

    Steven Ge, Toshiya Itoh

    Lecture Notes in Computer Science   196 - 214   2025.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Singapore  

    DOI: 10.1007/978-981-96-2845-2_13

    researchmap

  • Popularity on the roommate diversity problem Reviewed

    Steven Ge, Toshiya Itoh

    Theoretical Computer Science   1023   114903 - 114903   2025.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.tcs.2024.114903

    researchmap

  • Capacity-insensitive algorithms for online facility assignment problems on a line Reviewed

    Tsubasa Harada, Toshiya Itoh, Shuichi Miyazaki

    Discrete Mathematics, Algorithms and Applications   16 ( 05 )   2350057-1 - 2350057-39   2024.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:World Scientific Pub Co Pte Ltd  

    In the online facility assignment problem [Formula: see text], there exist [Formula: see text] servers [Formula: see text] on a metric space where each [Formula: see text] has an integer capacity [Formula: see text] and a request arrives one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. As special cases for [Formula: see text], we consider [Formula: see text] on a line , which is denoted by [Formula: see text] and [Formula: see text], where the latter is the case of [Formula: see text] with equidistant servers. In this paper, we perform the competitive analysis for the above problems. As a natural generalization of the greedy algorithm grdy, we introduce a class of algorithms called MPFS (Most Preferred Free Servers) and show that any MPFS algorithm has the capacity-insensitive property, i.e., for any MPFS algorithm alg for [Formula: see text], if alg is [Formula: see text]-competitive when [Formula: see text], then alg is [Formula: see text]-competitive for general [Formula: see text]. By applying the capacity-insensitive property of the greedy algorithm grdy, we derive the matching upper and lower bounds [Formula: see text] on the competitive ratio of grdy for [Formula: see text]. To investigate the capability of MPFS algorithms, we show that the competitive ratio of any MPFS algorithm alg for [Formula: see text] is at least [Formula: see text]. Then, we propose a new MPFS algorithm idas (Interior Division for Adjacent Servers) for [Formula: see text] and show that the competitive ratio of idas for [Formula: see text] is at most [Formula: see text], i.e., idas for [Formula: see text] is best possible in all the MPFS algorithms. We also give numerical experiments to investigate the performance of idas and grdy and show that idas performs better than grdy for distribution of request sequences with locality.

    DOI: 10.1142/s179383092350057x

    researchmap

  • Mechanism Design for Mobility

    Tsubasa Harada, Toshiya Itoh, Shigeo Matsubara, Shuichi Miyazaki, Makoto Yokoo

    Advanced Mathematical Science for Mobility Society   187 - 215   2024.3

     More details

    Publishing type:Part of collection (book)   Publisher:Springer Nature Singapore  

    Abstract

    This chapter presents the development of matching theory toward implementing the next-generation car-sharing systems, consisting of three topics: (1) online facility assignment problems on a line, (2) two-sided matching with flexible quotas: student-project-resource matching-allocation problem, and (3) formalizing station-based one-way car sharing as three-sided matching. The first two relate to developments in basic research, while the last one is application-oriented.

    DOI: 10.1007/978-981-99-9772-5_10

    researchmap

  • How to Physically Verify a Rectangle in a Grid: A Physical ZKP for Shikaku Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Fun with Algorithms   226   24:1 - 24:12   2022.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.4230/LIPIcs.FUN

    researchmap

  • Physical zero-knowledge proof for Ripple Effect Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Theoretical Computer Science   895   115 - 123   2021.12

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.tcs.2021.09.034

    researchmap

  • Competitive analysis for two variants of online metric matching problem Reviewed

    Toshiya Itoh, Shuichi Miyazaki, Makoto Satake

    Discrete Mathematics, Algorithms and Applications   13 ( 06 )   2150156-1 - 2150156-16   2021.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:World Scientific Pub Co Pte Ltd  

    In the online metric matching problem, there are servers on a given metric space and requests are given one-by-one. The task of an online algorithm is to match each request immediately and irrevocably with one of the unused servers. In this paper, we pursue competitive analysis for two variants of the online metric matching problem. The first variant is a restriction where each server is placed at one of two positions, which is denoted by OMM([Formula: see text]). We show that a simple greedy algorithm achieves the competitive ratio of 3 for OMM([Formula: see text]). We also show that this greedy algorithm is optimal by showing that the competitive ratio of any deterministic online algorithm for OMM([Formula: see text]) is at least 3. The second variant is the online facility assignment problem on a line. In this problem, the metric space is a line, the servers have capacities, and the distances between any two consecutive servers are the same. We denote this problem by OFAL([Formula: see text]), where [Formula: see text] is the number of servers. We first observe that the upper and lower bounds for OMM([Formula: see text]) also hold for OFAL([Formula: see text]), so the competitive ratio for OFAL([Formula: see text]) is exactly 3. We then show lower bounds on the competitive ratio [Formula: see text] [Formula: see text], [Formula: see text] [Formula: see text] and [Formula: see text] [Formula: see text] for OFAL([Formula: see text]), OFAL([Formula: see text]) and OFAL([Formula: see text]), respectively.

    DOI: 10.1142/s1793830921501561

    researchmap

  • Physical ZKP for Connected Spanning Subgraph: Applications to Bridges Puzzle and Other Problems Reviewed International journal

    Suthee Ruangwises, Toshiya Itoh

    Unconventional Computation and Natural Computation   12984   149 - 163   2021.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-87993-8_10

    researchmap

  • Securely computing the n-variable equality function with 2n cards Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Theoretical Computer Science   887   99 - 110   2021.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.tcs.2021.07.007

    researchmap

  • Unpopularity Factor in the Marriage and Roommates Problems Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Theory of Computing Systems   65 ( 3 )   579 - 592   2021.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s00224-020-09978-5

    researchmap

    Other Link: https://link.springer.com/article/10.1007/s00224-020-09978-5/fulltext.html

  • Competitive Analysis for Two Variants of Online Metric Matching Problem Reviewed

    Toshiya Itoh, Shuichi Miyazaki, Makoto Satake

    Lecture Notes in Computer Science   12577   468 - 498   2020.12

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-64843-5_33

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/cocoa/cocoa2020.html#ItohMS20

  • Physical Zero-Knowledge Proof for Numberlink Reviewed

    Suthee Ruangwises, Toshiya Itoh

    10th International Conference on Fun with Algorithms   157   22:1 - 22:11   2020.9

     More details

    Language:English  

    DOI: 10.4230/LIPIcs.FUN.2021.22

    researchmap

  • Securely Computing the n-Variable Equality Function with 2n Cards

    Suthee Ruangwises, Toshiya Itoh

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   12337   25 - 36   2020

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Science and Business Media Deutschland GmbH  

    DOI: 10.1007/978-3-030-59267-7_3

    Scopus

    researchmap

  • Random Popular Matchings with Incomplete Preference Lists Reviewed

    Toshiya Itoh

    Journal of Graph Algorithms and Applications   23 ( 5 )   815 - 835   2019.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.7155/jgaa.00513

    researchmap

  • On the Competitive Analysis for the Multi-Objective Time Series Search Problem Reviewed

    Toshiya Itoh

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   E102-A ( 9 )   1150 - 1158   2019.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E102.A.1150

    researchmap

  • AND Protocols Using only Uniform Shuffles Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Lecture Notes in Computer Science   11532   349 - 358   2019.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-030-19955-5_30

    researchmap

  • Stable Noncrossing Matchings Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Lectue Notes in Computer Science   11638   405 - 416   2019.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-030-25005-8_33

    researchmap

  • Unpopularity Factor in the Marriage and Roommates Problems Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Lectue Notes in Computer Science   11532   337 - 348   2019.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-030-19955-5_29

    researchmap

  • On Aggregating Two Metrics with Relaxed Triangle Inequalities by the Weighted Harmonic Mean. Reviewed

    Toshiya Itoh, Yoshinori Takei

    IEICE Transactions   101-A ( 9 )   1404 - 1411   2018.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E101.A.1404

    researchmap

  • Optimal online algorithms for the multi-objective time series search problem

    Shun Hasegawa, Toshiya Itoh

    Theoretical Computer Science   718   58 - 66   2018.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier B.V.  

    DOI: 10.1016/j.tcs.2017.01.008

    Scopus

    researchmap

  • Random popular matchings with incomplete preference lists Reviewed

    Suthee Ruangwises, Toshiya Itoh

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   10755   106 - 118   2018

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-75172-6_10

    Scopus

    researchmap

  • Optimal online algorithms for the multi-objective time series search problem Reviewed

    Shun Hasegawa, Toshiya Itoh

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9627 ( C )   301 - 312   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-30139-6_24

    Scopus

    researchmap

  • Buffer management of multi-queue QoS switches with class segregation Reviewed

    Toshiya Itoh, Seiji Yoshimoto

    THEORETICAL COMPUTER SCIENCE   589 ( C )   24 - 33   2015.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.tcs.2015.04.010

    Web of Science

    researchmap

  • Weighted Random Popular Matchings Reviewed

    Toshiya Itoh, Osamu Watanabe

    RANDOM STRUCTURES & ALGORITHMS   37 ( 4 )   477 - 494   2010.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/rsa.20316

    Web of Science

    researchmap

  • Improved Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length Reviewed

    Toshiya Itoh, Yasuhiro Suzuki

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E93D ( 2 )   263 - 270   2010.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E93.D.263

    Web of Science

    researchmap

  • Approximation Algorithms for the Highway Problem under the Coupon Model

    HAMANE Ryoso, ITOH Toshiya, TOMITA Kouhei

    IEICE Trans. Fundamentals   92 ( 8 )   1779 - 1786   2009.8

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    When a store sells items to customers, the store wishes to decide the prices of items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a set E of m customers who wish to buy the items, and also assume that each item iV has the production cost di and each customer ejE has the valuation vj on the bundle ejV of items. When the store sells an item iV at the price ri, the profit for the item i is pi = ri - di. The goal of the store is to decide the price of each item to maximize its total profit. We refer to this maximization problem as the item pricing problem. In most of the previous works, the item pricing problem was considered under the assumption that pi ≥ 0 for each iV, however, Balcan, et al. [In Proc. of WINE, LNCS 4858, 2007] introduced the notion of "loss-leader, " and showed that the seller can get more total profit in the case that pi < 0 is allowed than in the case that pi < 0 is not allowed. In this paper, we consider the line highway problem (in which each customer is interested in an interval on the line of the items) and the cycle highway problem (in which each customer is interested in an interval on the cycle of the items), and show approximation algorithms for the line highway problem and the cycle highway problem in which the smallest valuation is s and the largest valuation is l (this is called an [s, l]-valuation setting) or all valuations are identical (this is called a single valuation setting).

    DOI: 10.1587/transfun.E92.A.1779

    CiNii Books

    researchmap

  • Approximation Preserving Reductions among Item Pricing Problems Reviewed

    Ryoso Hamane, Toshiya Itoh, Kouhei Tomita

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E92D ( 2 )   149 - 157   2009.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E92.D.149

    Web of Science

    researchmap

  • Improved approximation algorithms for item pricing with bounded degree and valuation Reviewed

    Ryoso Hamane, Toshiya Itoh

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E91D ( 2 )   187 - 199   2008.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietisy/e91-d.2.187

    Web of Science

    researchmap

  • On (epsilon, k)-min-wise independent permutations Reviewed

    Noga Alon, Toshiya Itoh, Tatsuya Nagatani

    RANDOM STRUCTURES & ALGORITHMS   31 ( 3 )   384 - 389   2007.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/rsa.20184

    Web of Science

    researchmap

  • Competitive analysis of multi-queue preemptive QoS algorithms for general priorities Reviewed

    Toshiya Itoh, Noriyuki Takahashi

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E89A ( 5 )   1186 - 1197   2006.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e89-a.5.1186

    Web of Science

    researchmap

  • Constructing families of epsilon-approximate k-wise independent permutations Reviewed

    T Itoh, Y Takei, J Tarui

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E87A ( 5 )   993 - 1003   2004.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • On the Sample Size of k-Restricted Min-Wise Independent Permutations and Other k-Wise Distributions Reviewed

    Toshiya Itoh, Yoshinori Takei, Jun Tarui

    ACM Annual Symposium on Theory of Computing   710 - 719   2003.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/780542.780645

    researchmap

  • A note on the relationships among certified discrete log cryptosystems Reviewed

    E Chida, T Itoh, H Shizuya

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E86A ( 5 )   1198 - 1202   2003.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • A nearly linear size 4-min-wise independent permutation family by finite geometries Reviewed

    J Tarui, T Itoh, Y Takei

    APPROXIMATION, RANDOMIZATION, AND COMBINATORIAL OPTIMIZATION   2764   396 - 408   2003

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/978-3-540-45198-3_33

    Web of Science

    researchmap

  • Online Algorithms for Convex Case Capital Investment Reviewed

    Toshiya Itoh

    Interdisciplinary Information Sciences   8 ( 1 )   77 - 88   2002.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Tohoku University  

    In a factory, we need to make capital investments in machines for manufacturing a product. In this paper, we deal with the convex case capital investment such that more expensive machines have cheaper production costs. What we with to achieve is to design a good online algorithm that minimizes the sum of the production and capital costs when the production request and investment opportunities in the future are unknown. Azar, et al. proposed an (online) algorithm Convex for the convex case capital investment and showed that it is (4+2√2)-competitive. In this paper, we investigate the competitive ratio of the convex case capital investment more precisely and show that (1) for the convex case capital investment, the competitive ratio of the algorithm Convex is at least 4+2√2-ε for any ε>0 (Theorem 3.3). In the practical point of view, we introduce a notion of "γ-restricted" to the convex case capital investment and show that (2) for the γ-restricted convex case capital investment, the competitive ratio of the algorithm Convex is at most 5+4/(γ−4) for any γ≥6 (Theorem 4.3); (3) for the γ-restricted convex case capital investment, the competitive ratio of the algorithm Convex is at least 5−ε for any ε>0 (Theorem 4.4). Finally, we also show that the competitive ratio of the γ-restricted convex case capital investment is at least 2−ε for any ε>0 (Theorem 5.4).

    DOI: 10.4036/iis.2002.77

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JALC/00162126877?from=CiNii

  • Improved Approximation Lower Bounds for TSP with Distances One and Two Reviewed

    Ryo Hirade, Toshiya Itoh

    Interdisciplinary Information Sciences   8 ( 1 )   63 - 76   2002.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Tohoku University  

    The metric travelling salesman problem Δ-Tsp is the traveling salesman problem in which the distances among cities satisfy the triangle inequality. In this paper, we consider the matric traveling salesman problem Δ(1,2)-Tsp with distances one and two and Δ(1,2,3)-Tsp with distances one, two, and three as the special cases of Δ-Tsp. Since Δ(1,2)-Tsp is NP-complete, it is NP-hard to find an optimal solution for Δ(1,2)-Tsp. So in polynomial time, we with to find an approximate solution for Δ(1,2)-Tsp. However Δ(1,2)-Tsp is APX-complete, there is a nontrivial approximation lower bound for Δ(1,2)-Tsp. For any ε>0, Engebretsen showed that it is NP-hard to approximate the symmetric Δ(1,2)-Tsp within 5381/5380-ε; the asymmetric Δ(1,2)-Tsp within 2805/2804-ε, and Böchenhauer, et al. showed that it is NP-hard to approximate the symmetric Δ(1,2,3)-Tsp within 3813/3812-ε. In this paper, we improve those lower bounds and show that for any ε>0, it is NP-hard to approximate the symmetric Δ(1,2)-Tsp within 1027/1026-ε (Corollary 4.5); the asymmetric Δ(1,2)-Tsp within 535/534-ε (Corollary 4.7); the symmetric Δ(1,2,3)-Tsp within 817/816-ε (Theorem 5.2); the asymmetric Δ(1,2,3)-Tsp within 364/363-ε (Theorem 5.3). We also show that for any ε>0, it is NP-hard to approximate Shortest-Superstring within 1279/1278-ε (Corollary 6.3).

    DOI: 10.4036/iis.2002.63

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JALC/00162126860?from=CiNii

  • Constructing an optimal family of min-wise independent permutations

    Yoshinori Takei, Toshiya Itoh, Takahiro Shinozaki

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83-A ( 4 )   747 - 754   2000.4

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Scopus

    CiNii Books

    researchmap

  • A general construction of min-wise independent permutations Reviewed

    Y Takei, T Itoh

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E83A ( 4 )   646 - 655   2000.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • On permutations with limited independence Reviewed

    T Itoh, Y Takei, J Tarui

    PROCEEDINGS OF THE ELEVENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS   137 - 146   2000

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/338219.338245

    Web of Science

    researchmap

  • A general construction of min-wise independent permutations

    Yoshinori Takei, Toshiya Itoh

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83-A ( 4 )   646 - 654   2000

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    Scopus

    researchmap

  • Divertible and subliminal-free zero-knowledge proofs for languages Reviewed

    Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya

    Journal of Cryptology   12 ( 3 )   197 - 223   1999

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York LLC  

    DOI: 10.1007/s001459900053

    Scopus

    researchmap

  • A language-dependent cryptographic primitive Reviewed

    Toshiya Itoh, Yuji Ohta, Hiroki Shizuya

    Journal of Cryptology   10 ( 1 )   37 - 49   1997

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York  

    DOI: 10.1007/s001459900018

    Scopus

    researchmap

  • Simulating fair dice with biased coins Reviewed

    T Itoh

    INFORMATION AND COMPUTATION   126 ( 1 )   78 - 82   1996.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1006/inco.1996.0036

    Web of Science

    researchmap

  • A progress report on subliminal-free channels

    Mike Burmester, Yvo G. Desraedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   1174   157 - 168   1996

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-61996-8_39

    Scopus

    researchmap

  • A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity Reviewed

    Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii

    Journal of Cryptology   9 ( 2 )   101 - 109   1996

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/BF00190804

    researchmap

  • On the Discrepancy Between Serial and Parallel of Zero-Knowledge Protocols Reviewed

    Kouichi Sakurai, Toshiya Itoh

    Lectue Notes in Computer Science   740   246 - 359   1994.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/3-540-48071-4_17

    researchmap

  • A NOTE ON AM LANGUAGES OUTSIDE NP BOOLEAN-OR CO-NP Reviewed

    H SHIZUYA, T ITOH

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E77A ( 1 )   65 - 71   1994.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • SUBLIMINAL CHANNELS FOR TRANSFERRING SIGNATURES - YET ANOTHER CRYPTOGRAPHIC PRIMITIVE Reviewed

    K SAKURAI, T ITOH

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E77A ( 1 )   31 - 38   1994.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • A low communication competitive interactive proof system for promised quadratic residuosity

    Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   773   61 - 72   1994

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-48329-2_6

    Scopus

    researchmap

  • Language dependent secure bit commitment

    Toshiya Itoh, Yuji Ohta, Hiroki Shiauya

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   839   188 - 201   1994

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-48658-5_20

    Scopus

    researchmap

  • On the Complexity of Constant Round ZKIP of Possession of Knowledge Reviewed

    Toshiya Itoh, Kouichi Sakurai

    Lectue Notes in Computer Science   739   331 - 345   1993.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/3-540-57332-1_28

    researchmap

  • Any Language in IP Has a Divertible ZKIP Reviewed

    Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya

    Lectue Notes in Computer Science   739   382 - 396   1993.11

  • CONSTANT ROUND PERFECT ZKIP OF COMPUTATIONAL ABILITY Reviewed

    T ITOH, K SAKURAI

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E76A ( 7 )   1225 - 1233   1993.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • PRACTICAL CONSEQUENCES OF THE DISCREPANCY BETWEEN ZERO-KNOWLEDGE PROTOCOLS AND THEIR PARALLEL EXECUTION Reviewed

    K SAKURAI, T ITOH

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E76A ( 1 )   14 - 22   1993.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

    Kouichi Sakurai, Toshiya Itoh

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   718   435 - 446   1993

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-57220-1_81

    Scopus

    researchmap

  • Subliminal channels for signature transfer and their application to signature distribution schemes

    Kouichi Sakurai, Toshiya Itoh

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   718   231 - 243   1993

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-57220-1_65

    Scopus

    researchmap

  • ON THE COMPLEXITY OF HYPERELLIPTIC DISCRETE LOGARITHM PROBLEM Reviewed

    H SHIZUYA, T ITOH, K SAKURAI

    IEICE TRANSACTIONS ON COMMUNICATIONS ELECTRONICS INFORMATION AND SYSTEMS   74 ( 8 )   2129 - 2135   1991.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • LANGUAGE MEMBERSHIP VERSUS POSSESSION OF KNOWLEDGE IN CONSTANT ROUND ZKIP Reviewed

    K SAKURAI, T ITOH

    IEICE TRANSACTIONS ON COMMUNICATIONS ELECTRONICS INFORMATION AND SYSTEMS   74 ( 8 )   2118 - 2123   1991.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • ON THE COMPLEXITY OF HYPERELLIPTIC DISCRETE LOGARITHM PROBLEM Reviewed

    H SHIZUYA, T ITOH, K SAKURAI

    ADVANCES IN CRYPTOLOGY - EUROCRYPT 91   547   337 - 351   1991

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Provably secure key-updating schemes in identity-based systems Reviewed

    S. Shinozaki, T. Itoh, A. Fujioka, S. Tsujii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   473 ( 3 )   16 - 30   1991

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-46877-3_3

    Scopus

    researchmap

  • ON THE COMPLEXITY OF HYPERELLIPTIC DISCRETE LOGARITHM PROBLEM Reviewed

    H SHIZUYA, T ITOH, K SAKURAI

    LECTURE NOTES IN COMPUTER SCIENCE   547   337 - 351   1991

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/3-540-46416-6_29

    Web of Science

    researchmap

  • Demonstrating possession without revealing factors and its application Reviewed

    Hiroki Shizuya, Kenji Koyama, Toshiya Itoh

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   453   273 - 293   1990

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/BFb0030368

    Scopus

    researchmap

  • STRUCTURE OF PARALLEL MULTIPLIERS FOR A CLASS OF FIELDS GF(2M) Reviewed

    T ITOH, S TSUJII

    INFORMATION AND COMPUTATION   83 ( 1 )   21 - 40   1989.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/0890-5401(89)90045-X

    Web of Science

    researchmap

  • GENERALIZED FAST ALGORITHM FOR COMPUTING MULTIPLICATIVE INVERSES IN GF(2M) Reviewed

    Y ASANO, T ITOH, S TSUJII

    ELECTRONICS LETTERS   25 ( 10 )   664 - 665   1989.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1049/el:19890449

    Web of Science

    researchmap

  • AN ID-BASED CRYPTOSYSTEM BASED ON THE DISCRETE LOGARITHM PROBLEM Reviewed

    S TSUJII, T ITOH

    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS   7 ( 4 )   467 - 473   1989.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • An efficient algorithm for deciding quadratic residuosity in finite fields GF(pm) Reviewed

    Toshiya Itoh, Shigeo Tsujii

    Information Processing Letters   30 ( 3 )   111 - 114   1989.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/0020-0190(89)90127-0

    Scopus

    researchmap

  • NEW NONINTERACTIVE IDENTITY-BASED KEY DISTRIBUTION-SYSTEM Reviewed

    S TSUJII, K KUROSAWA, T ITOH

    ELECTRONICS LETTERS   24 ( 22 )   1356 - 1357   1988.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • A FAST ALGORITHM FOR COMPUTING MULTIPLICATIVE INVERSES IN GF(2M) USING NORMAL BASES Reviewed

    T ITOH, S TSUJII

    INFORMATION AND COMPUTATION   78 ( 3 )   171 - 177   1988.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/0890-5401(88)90024-7

    Web of Science

    researchmap

  • EFFECTIVE RECURSIVE ALGORITHM FOR COMPUTING MULTIPLICATIVE INVERSES IN GF(2M) Reviewed

    T ITOH, S TSUJII

    ELECTRONICS LETTERS   24 ( 6 )   334 - 335   1988.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1049/el:19880226

    Web of Science

    researchmap

  • A public‐key cryptosystem based on the difficulty of solving a system of nonlinear equations Reviewed

    Shigeo Tsujii, Toshiya Itoh, Atsushi Fujioka, Kaoru Kurosawa, Tsutomu Matsumoto

    Systems and Computers in Japan   19 ( 2 )   10 - 18   1988

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/scj.4690190202

    Scopus

    researchmap

  • ID-BASED CRYPTOSYSTEM USING DISCRETE LOGARITHM PROBLEM Reviewed

    S TSUJII, T ITOH, K KUROSAWA

    ELECTRONICS LETTERS   23 ( 24 )   1318 - 1320   1987.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Efficient probabilistic algorithm for solving quadratic equations over finite fields Reviewed

    T. Itoh

    Electronics Letters   23 ( 17 )   869 - 870   1987

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1049/el:19870615

    Scopus

    researchmap

▼display all

MISC

  • Advanced Mathematical Science for Mobility Society

    Tsubasa Harada, Toshiya Itoh, Shigeo Matsubara, Shuichi Miyazaki, Makoto Yokoo

    Springer   2024.3

     More details

    Language:English   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)   Publisher:Springer Nature Singapore  

    DOI: 10.1007/978-981-99-9772-5

    researchmap

    Other Link: https://link.springer.com/content/pdf/10.1007/978-981-99-9772-5

  • Closed Formulas of the Arithmetic Mean Component Competitive Ratio for the 3-Objective and 4-Objective Time Series Search Problems.

    Toshiya Itoh, Yoshinori Takei

    CoRR   abs/1712.00214   2017

     More details

    Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • Random Popular Matchings with Incomplete Preference Lists (Theoretical Foundations of Computing)

    116 ( 262 )   1 - 8   2016.10

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Greedy Algorithms for Multi-Queue Buffer Management with Class Segregation (New Trends in Algorithms and Theory of Computation)

    ITOH TOSHIYA, YOSHIMOTO SEIJI

    RIMS Kokyuroku   1799   84 - 91   2012.6

     More details

    Language:English   Publisher:Kyoto University  

    CiNii Books

    researchmap

    Other Link: http://hdl.handle.net/2433/172997

  • Construction and Operation of Campus-Wide Authentication and Authorization System

    IIDA Katsuyoshi, SHINZATO Takushi, ITOH Toshiya, WATANABE Osamu

    The IEICE transactions on communications B   92 ( 10 )   1554 - 1565   2009.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Weighted Random Popular Matchings

    ITOH Toshiya, WATANABE Osamu

    IEICE technical report. Theoretical foundations of Computing   107 ( 127 )   41 - 48   2007.6

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Let A be the set of n applicants and I be the set of m items. We assume that the set A is partitioned into A_1,A_2,...,A_k and each A_i is assigned a weight W_i such that w_1&gt; w_2 &gt; ・ ・ ・ &gt; w_k &gt; 0. Let us consider the problem of matching applicants to items, where each applicant x ∈ A provides a preference list defined on items. We say that an applicant x prefers an item p than an item q if p is located at higher position than q in the preference list. For any matchings M and M&#039;, we say that an applicant x prefers M. over M&#039; if x prefers M(x) over M&#039;(x). We say that M is more, popular than M&#039; if the total weight of applicants preferring M over M&#039; is larger than that of applicants preferring M&#039; over M, and define M to be a k-weighted popular matching if there are no other matchings that are more popular than M. For the case where k = 1, Mahdian showed that if m &gt; 1.42n, then a random instance of the matching problem has a popular matching with high probability, but nothing is known for the k-weighted matching problems. In this paper, we analyze the k-weighted matching problems, and show that for any β such that m=βn, (lower bound) if β/n^&lt;1/3&gt;=o(1), then a random instanc

    CiNii Books

    researchmap

  • Improved Approximation Algorithms for Item Pricing with Bounded Degree and Valuation

    HAMANE Ryoso, ITOH Toshiya

    IEICE technical report   107 ( 24 )   1 - 8   2007.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    When a store sells items to customers, the store wishes to decide the prices of the items to maximize its profit. If the store sells the items with low (resp. high) prices, hte customers buys more (resp. less) items, which provides less profit to the store. So it whould be hard for the store to decide the prices of items. Assume that a storeshas a set V of n items and there is a set C of m coutomers who wish to buy those items. The goal of the store is to decide the price of each item to maximize its profit. We refer to this maximization problem as an item pricing problem. We classify the item pricing problem according to how many items the store can sell and how the customers valuate the items. If the store can sell every item i with unlimited (resp. limited) amount, we refer to this as an unlimited supply model (resp. a limited supply model). The item pricing problem is said to be single-minded if each customer j ∈ C wishes to buy a set ej ⊆ V of items and assigns its valiation w(ej) >___ 0. Balcan and Blum regarde the single-minded item pricing problems (in unlimited supply model) as weighted k-hypertraphs and described several approximation algorithms. Tn this paper, we consider the maximum (pseudo)degree of k-hypergraphs and the valuation ratio, i.e., the ratio between the smallest and the largest valuations. Then for the single-minded unlimited supply item pricing problems, we show improved approximation algorithms w.r.t. the maximum (pseudo)degree and the valuation ratio.

    CiNii Books

    researchmap

  • Construction and Deployment of Campus-wide Authentication and Authorization System Cooperating with Administrative Divisions and Other Systems

    SHINZATO Takushi, IIDA Katsuyoshi, KISHIMOTO Koichi, TACHIKAWA Hiroyuki, KONNO Takenori, YAMAZAKI Koji, ITOH Toshiya, WATANABE Osamu

    IEICE technical report   106 ( 577 )   201 - 206   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, information access control must be implemented on IT system in universities. For instance, IT systems dealing with confidential information such as students' and salary records must perform access control using authentication technologies such as PKI. If we implement authentication on a system-by-system basis, it will degrade information confidentiality, user convenience and system's maintenance ability. Therefore, a common authentication system is very much important in universities' IT system. In order to design the common authentication system, we must care about existing business procedures and existing IT systems in universities. In this paper, we introduce Campus-wide authentication and authorization system in Tokyo Institute of Technology. Particularly, we focus on the cooperation with existing business procedures and existing IT systems. We also provide issues and solutions that come up after starting our system operation.

    CiNii Books

    researchmap

  • Improved Lower Bounds for Families of ε-Approximate κ-Restricted Min-Wise Independent Permutations

    ITOH Toshiya, NAGATANI Tatsuya

    IEICE technical report   105 ( 680 )   23 - 30   2006.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A family F of min-wise independent permutations is known to be a useful tool of indexing replicated documents on the Web. For any integer n>0, let S_n be the family of all permutations on [numerical formula]. For any integer k such that 1&le;k&le;n and any real ε>0, we say that a family F⊆S_n of permutations is ε-approximate k-restricted min-wise independent if for any (nonempty) subset X⊆[1, n] such that ∥X∥&le;k and any element x∈X,[numerical formula], when π is chosen from F uniformly at random (where ∥A∥denotes the cardinality of a finite set A). For the size of families F⊆S_n of ε-approximate k-restricted min-wise independent permutations, the following results are known: For any integer k such that 1&le;k&le;n and any real ε>0, (constructive upper bound) [numerical formula]; (nonconstructive upper bound) [numerical formula]; (lower bound) [numerical formula] and [numerical formula], [numerical formula]. In this paper, we first derive an upper bound for the Ramsey number of the edge coloring with m&le;2 colors of a complete graph K_l of l vertices, and by the linear algebra method, we then derive a slightly improved lower bound, i.e., we show that for any family F⊆S_n of ε-approximate k-restricted min-wise independent permutations, [numerical formula].

    CiNii Books

    researchmap

  • Recent Topics of Wireless LAN Security Technology

    TOMOISHI Masahiko, YOSHIDA Shin-ichi, ITOH Toshiya

    IEICE technical report. Social Implications of Technology and Information Ethics   104 ( 96 )   1 - 6   2004.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The new IEEE standards of wireless LAN security and network technologies used in the standards are shown in this paper. The problem of WEP encryption discussed in the recent years are summarized, and TKIP technology and AES encryption for the next standard IEEE 802.11i are shown. For authentication, authorization, and accounting of wireless LAN client, IEEE 802.1X port-based network access control will be adopted in IEEE 802.11i. We explain EAP, RADIUS technologies, which gives the foundation for IEEE 802.1X. Finally, we show an example of management and operation of a wireless LAN environment using these technologies and point out some problems and prospects.

    CiNii Books

    researchmap

  • Explicit Construction of κ-Wise Nearly Random Permutations by Iterated Feistel Tranform

    ITOH Toshiya, NAGATANI Tatsuya, TARUI Jun

    IEICE technical report. Theoretical foundations of Computing   104 ( 16 )   45 - 52   2004.4

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A notion of k-wise random permutations has several applications. From the practical point of view, it often suffices to consider ε-approximate k-wise random permutation families rather than k-wise random permutation families, however, we know little about how to construct families of ε-approximate k-wise random permutations of small size. For any integer n > 0, we use S_n to denote the set of all permutations on {0,1,...,n-1}. In this paper, we iteratively apply the Feistel Transform to construct a family of ε-approximate k-wise random permutations and we show that for any n = p^<2h> with p prime and any k = O(logn), there exists a family F⊆S_n of ε-approximate k-wise random permutations such that |F|=(n^<k^<k>>/ε^k)^<3+o>(1).. This is the first nontrivial construction for families of ε-approximate k-wise random permutations. To capture efficient evaluation of permutation families in the practical point of view, we introduce a notion of "s(n)-space pointwise samplability," and show that the family F⊆S_n of permutations constructed in this paper is O(logn)-space pointwise samplable.

    CiNii Books

    researchmap

  • On the Competitive Analysis of Stream Merging Algorithms for Video-on-Demand

    MARUCHI Kouhei, ITOH Toshiya

    IEICE technical report. Theoretical foundations of Computing   103 ( 723 )   33 - 40   2004.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A video-on-demand (VoD) is a system in which each client requests to receive a hot video and the video server immediately responds its request. In VoD system, bandwidth requirement is one of the most important measures, e.g., the maximum bandwidth and the total bandwidth, and it is known that online stream merging can reduce the bandwidth requirement. Recently, Chan et al. proposed the modified greedy algorithm MGRD_λ with catch-up parameter λ[>!_]1 and showed that for any integer λ[>!_]1, it is (2+ε)-competitive w.r.t. the maximum bandwidth and is 2.5-competitive w.r.t. the total bandwidth. In this paper, we precisely analyze the competitive ratio of the modified greedy algorithm MGRD_λ, and show that w.r.t. the maximum bandwidth, (1) the competitive ratio of the algorithm MGRD_λ is at most 2 for any integer λ[>!_]1; (2) the competitive ratio of the algorithm MGRD_λ is at least 2 for any integer λ[>!_]1; and that w.r.t. the total bandwidth, (3) the competitive ratio of the algorithm MGRD_λ is at most 2 for any integer λ[>!_]2; (4) the competitive ratio of the algorithm MGRD_λ is at least (5λ+4)/(3λ+3) for any integer λ[>!_]1.

    CiNii Books

    researchmap

  • Improved Lower Bounds for Competitive Ratio of Multi-Queue Switches in QoS Networks

    ITOH Toshiya, NAGUMO Takanobu

    IEICE technical report. Theoretical foundations of Computing   103 ( 723 )   25 - 32   2004.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The recent growth of the Internet use overloads networking systems and degrades the quality of communications, e.g., bandwidth loss, packet drops, delay of responses, etc. To overcome such degradation of the communication quality, the notion of Quality of Service (QoS) has received attention in practice. In general, QoS switches have several queues and each queue has several slots to store arriving packets. Since network traffic changes frequently, QoS switches need to control arriving packets to maximize the total priorities of transmitted packets, where the priorities are given by nonnegative values and correspond to the quality of service required to each packet. In this paper, we derive lower bounds for the competitive ratio of deterministic multi-queue nonpreemptive QoS problem of priorities 1 and α[>!_]1, and show that for any α[>!_]1, 1+/α ln((α-1) if α[>!_]α^*; 1/(1-e^<-γ0>) if 1[>!_]α<α^*, where α^* [〜!〜] 1.657 and γ_0 is a root of the equality that e^<-γ>(1/α+γ)=1-e^γ. As an immediate result, this shows a lower bound 1.466 for the competitive ratio of deterministic multi-queue nonpreemptive QoS problem of single priority, which slightly improves the best known lower bound 1.366.

    CiNii Books

    researchmap

  • Recent Progress on Min-Wise Independent Permutations

    ITOH Toshiya, TAKEI Yoshinori, TARUI Jun

    IEICE technical report. Theoretical foundations of Computing   103 ( 394 )   41 - 50   2003.10

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The notion of "a family of min-wise independent permutations" was introduced by Broder, et al. It is a basic tool to estimate resemblance between documents and has applications of detecting almost identical documents on the Web and of reducing the amount of randomness used by algorithms. In this paper, we focus on min-wise independent permutations and the related notions, e. g., ε-approximate min-wise independent permutations, k-restricted min-wise independent permutatios, etc., and overview the recen tresults on (1) how to estimate resemblance between documents by min-wise independent permutations ; (2) upper and lower bounds for the size of min-wise independent permutations ; (3) upper and lower bounds for the size of ε-approximate min-wise independent permutations ; (4) upper and loer obunds for the size of k-restricted min-wise independent permutations.

    CiNii Books

    researchmap

  • A distributed individual authentication system using ZKIP

    Motohashi Kenji, Kakuta Mitsugu, Yamaoka Katsunori, Itoh Toshiya, Sonehara Noboru

    Proceedings of the Society Conference of IEICE   2003 ( 2 )   229 - 229   2003.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • A Nearly Linear Size 4-Min-Wise Independent Permutation Family by Finite Geometries

    TARUI Jun, ITOH Toshiya, TAKEI Toshinori

    IEICE technical report. Theoretical foundations of Computing   103 ( 119 )   35 - 42   2003.6

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Itoh, Takei, and Tarui [7] showed that if a family 〓⊆S_n of permutations is k-restricted min-wise (resp.k-rankwise) independent, then|〓|=Ω(n^<[(k-1)/2]>)(resp.|〓|=Ω(n^<[(k-1)/2]>)). In this paper, we construct permutation families 〓⊆S_n of which size are close to those lower bounds for k=3,4. We construct a family 〓⊆S_n of 3-restricted (resp. 4-restricted) min-wise independent permutations such that |〓|= O(nlg^2n) (resp.|〓|=O(nlg^3n) by the affine plane AG(2, q) and a family 〓⊆S_n of 4-rankwise independent permutations such that |〓|= O(n^3lg^6n) by the projecive plane PG(2,q). We notice that if a family 〓⊆S_n of permutations is 4-rankwise independent, then |〓|=Ω(n^2). Since a family 〓⊆S_n of 4-rankwise independent permutations is 4-restricted min-wise independent, our family 〓⊆S_n of 4-restricted min-wise independent permutations is exactly the witness that properly separates the notion of 4-rankwise independence and that of 4-restricted min-wise independence.

    CiNii Books

    researchmap

  • Constructing Families of ε-Approximate κ-Wise Independent Permutations

    ITOH Toshiya, TAKEI Yoshinori

    IEICE technical report. Theoretical foundations of Computing   103 ( 31 )   15 - 22   2003.4

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we investigate the family size of ε-approximate k-wise independent permutations and show the following results : (1) For any ε&ge;0, if a family F⊆S_n of permutations is ε-approximate k-wise independent, then|F|&ge;n(n-1)…(n-k+1) if ε<1 ; |F|&ge;{n(n-1)…(n-k+1)}/(1+ε) otherwise ; (2) For any 0<ε&ge;1, there exists a family F⊆S_n of ε-approximete k-wise independent permutations such that |F|=O(n(n-1)/ε) ; (4) For any ε>0 and any n=p^m with p prime, it is possible to construct a polynomial time samplable family F⊆S_n of ε-approximate 3-wise independent permutations such that |F|=O(n(n-1)(n-2)/ε).

    CiNii Books

    researchmap

  • On the Sample Size of k-Min-Wise Independent Permutations and Other k-Wise Distributions

    ITOH Toshiya, TAKEI Yoshinori, TARUI Jun

    IEICE technical report. Theoretical foundations of Computing   102 ( 343 )   25 - 32   2002.9

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A family F of permutations of {0, 1,..., n - 1} is k-restricted min-wise independent if for any set X ⊆ {0, 1, ..., n - 1} with |X| &le;〓k and any x ∈ X, Pr[π(x) = min{π(X)}] = 1/|X| when a permutation π is randomly drawn from F. We show that if a permutation family F of an n-set is k-restricted min-wise independent, then |F| &ge;〓m(n - 1, k - 1), where m(n, d) =Σ^<d/2>_i=0 ( ^n_i) if d is even, and m(n, d) = Σ^<(d-i)/2>_i=0 ( ^n_i) + ( ^<n-1>_(d-1)/2) if d is odd. The lower bound for the size of F still holds when we allow an aribitrary probability distribution on F. It is well known that if random variables X_1, X_2,... , X_n : Ω→ {0, 1} are d-wise independent and Pr[X_i, = 1] =p_i is neither 0 nor 1, then |Ω|&ge; m(n, d). We give the following generalization and derive the result above: if random variables X_1, , X_n, : |Ω| → {0, 1} have an identical d-wise distribution with some random variables Y_1,..., Y_n and the n-tuple (Y_1,..., Y_n,) visits all the 2^n values with positive probabilities, then |Ω|&ge; m(n, d). The existence of such Y_i's is immediate when one starts with fully-distributed truly random variables and considers random variables with an identical d-wise distribution.

    CiNii Books

    researchmap

  • On Lower Bounds for the Communication Complexity of Private Information Retrieval

    ITOH Toshiya

    IEICE Trans. Fundamentals, A   84 ( 1 )   157 - 164   2001.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Private information retrieval for k 〓 1 databases (denoted by (k, l)-PIR for short) is a protocol that (1) a user sends an l tuple query to each of k noncommunicating replicated databases; (2) each database responds the user with an answer corresponding to the l tuple query; (3) the user privately retrieve any single bit out of the n bits of data stored in k databases. In this model, "privacy" implies that the user retrieves the bit he is interested in but releases to each database nothing about which bit he wishes to get. In general, the efficiency of (k, l)-PIR is measured by the total amount of bits exchanged between the user and the k databases, but few about its lower bounds are known except for restricted cases. In this paper, we classify (k, l)=PIR into a linear type, a multilinear type, and an affine type with respect to the relationship between queries to each database (made by the user) and answers to the user (made by each database), and show that (1) the lower bound for the communication complexity of any multilinear type (k, l)-PIR is Ω([chemical formula])(Theorem 3.1);(2) the lower bound for the communication complexity of any linear type (k, l)-PIR is Ω(√<n>)(Corollary 3.2); (3) the lower bound for the communication complexity of any affine type (k, l)-PIR is Ω([chemical formula])(Theorem 4.2).

    CiNii Books

    researchmap

  • Min-Wise Independence vs. 3-Wise Independence

    ITOH Toshiya

    IEICE technical report. Theoretical foundations of Computing   100 ( 402 )   49 - 56   2000.10

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A family F of min-wise independent permutations is known to be a useful tool of indexing replicated documents on the Web. We say that a family F of permutations on{0, 1, ..., n-1}is min-wise independent if for any X⊆{0, 1, ..., n-1}and any x∈X, Pr[min{π(X)}=π(x)]=∥X∥^<-1>when π is chosen uniformly at random from F, where∥A∥is the cardinality of a finite set A. We also say that a family F of permutations on{0, 1, ..., n-1}is d-wise independent if for any distinct x_1, x_2, ..., x_d∈{0, 1, ..., n-1}and any distinct y_1, y_2, ..., y_d∈{0, 1, ..., n-1}, Pr[Λ^d_<i=1>π(x_i)=π(y_i)]=1/{n(n-1)・・・(n-d+1)}when π is chosen uniformly at random from F(note that nontrivial constructions of d-wise independent family F of permutations on{0, 1, ..., n-1}are known only for d=2, 3). Recently, Broder, et al.showed that any family F of pairwise(2-wise)indenpendent permutations behaves close to a family of min-wise independent permutations, i.e., for any X⊆{0, 1, ..., n-1}such that 3&le;∥X∥=k&le;n-2 and any x∈X, (lower bound Pr_<π∈F>[min{π(X)}=π(x)&ge;1/{2(k-1)};(upper bound)Pr_<π∈F>[min{π(X)}=π(x)]&le;2/√<k>-3/(2k).In this paper, we extend this to 3-wise independence and show that any family F of 3-wise independent permutations behaves closer to a family of min-wise independent permutations, i.e., for any X⊆{0, 1, ..., n-1}such that 4&le;∥X∥=k&le;n-3 and any x∈X, (lower bound)Pr_<π∈F>[min{π(X)}=π(x)]&ge;1/{2(k-2)}-1/{6(k-2)^2};(upper bound) Pr_<π∈F>[min{π(X)}=π(x)]&ge;2/√<k>-2/k+1/(3k√<k>).

    CiNii Books

    researchmap

  • On Progress of Private Information Retrieval

    ITOH TOSHIYA

    Proceedings of the Society Conference of IEICE   2000   168 - 168   2000.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Lower Bounds for Communication Complexity of Private Information Retrieval

    ITOH TOSHIYA

    IEICE technical report. Theoretical foundations of Computing   100 ( 52 )   25 - 32   2000.5

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Private information retrieval for κ&ge;1 databases(denoted by (κ, l)-PIR)is a protocol that (1)a user sends an l tuple query to each of κ noncommunicating replicated databases;(2)each database responds the user with an answer corresponding to the l tuple query;(3)the user privately retrieve any single bit out of the n bits of data stored in κ databases. In this model, "privacy"implies that the user retrieves the bit he is interested in but releases to each database nothing about which bit he wishes to get. In general, the efficiency of (κ, l)-PIR is measured by the total amount of bits exchanged between the user and the κ databases, but few about its lower bounds are known except for restricted cases. In this paper, we classify (κ, l)-PIR into a linear type, a multilinear type, and an affine type with respect to the relationship between queries to each database(made by the user)and answers to the user(made by each database), and show that(1)the lower bound for the communication complexity of any multilinear type(κ, l)-PIR is Ω(^l+1√<n>)(Theorem3.1);(2)the lower bound for the communication complexity of any linear type(κ, l)-PIR is Ω(√<n>)(Corollary3.2);(3)the lower bound for the communication complexity of any affine type(κ, l)-PIR is Ω(^l+1√<n>)(Theorem4.2).

    CiNii Books

    researchmap

  • Approximating the Maximum Weight of Linear Codes APX-Complete

    ITOH Toshiya

    IEICE transactions on fundamentals of electronics, communications and computer sciences   83 ( 4 )   606 - 613   2000.4

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The minimum distance of a linear code C is a useful metric property for estimating the error correction upper bound of C and the maximum likelihood decoding of a linear code C is also of practical importance and of theoretical interest. These problems are known to be NP-hard to approximate within any constant relative error to the optimum. As a problem related to the above, we consider the maximization problem MAX-WEIGHT: Given a generator matrix of a linear code C, find a codeword c &isinsv;C with its weight as close to the maximum weight of C as possible. It is shown that MAX-WEIGHT&notion;PTAS unless P=NP, however, no nontrivial approximation upper and lower bounds are known. In this paper, we investigate the complexity of MAX-WEIGHTto make the approximation upper and lower bounds more precise, adn show that (1) MAX-WEIGHTis APX-complete; (2) MAX-WEIGHTis approximable within relative error 1/2 to the optimum; (3) MAX-WEIGHTis not approximabler within relative error 1/10 to the optimum unless P=NP.

    CiNii Books

    researchmap

  • New Approximation Lower Bounds for TSP with Distances One and Two

    HIRADE RYO, ITOH TOSHIYA

    IEICE technical report. Theoretical foundations of Computing   99 ( 724 )   41 - 48   2000.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The metric traveling salesman problem △-TSP is the traveling salesman problem in which the distances among cities satisfy the triangle inequality. In this paper, we consider the metric traveling salesman problem (1, 2)-TSP with distances one and two as the special case of △-TSP. Since (1, 2)-TSP is NP-complete, it is HP-hard to compute an optimal solution for (1, 2)-TSP, i. e., a minimum weight tour that visits every city exactly once. Let MIN-(1, 2)-TSP be the minimization problem for (1, 2)-TSP and we wish to compute an approximate solution for MIN-(1, 2)-TSP, i. e., a tour with weight close to the minimum weight. However MIN-(1, 2)-TSP is APX-complete, there exists a nontrivial approximation lower bound for MIN-(1, 2)-TSP. Recently, Engebretsen showed that for any ε>0, it is NP-hard to approximate the symmetric MIN-(1, 2)-TSP within 5381 / 5380-ε; it is NP-hard to approximate the asymmetric MIN-(1, 2)-TSP within 2805-2804-ε. In this paper, we improve those lower bounds above and we show that for any ε>0, it is NP-hard to approximate the symmetric MIN-(1, 2)-TSP within 1027 / 1026-ε (Corollary 4.4); it is NP-hard to approximate the asymmetric MIN-(1, 2)-TSP within 535 / 534-ε (Corollary 4.6). In addition to the above, we also show that for any ε>0, it is NP-hard to approximate SHORTEST-SUPERSTRING within 2983 / 2982-ε (Corollary 5.3).

    CiNii Books

    researchmap

  • Online Algorithms for Convex Case Capital Investment

    ITOH TOSHIYA, KAWAKAMI SHUJI

    IEICE technical report. Theoretical foundations of Computing   99 ( 724 )   33 - 40   2000.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In a factory, we need to make capital investments in machines for manufacturing a product. In this paper, we deal with the convex case capital investment such that more expensive machines have cheaper production costs. What we wish to achieve is to design a good online algorithm that minimizes the sum of the production and capital costs when the production request and investment opportunities in the future are unknown. Azar, et. al proposed an online algorithm CONVEX for the convex case capi-tal investment and showed that it is 7-competitive. In this paper, we investigate the competitive ratio of the convex case capital investment precisely and show that (1) the competitive ratio of the algorithm CONVEX is at most 4+2√<2> (Theorem 3.2); (2)for any ε>0, the competitive ratio of the algorithm CONVEX is at least 4+2√<2>-ε (Theorem 3.4); (3) for any ε>0, the competitive ratio of the convex case capital investment is at least 2-ε (Theorem 4.1). Finally, we introduce a notion of "γ-restricted" and show that (4) the competitive ratio of the algorithm CONVEX for the γ-restricted convex case cap-ital investment is at most 5+4 / (γ-4) (Theorem 5.3); (5) for any ε>0, the competitive ratio of the algorithm CONVEX for the γ-restricted case capital investment is at least 5-ε (Theorem 5.4).(

    CiNii Books

    researchmap

  • An Optimal Construction of Exactly Min-Wise Independent Permutations

    TAKEI YOSHINORI, ITOH TOSHIYA, SHINOZAKI TAKAHIRO

    IEICE technical report. Theoretical foundations of Computing   98 ( 432 )   89 - 98   1999.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A family of min-wise independent permutations C is known to be a useful tool of indexing replicated documents on the Web. For any integer n>0, a family of permutations C on{1, 2, ..., n}is said to be min-wise independent if for any(nonempty)X⊆{1, 2, ..., n}and any x∈X, Pr(min{π(X)}=π(x))=∥X∥^<-1>when π is chosen uniformly at random from C, where ∥A∥is the cardinality of a finite set A. For any integer n>0, it has been known that∥c∥>1cm(n, n-1, ..., 2, 1)=e^<n-o(n)>for any family of min-wise independent permutations C on{1, 2, ..., n}and that there exists a family of min-wise independent permutations C on{1, 2, ..., n}such that∥C∥<4^n. However, it has been unclear whether there exists a family of min-wise independent family C such that∥C∥=1cm(n, n-1, ..., 2, 1)for each integer n>0 and how to construct such a family of min-wise independent permutations C for each integer n>0 if it exists. In this paper, we shall construct a family of permutations F_n for each integer n>0 and show that F_n is min-wise independent and ∥F_n∥=1cm(n, n-1, ..., 2, 1). Thus our construction of F_n is optimal in the sense of family size.

    CiNii Books

    researchmap

  • Approximating the Maximum Weight of Linear Codes is APX-complete

    ITOH TOSHIYA

    IEICE technical report. Information theory   99 ( 56 )   1 - 8   1999.5

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The minimum distance of a linear code C is a useful metric property for estimating the error correction upper bound of C and the maximum likelihood decoding of a linear code C is also of practical and theoretical importance. These problems are known to be NP-hard and are NP-hard to approximate within any constant factor to the optimum. As a problem related to the above, we consider the maximization problem MAX-WEIGHT: Given a generating matrix of a linear code C, find a codeword c∈C with its weight as close to the maximum weight of C as possible. It is shown that MAX-WEIGHT notin PTAS unless P = NP, however, no nontrivial approximation upper and lower bounds are known. In this paper, we investigate the complexity of MAX-WEIGHT to make the approximation upper and lower bounds more precise, and then show that (1) MAX-WEIGHT is APX-compete; (2) MAX-WEIGHT is 2-approximable; and (3) MAX-WEIGHT is not (10/9)-approximable unless P = NP.

    CiNii Books

    researchmap

  • A Characterization of Min-Wise Independent Permutations Families (Models of Computation and Algorithms)

    Takei Yoshinori, Itoh Toshiya

    RIMS Kokyuroku   1093   68 - 73   1999.4

     More details

    Language:English   Publisher:Kyoto University  

    CiNii Books

    researchmap

  • A Polynomial Time Sampling Algorithm for an Optimal Family of Min-Wise Independent Permutations (Models of Computation and Algorithms)

    Shinozaki Takahiro, Itoh Toshiya

    RIMS Kokyuroku   1093   74 - 80   1999.4

     More details

    Language:English   Publisher:Kyoto University  

    CiNii Books

    researchmap

  • Efficient Private Information Retrieval

    ITOH Toshiya

    IEICE Trans. Fundamentals, A   82 ( 1 )   11 - 20   1999.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Informally, private information retrieval for k≧1 databases (k-PIR) is an interactive scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, "privacy" implies that the user retrieves the bit he is interested in but releases to each database nothing about which bit he really tries to get. Chor et.al. proposed 2-PIR with communication complexity 12n^<1/3>+2 that is based on the covering codes. Then Ambainis recursively extended the scheme by Chor et. al. and showed that for each k≧2, there exists k-PIR with communication complexity at most c_k・n^<1/(2k-1)> some constant c_k>0. In this paper, we relax the condition for the covering codes and present time-efficient 2-PIR with communication complexity 12n^<1/3>. In addition, we generally formulate the recursive scheme by Ambainis and show that for each k≧4, there exists k-PIR witla communication complexity at most c'_k・n^<1/(2k-1)> for some constant c'_k≪c_k.

    CiNii Books

    researchmap

  • ID-NIKS Based on RSA Cryptosystem Is Not Secure

    ITOH TOSHIYA

    Technical report of IEICE. ISEC   98 ( 228 )   1 - 10   1998.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Identity-based noninteractive key-sharing schemes (ID-NIKS) are practical crypto-graphic tools to make key management tasks easier in large-scale networks. Several ID-NIKS's have been proposed so far, but most of them are proved to be insecure when sufficiently many entities conspire. Recently, Murakami, Fujikawa, and Kasahara presented a new ID-NIKS based on the RSA cryptosystem and mentioned that it is secure even when sufficiently many entities conspire. The ID-NIKS looks secure, but its security analysis only deals with several potential attacks and would be logically insufficient. In this paper, we analyze the security of the scheme and show that (1) any single entity can factor the public modulus ; (2) if three entities conspire, they can impersonate a specific entity ; (3) if n entities conspire, they can impersonate any other entity ; and (4) if n entities conspire, they can derive the trusted center's secret-key that might be different from but is equivalent to the original secret-key of the trusted center.

    CiNii Books

    researchmap

  • Efficient Private Information Retrieval

    ITOH TOSHIYA

    Technical report of IEICE. ISEC   98 ( 48 )   49 - 60   1998.5

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Private information retrieval for k&ges;1 databases (k-PIR) is a scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, "privacy"implies that the user retrieves the bit he is interested in but releases to each database nothing about which bit he really tries to get. Chor et. al. proposed 2-PIR with communication complexity 12n^<1/3>+2 that is based on the covering codes. Then Ambainis recursively extended the scheme by Chor et. al. and showed that for each k&ges;2, there exists k-PIR with communication complexity at most c_k・n^<1/(2k-1)> some constant c_k&ges;0. In this paper, we relax the condition for the covering codes and present time-efficient 2-PIR with communication complexity 12n^<1/3>. In addition, we generally formulate the recursive scheme by Ambainis and show that for each k&ges;4, there exists k-PIR with communication complexity at most c^l_k・n^<1/(2k-1)> for some constant c^l_k≪c_k.

    CiNii Books

    researchmap

  • Approximating Radius and Covering Radius of Nonlinear Codes Is Hard

    ITOH TOSHIYA

    Technical report of IEICE. ISEC   97 ( 612 )   103 - 114   1998.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    For a code C over GF(2), the radius and covering radius of C are useful metric properties of C and play important roles in the analysis of C.In general, the decision problem for the radius and covering radius of C is computationally hard.Indeed, the decision problem for the covering radius of linear codes over GF(2)is Il^p_<2->complete and the decision problems for the radius and covering radius of nonlinear general (not necessarily linear)codes over GF(2)is NP-complete. In this paper, we first formalize those decision problems for the radius and covering radius of codes over GF(2)as minimization problems, i.e., MINIMUM RADIUS and MINIMUM COVERING RADIUS of codes over GF(2), respectively.Then we show that MINIMUM RADIUS and MINIMUM COVERING RADIUS of codes over GF(2)are hard to approximate within any constant ratio unless P=NP.

    CiNii Books

    researchmap

  • On the Oracle Entropy and the Average Case Oracle Measure of Knowledge Complexity

    ITOH Toshiya

    IEICE transactions on fundamentals of electronics, communications and computer sciences   80 ( 1 )   90 - 97   1997.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we investigate statistical and perfect Knowledge Complexity (KC) with respect to oracle entropy and average case oracle measures. As main results, we show the following: (1) for any k(n) ≧1/poly(n), if a language L has perfect KC k(n) + n^<-ω(1)> with respect to oracle entropy measure, then L has perfect KC k(n) with respect to oracle entropy measure (Theorem 3.1); (2) for any k(n) ≧1/poly(n), if a language L has perfect KC k(n) + n^<-ω(1)> with respect to average case oracle measure, then L has perfect KC k(n) with respect to average case oracle measure (Theorem 3.2); (3) if a language L has statistical KC k(n) ∈ o(1) with respect to oracle entropy measure, then for any ε> 0, L has statistical KC k(n) + 1 +ε with respect to average case oracle measure (Theorem 4.1); and (4) if a language L has perfect KC k(n) ∈ o(1) with respect to oracle entropy measure, then for any ε > 0, L has perfect KC k(n) + 2 + ε with respect to average case oracle measure (Theorem 4.2).

    CiNii Books

    researchmap

  • On the Power of Self-Testers and Self-Correctors

    MORI HIROYOSHI, ITOH TOSHIYA

    Technical report of IEICE. ISEC   95 ( 240 )   75 - 86   1995.9

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A checker, a self-tester, and a self-corrector for a function f are known as powerful tools in designing programs that compute f, however, the relationships among them have not been known well. In this paper, we show first that (1) if oneway permutations exist, then there exists a language L that has a checker but does not have a self-corrector. We then introduce a novel notion of "self-improvers" that transform a faulty program into a less faulty program, and show that (2) if a function f has self-tester/corrector pair, then f has a self-improver. As the applications of self-improvers, we finally show that (3) if a function f has a self-tester/corrector pair, then f has a flexible self-tester and (4) if a function f has a self-tester/corrector pair, then f has a self-improver that transforms a faulty program into an almost correct program.

    CiNii Books

    researchmap

  • On the Oracle Entropy and the Average Case Oracle Measure of Knowledge Complexity

    ITOH TOSHIYA

    Technical report of IEICE. ISEC   95 ( 172 )   1 - 17   1995.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we investigate statistical and perfect Knowledge Complexity(KC) with respect to oracle entropy and average case oracle measures. As main results, we show the following : (1)for any k(n)&ge;1/poly(n), if a language L has perfect KC k(n)+n^<-w(1)> with respect to oracle entropy measure, then L has perfect KC k(n) with respect to average case oracle measure (Theorem 3.1) ; (2)for any k(n)&ge;1/poly(n), if a language L has perfect KC k(n)+n^<-w(1)> with respect to average case oracle measure, then L has perfect KC k(n) with respect to average case oracle measure (Theorem 3.2) ; (3)if a language L has statistical KC k(n)∈o(1) with respect to oracle entropy measure, then for any ∈>0, L has statistical KC k(n)+1+∈ with respect to average case oracle measure (Theorem 4.1) ; and (4) if a language L has perfect KC k(n)∈o(1) with respect to oracle entropy measure, then for any c>0, L has perfect KC k(n)+2+∈ with respect to average case oracle measure (Theorem 4.2).

    CiNii Books

    researchmap

  • Alternative Necessary and Sufficient Conditions for Collision Intractable Hashing

    ITOH Toshiya, HAYASHI Kei

    IEICE transactions on fundamentals of electronics, communications and computer sciences   78 ( 1 )   19 - 26   1995.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Damgard defined the notion of a collision intractable hash functions and showed that there exists a collection of collision intractable hash functions if there exists a collection of claw-free permutation pairs. For a long time, the necessary and sufficient condition for the existence of a collection of collision intractable hash functions has not been known, however, very recently Russell finally showed that there exists a collection of collision intractable hash functions iff there exists a collection of claw-free pseudo-permutation pairs. In this paper, we show an alternative necessary and sufficient condition for the existence of a collection of collision intractable hash functions, i.e., there exists a collection of collision intractable hash functions iff there exists a collection of distinction intractable pseudo-permutations.

    CiNii Books

    researchmap

  • Language Dependent Secure Bit Commitments

    Itoh Toshiya, Ohta Yuji, Shizuya Hiroki

    Technical report of IEICE. ISEC   94 ( 137 )   11 - 22   1994.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper,we define two classes of languages,one induces opaque, transparent bit commitments and the other induces transparent/opaque bit commitments.As an application of the opaque/ transparent and the transparent/opaque properties,we first show that if a language L indnces an opaque/transparent bit commitment, then there exists a prover-practical perfect zero-knowledge proof for L,and we then show that if a language L induces a transparent/ opaque bit commitment,then there exists a bounded round perfect zero-knowledge proof for L.

    CiNii Books

    researchmap

  • On checkers, Self-Testers, and Self-Debuggers

    Mori Hiroyoshi, Itoh Toshiya

    RIMS Kokyuroku   871   138 - 144   1994.5

     More details

    Language:English   Publisher:Kyoto University  

    CiNii Books

    researchmap

  • Simulating Fair Dice with a Small Set of Rationally Biased Coins

    Itoh Toshiya, Mochiduki Takahiro

    RIMS Kokyuroku   871   130 - 137   1994.5

     More details

    Language:English   Publisher:Kyoto University  

    CiNii Books

    researchmap

  • Demonstrating Possession without Revealing Factors (Special Section on Cryptography and Information Security)

    Shizuya Hiroki, Koyama Kenji, Itoh Toshiya

    IEICE transactions on fundamentals of electronics, communications and computer sciences   77 ( 1 )   39 - 46   1994.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper presents a zero-knowledge interactive protocol that demonstrates two factors a and b of a composite number n (=ab) are really known by the prover, without revealing the factors themselves. Here the factors a and b need not be primes. The security of the protocol is based on the difficulty of computing discrete logarithms modulo a large prime.

    CiNii Books

    researchmap

  • A Note on AM Languages Outside NP &xcup; co-NP (Special Section on Cryptography and Information Security)

    Shizuya Hiroki, Itoh Toshiya

    IEICE transactions on fundamentals of electronics, communications and computer sciences   77 ( 1 )   65 - 71   1994.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper we investigate the AM languages that seem to be located outside NP &xcup; co-NP. We give two natural examples of such AM languages, GIP and GH, which stand for Graph Isomorphism Pattern and Graph Heterogeneity, respectively. We show that the GIP is in &xutri;^2&xcap; AM &xcap; co-AM but is unlikely to be in NP &xcup; co-NP, and that GH is in &xutri;^2&xcap; AM but is unlikely to be in NP &xcup; co-AM. We also show that GIP is in SZK. We then discuss some structural properties related to those

    CiNii Books

    researchmap

  • CRYPTO'93 Program(Preliminary)

    Itoh Toshiya

    Technical report of IEICE. ISEC   93 ( 208 )   83 - 86   1993.8

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This article reponts the papers presented in Crypto′93.

    CiNii Books

    researchmap

  • A Simple Construction for a Family of Collision Intractable Hash Functions

    ITOH Toshiya, TAKEDA Makoto

    The Transactions of the Institute of Electronics,Information and Communication Engineers. A   76 ( 6 )   844 - 849   1993.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Fast Algorithms for Finite Fields and Modular Operations

    ITOH Toshiya, SAKO Kazue

    IPSJ Magazine   34 ( 2 )   170 - 179   1993.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00004334/

  • On the Complexity of Composite Numbers (Special Section on Cryptography and Information Security)

    Itoh Toshiya, Horikawa Kenji

    IEICE transactions on fundamentals of electronics, communications and computer sciences   76 ( 1 )   23 - 30   1993.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Given an integer N, it is easy to determine whether or not N is prime, because a set of primes is in ZPP. Then given a composite number N, is it easy to determine whether or not N is of a specified form? In this paper, we consider a subset of odd composite numbers +1MOD4 (resp. +3MOD4), which is a subset of odd composite numbers consisting of prime factors congruent to 1 (resp. 3) modulo 4, and show that (1) there exists a four move (blackbox simulation) perfect ZKIP for the complement of +1MOD4 without any unproven assumption; (2) there exists a five move (blackbox simulation) perfect ZKIP for +1MOD4 without any unproven assumption; (3) there exists a four move (blackbox simulation) perfect ZKIP for +3MOD4 without any unproven assumption; and (4) there exists a five move (blackbox simulation) statistical ZKIP for the complement of +3MOD4 without any unproven assumption. To the best of our knowledge, these are the first results for a language L that seems to be not random self-reducible but has a constant move blackbox simulation perfect or statistical ZKIP for L and L^^-without any unproven assumption.

    CiNii Books

    researchmap

  • Zero-Knowledge Proof and Complexity Theory

    SHIZUYA HIROKI, ITOH TOSHIYA, SAKURAI KOUICHI

    IPSJ Magazine   32 ( 6 )   p673 - 681   1991.6

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00004661/

  • How Intractable is the Modified Chosen Discrete Logarithm Assumption ?

    ITOH Toshiya, HOSOKAWA Tomomi

    The Transactions of the Institute of Electronics,Information and Communication Engineers. A   75 ( 4 )   801 - 805   1991.4

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • MODIFIED ID-BASED CRYPTOSYSTEM USING DISCRETE LOGARITHM PROBLEM - COMMENT

    S TSUJII, T ITOH, H TANAKA

    ELECTRONICS LETTERS   25 ( 1 )   77 - 78   1989.1

     More details

    Language:English  

    Web of Science

    researchmap

  • 有限体上の2次方程式を解く効率的な確率的アルゴリズム

    伊東 利哉

    電子情報通信学会論文誌 A 基礎・境界   71 ( 1 )   p95 - 101   1988.1

     More details

    Language:Japanese   Publisher:電子情報通信学会基礎・境界ソサイエティ  

    CiNii Books

    researchmap

▼display all

Research Projects

  • Computational Complexity of Minimum Description Size Problems

    Grant number:18H04090  2018.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

      More details

    Grant amount:\38480000 ( Direct Cost: \29600000 、 Indirect Cost:\8880000 )

    researchmap

  • Exploring the Limits of Computation from the Statistical Physics

    Grant number:24106008  2012.6 - 2017.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research on Innovative Areas (Research in a proposed research area)

    Watanabe Osamu, KABASHIMA Yoshiyuki, HUKUSHIMA Koji, Krzakala Florent, Zdeborova Lenka, Zhou Haijun

      More details

    Grant amount:\81120000 ( Direct Cost: \62400000 、 Indirect Cost:\18720000 )

    We investigated computational problems studied in the statistical physics for developing a new approach in computational complexity theory. We examined a framework proposed in the statistical physics for understanding the computational hardness transition phenomena, and we discovered and mathematically proved a new type of hardness transition, which lead us to propose a new and robust framework for investigating the computational hardness transitions. This framework can be used as a new basis of discussing the security of cryptographic primitives. We also studied the structure of solutions and the number of solutions of various computational problems that have been discussed in the statistical physics, and found several fundamental properties for developing efficient algorithms for solving these problems.

    researchmap

  • 代教的および確率的手法による離散構造の限界の究明

    Grant number:16092205  2004 - 2007

    日本学術振興会  科学研究費助成事業  特定領域研究

    伊東 利哉, 上野 修一

      More details

    Grant amount:\13800000 ( Direct Cost: \13800000 )

    本研究では、代数的手法および確率的手法を用いて、置換族の構成、電子商取引、 VLSI計算、可逆計算、および耐故障計算などに関する離散構造の限界を解明した、置換族の構成に関しては、電子文書間の高速な類似性ツールとして応用が知られているκ限定ε近似的最小値独立置換族Fに対して、一般分布上で定義される置換族Fを行列Uにより定式化し、その行列Uの階数を評価することにより置換族Fのサイズの良好な下界を導出した。電子商取引に関しては、最適選好マッチング問題において、顧客集合が複数の重み付きグループに分割されているとき、顧客数n商品数mの比に関して、乱択化最適選好マッチングが存在するためのほほ合致する上界と下界を導出した(これは、既に知られている顧客集合が1つグループである場合の乱択化最適選好マッチングが存在するための顧客数nと商品数mの比に関する上界・下界の拡張である)。まだ、商品価格設定問題に関しては、正価格モデルおよび無損失割引モデルにおいて見積価格が制限された場合に対して、確率的手法を用いることで,グラフ価格設定問題・線状高速道路問題・環状高速道路問題の良好な近似アルゴリズムを提案した。VLSI計算に関しては、3次元チャネル配線問題がNP困難であることを明らかにした。可逆計算に関しては、可逆回路の縮退故障に対する最小完全テスト集合生成問題がNP困難であることを示した。耐故障計算に関しては、様々なネ ットワークに対して効率的な確率的耐故障ネットワークを構成する統一的な手法を提案した。

    researchmap

  • A Distributed Local Identification Scheme Based on Zero-Knowledge Proofs

    Grant number:15300015  2003 - 2005

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    ITOH Toshiya, YAMAOKA Katsunori, KAKUTA Mitsugu

      More details

    Grant amount:\16300000 ( Direct Cost: \16300000 )

    In distributed network systems, it is practical to establish authentication schemes for a group of users. This enables the system to realize a mechanism by which is discriminates users by authentication, and permits them to use the computing and/or network resources.
    In this research, we proposed a new distributed local identification scheme that achieves such a mechanism, i.e., scheme that is based on zero-knowledge proofs. To show the availability of the proposed scheme, we also discuss a scheme based on public-key cryptosystems and compare the performance of the two systems. We first design those two distributed local identification schemes and then analyze the performance of these schemes with respect to security level, time complexity, communication complexity, and space complexity, to verify the availability of the scheme based on zero-knowledge proofs. By the analysis, we observe that for the scheme based on zero-knowledge proofs, the communication complexity is dominant of the overall performance but for the scheme based on public-key cryptosystems, the time complexity is dominant of the overall performance. As a result, we show that the scheme based on zero-knowledge proofs is more advantageous than the scheme based on public-key cryptosystems, especially when a broadband network is accessible.

    researchmap

  • Research on flexible cryptosystem

    Grant number:11694140  1999 - 2000

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B).

    TADA Mitsuru, SAKURAI Koichi, ITO Toshiya, SHINODA Yoichi

      More details

    Grant amount:\5700000 ( Direct Cost: \5700000 )

    In this reseach, we have proposed & threshold (secret sharing) scheme, in which without reconstructing the system, one can efficiently and securely update the parameter such as the threshold and the number of the members. With Tamura et. al., we have presented a threshold scheme with parameter changeability, in which the systems before and after such a update keep the perfect security. But that system requires much amount of information which should be distributed using secure channels. With Meda et. al., we have constructed a threshold scheme with threshold changeability, in which the amount of information which should be securely distributed, can be decreased, though the perfect security is lost,
    With Okamoto et. al, we have modified "Okamoto-Tanaka key-exchange scheme (OT scheme)" so that we can update a key without reconstructing the system. Also we have estimated the security of the modified system. With Kim et. al., we have given the proof for the security of OT scheme against various types of active attacks.
    With Burmester et. al., we have proposed "an order-specified multisignature scheme", and given a proof of the security of the scheme. With Minato et. al., we have proposed "a multisignature with signers' intensions", and given a proof of the security of the scheme.
    With Koide et. al., we have proposed an e-cash system, in which even if the secret key of the bank leaks, the bank can dinstinguish a valid coin with a coin forged using the leaked secret key.

    researchmap

  • プログラムの正当性の確率的検証法に関する基礎的研究

    Grant number:07650457  1995

    日本学術振興会  科学研究費助成事業  一般研究(C)

    伊東 利哉

      More details

    Grant amount:\1600000 ( Direct Cost: \1600000 )

    これまでにchecker,self-tester及びself-correctorに関して-(1)関数fがcheckerを持つならば,任意の0<δ【less than or equal】1に対してfは(1,δ)-self-testerを持つ;(2)任意の0【less than or equal】ε_1<ε_2【less than or equal】ε【less than or equal】1に対して,関数fが(ε_1,ε_2)-self-testerとε-self-correctorを持つならば,任意の0<δ【less than or equal】1に対してfは(0,δ)-self-testerを持つ-が知られている.関数fに対して(ε_1,ε_2)-self-testerを設計する際に-(a)要求されるプログラム品質に応じてε_1は任意の設定できること;(b)self-testerの信頼性の意味から|ε_1-ε_2|はできるだけ小さな値をとるいこと-が実用上重要である.従って上記の結果(2)は,δ【similar or equal】0とすることで要求事項(b)は満たすが,本質的に要求事項(a)は満たしていないことが分かる.
    そこで本研究では,先ず上記の結果(1)に関連して「関数fがcheckerを持つならば,任意の0<ε【less than or equal】1に対してfはε-self-correctorを持つか?」という問題を提起し,以下のような
    主要結果1:一方向性置換が存在するならば,checkerを持つが,任意の0<ε【less than or equal】1に対してε-self-correctorを持たないような関数f
    次に要求事項(a)及び(b)を満たすようなself-testerの構成法を確立するために,“self-improver"という新しい概念を提案し,それに基づいて以下のような結果を導出した.
    主要結果2:任意の0<ε´_1<ε´_2【less than or equal】ε´<1に対して,関数fが(ε´_1,ε´_2)-self-testerとε´-self-correctorを持つならば,ε_1【less than or equal】ε´を満たす任意の0<ε_1<ε_2【less than or equal】1に対して,fは(ε_1,ε_2)-self-testerを持つ,
    主要結果3:任意の0<ε´_1<ε´_2【less than or equal】ε´<1に対して,関数fが(ε´_1,ε´_2)-self-testerとε´-self-correctorを持つならば,δ【less than or equal】ε´を満たす任意のδ>0に対して,fは(ε´,δ)-self-improverを持つ.

    researchmap

  • プログラム・チェッカーに関する基礎的研究

    Grant number:06650440  1994

    日本学術振興会  科学研究費助成事業  一般研究(C)

    伊東 利哉

      More details

    Grant amount:\1200000 ( Direct Cost: \1200000 )

    静的なプログラム・チェッカーが構成可能な関数fのクラスは,"関数制限対話型証明"を用いることで特徴付られることが知られている.この特徴付けは,関数fに対するプログラムP_fが静的に動作するという条件に強く依存しており,同様な方法でこれを動的なプログラム・チェッカーが構成可能な関数fのクラスの特徴付けに拡張することは極めて困難である.
    そこで我々は,動的なプログラム・チェッカーが構成可能な関数のクラスを特徴付けるために,(1)最も自然な計算モデルとして"競合的対話型証明"を取り上げ;(2)競合的対話型証明を"関数型"競合的対話型証明に変換する手法-より具体的には,競合的対話型証明における証明者が言語Lに問い合わせる質問を検証者に代行させ,証明者は言語Lの所属問題のみに対してその解を返すというプロトコル変化-を開発した.そしてこの関数型競合的対話型証明を用いることで,動的なプログラム・チェッカーが構成可能な言語Lのクラスは,言語Lとその補言語L^^-がともに関数型競合的対話型証明を持つことであることを明らかにした.
    ここで,静的なプログラム・チェッカーを持つことが動的なプログラム・チェッカーを持たない関数fの存在が考えられることから,そのような関数fに対して動的なプログラム・チェッカーが構成可能となるような新しい計算モデル-関数fに対する動的なプログラムP_fのコピーをk【greater than or equal】2個用意し,関数fに対するプログラム・チェッカーC_fがそのk【greater than or equal】2個のプログラムP_fをサブルーチンとする-を導入した.そしてこのモデル上で,動的なプログラム・チェッカーが構成可能な言語のクラスの特徴付け-(3)全ての静的なプログラム・チェッカーが構成可能な言語に対して,k【greater than or equal】2個のプログラムを持つ動的なプログラム・チェッカーが構成可能であること;(4)関数fに対し,k【greater than or equal】2個のプログラムを持つ動的なプログラム・チェッカーC_f存在するならば,2個のプログラムを持つ動的なプログラム・チェッカーC'_fが存在すること-を与え,上記のモデルの

    researchmap

  • ID情報を公開鍵とする新しい暗号通信方式に関する研究

    Grant number:63550246  1988

    日本学術振興会  科学研究費助成事業  一般研究(C)

    辻井 重男, 伊東 利哉, 植松 友彦

      More details

    Grant amount:\2100000 ( Direct Cost: \2100000 )

    申請者らが提案しているID情報を公開鍵とする暗号通信方式に関して、その信頼性について詳細な検討を行うとともに、その信頼性の向上及び処理速度の高速化について考察した。
    申請者らが提案しているID情報を公開鍵とする暗号通信方式は、有限体GF(P)上で構成されるEl-Gamalの公開鍵暗号方式に基づいて構成される。まず、信頼できるセンターを仮定する。センターはセンター秘密〓を生成し、各エンティティ、IDに対応し、そのエンティティの秘密鍵Sを生成し秘密に配送する。また、センターはセンター秘密〓より、gai(modP)(g:GF^*(p)の生成元)をシステム全体に公開する。以下、各エンティティはセンターと通信することなく、任意のエンティティに対して、El-Gamalの公開鍵暗号方式を用いて暗号通信をすることができる。
    ID情報を公開鍵とする暗号方式の場合、センターの秘密情報が各エンティティに配付されているため、複数のエンティティが結託し、各々の秘密鍵からセンターの秘密情報を算出することが可能となる場合がある。この点に関し、本システムはエンティティの結託に対し有限のしきい値があることが今回の検討で明らかになった。一方、本システムを整数環Zn(N=pq,p,q:素数)上で構成する方式を提案し、その信頼性を検討した結果、若干そのしきい値が向上することが明らかとなった。さらに、局番概念を導入することで、そのしきい値が局番数に比例して増加すること、また同時に、処理速度の高速化が可能となること等が明らかとなった。

    researchmap

  • ID情報を公開鍵とする新しい暗号通信方式に関する研究

    Grant number:62550236  1987

    日本学術振興会  科学研究費助成事業  一般研究(C)

    辻井 重男, 伊東 利哉, 植松 友彦

      More details

    Grant amount:\1900000 ( Direct Cost: \1900000 )

    申請者らが提案しているID情報と公開鍵とする暗号通信方式に関して, その信頼性について詳細な検討を行うとともに, その信頼性の向上及び処理速度の高速化について考察した.
    申請者らが提案しているID情報を公開鍵とする暗号通信方式は, 有限体GF(P)上で構成されるElgamalの公開鍵暗号方式に基づいて構成される. まず, 信頼できるセンターを仮定する. センターはセンタ秘密aを生成し, 各エンティティのIDに対応し, そのエンティティの秘密鍵Sを隠密に配送する. またセンターはセンター秘密aからg^<ai>(modP)(g:GF(P)の原始根)をシステム全体に公開する. 以下, 各エンティティはセンターと通信することなく, 任意のエンティティとElGamalの公開鍵暗号方式を用いて, 暗号通信をすることができる.
    ID情報を公開鍵とする暗号通信方式の場合, センターa秘密情報が各エンティティに配付されているため, 数エンティティが結託し, 各々の秘密鍵からセンターの秘密情報を算出することが可能となる場合がある. この点に関し, 本システムはエンティティの結託に対し有限のしきい値があることが今回の検討で明らかになった. これに対し, 本システムを整数環Z_NCN=Pg, Pg:素数)上で構成する方式を提案し, その信頼性を検討した結果, 若干そのしきい値が向上することが明らかとなった. さらに, 局番の概念を導入することで, そのしきい値が局番数に比例して増加すること, また同時に処理速度の高速化が可能となること等が明らかとなった.

    researchmap

▼display all

Other

  • 関心のあるテーマ [3]

     More details

    private information retrieval protocols

    researchmap

  • 関心のあるテーマ [1]

     More details

    popular matchings

    researchmap

  • 関心のあるテーマ [2]

     More details

    min-wise independent permutations

    researchmap

  • 関心のあるテーマ [4]

     More details

    locally decodable codes

    researchmap

  • 関心のあるテーマ [5]

     More details

    online algorithms

    researchmap