• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Koga Hiroki  古賀 弘樹

ORCIDConnect your ORCID iD *help
… Alternative Names

KOGA Hiroki  古賀 弘樹

Less
Researcher Number 20272388
Other IDs
Affiliation (Current) 2022: 筑波大学, システム情報系, 教授
Affiliation (based on the past Project Information) *help 2018 – 2022: 筑波大学, システム情報系, 教授
2015 – 2016: 筑波大学, システム情報系, 教授
2011 – 2014: 筑波大学, システム情報系, 准教授
2007 – 2010: University of Tsukuba, 大学院・システム情報工学研究科, 准教授
2006: 筑波大学, 大学院システム情報工学研究科, 助教授 … More
2004 – 2005: 筑波大学, 大学院・システム情報工学研究科, 助教授
2003: 筑波大学, 機能工学系, 助教授
1999 – 2002: 筑波大学, 機能工学系, 講師
1995 – 1998: 東京大学, 大学院・工学系研究科, 助手 Less
Review Section/Research Field
Principal Investigator
Fundamental theory of informatics / 情報通信工学 / Theory of informatics / Basic Section 60010:Theory of informatics-related
Except Principal Investigator
計測・制御工学 / 情報通信工学 / Communication/Network engineering / Basic Section 12030:Basic mathematics-related
Keywords
Principal Investigator
符号化定理 / 秘密鍵暗号 / 秘密分散法 / 一般情報源 / 電子指紋符号 / 不正者特定 / 結託耐性符号 / 情報源符号化 / 情報スペクトル / 視覚暗号 … More / 視覚復号型秘密分散法 / (k,n)しきい値法 / 情報理論 / コンテンツ保護 / 電子透かし / 容量公式 / 認証符号 / 秘密分散 / 機密保持通信 / シャノンの暗号システム / 一様乱数 / 同音異義符号化 / シャノン理論 / 乱数生成 / コントラスト最適化 / 視覚複号型秘密分散法 / (k, n)しきい値法 / 情報理論的暗号理論 / 情報理論的安全性 / 確率的符号器 / 電子指紋 / 著作権保護 / 容量 / 情報セキュリティ / 結託体制符号 / インタリーブ攻撃 / 同時容量 … More
Except Principal Investigator
ロボット / 多端子情報理論 / 情報源符号化定理 / 非線形回路理論 / 手先技量 / インピーダンス概念 / 受動性 / 非線形制御 / ロボットの腕 / ロボットハンド / 三角形型通信システム / 多端子通信システム / レイトひずみ理論 / 共通情報量 / 符号木 / FV 符号 / 一般情報源 / 同期系列 / データ圧縮 / 暗号システム / T-Code / Complexity / 放送型暗号 / T-code / 乱数検定 / 木符号 / スプレイ / 多分木 / Move-To-Front法 / 反辞書法 / 情報セキュリティ / 機械系 / インピーダンス制御 / 非線形回路 / 重力 / 摩擦フリーロボット / 慣性法則ロボット / インピーダンス・マッチング / 超安定ブロック / インピーダンス・マッチンング / Robot / Mechanical System / Impedance Control / Nonlinear Circuit / Inertia-only Robot / Gravity / Friction-free Robot / Impedance Matching / Hyper-stable Block / シャノン理論 / Slepiun-Wolfシステム / 双方向通信システム / Slepian-Wolfシステム / source coding theorem / Shannon theory / multi-terminal information theory / Slepian-Wolf system / two-way channel / incidence matrix / sparse / fingerprinting / group testing / aulti-access channel / multi-access channel / AMD code / BCH code / multi-acces channel / locally reparable code / multi-access / inciedence matrix Less
  • Research Projects

    (15 results)
  • Research Products

    (77 results)
  • Co-Researchers

    (16 People)
  •  Construction of a Robust Algorithm for Identification of All Malicious Users of a Digital Fingerprinting Code and Characterization of the Joint CapacityPrincipal Investigator

    • Principal Investigator
      Koga Hiroki
    • Project Period (FY)
      2018 – 2021
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60010:Theory of informatics-related
    • Research Institution
      University of Tsukuba
  •  Analysis and Construction of Combinatorial Structures with Sparse Incidence Matrices

    • Principal Investigator
      繆 いん
    • Project Period (FY)
      2018 – 2022
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 12030:Basic mathematics-related
    • Research Institution
      University of Tsukuba
  •  Developments of the Capacity Formula and Identification Algorithms for a Catch-All Digital Fingerprinting CodePrincipal Investigator

    • Principal Investigator
      KOGA Hiroki
    • Project Period (FY)
      2014 – 2016
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Theory of informatics
    • Research Institution
      University of Tsukuba
  •  Construction and Performance Analysis of Digital Fingerprinting Code with Identifiability of All Malicious UsersPrincipal Investigator

    • Principal Investigator
      KOGA Hiroki
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      University of Tsukuba
  •  Coding Theorems for Information-Theoretically Secure Systems with Stochastic EncodersPrincipal Investigator

    • Principal Investigator
      KOGA Hiroki
    • Project Period (FY)
      2008 – 2010
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      University of Tsukuba
  •  Analysis of Coding Tree Characteristics and its Applications to Data Compression and Cryptosystems

    • Principal Investigator
      YAMAMOTO Hirosuke
    • Project Period (FY)
      2005 – 2008
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Communication/Network engineering
    • Research Institution
      The University of Tokyo
  •  計算量的に効率のよい秘密分散法の実現に関する研究Principal Investigator

    • Principal Investigator
      古賀 弘樹
    • Project Period (FY)
      2005 – 2007
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      University of Tsukuba
  •  最適性をもつ視覚復号型秘密分散法の代数的な構成法に関する研究Principal Investigator

    • Principal Investigator
      古賀 弘樹
    • Project Period (FY)
      2003 – 2004
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      University of Tsukuba
  •  一般情報源を一様乱数に変換する方法およびその暗号への適用に関する研究Principal Investigator

    • Principal Investigator
      古賀 弘樹
    • Project Period (FY)
      2001 – 2002
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      情報通信工学
    • Research Institution
      University of Tsukuba
  •  一般情報源をもつシャノンの暗号システムに対する符号化定理に関する研究Principal Investigator

    • Principal Investigator
      古賀 弘樹
    • Project Period (FY)
      1999 – 2000
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      情報通信工学
    • Research Institution
      University of Tsukuba
  •  秘密鍵暗号系に基づく認証システムに関する符号化定理Principal Investigator

    • Principal Investigator
      古賀 弘樹
    • Project Period (FY)
      1997 – 1998
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      情報通信工学
    • Research Institution
      The University of Tokyo
  •  Research on source coding theorems for a multi-terminal communication system with a two-way channel

    • Principal Investigator
      YAMAMOTO Hirosuke
    • Project Period (FY)
      1997 – 1998
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      情報通信工学
    • Research Institution
      The University of Tokyo
  •  三角形型通信システムに対するレイトひずみ理論に関する研究

    • Principal Investigator
      YAMAMOTO Hirosuke
    • Project Period (FY)
      1996
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      情報通信工学
    • Research Institution
      The University of Tokyo
  •  Control of Advanced Mechatronics Systems by Means of Nonlinear Circuit Theory

    • Principal Investigator
      ARIMOTO Suguru
    • Project Period (FY)
      1996
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      計測・制御工学
    • Research Institution
      University of Tokyo
  •  非線形回路理論の展開による手先技量の力学的理解と制御

    • Principal Investigator
      ARIMOTO Suguru
    • Project Period (FY)
      1995
    • Research Category
      Grant-in-Aid for General Scientific Research (B)
    • Research Field
      計測・制御工学
    • Research Institution
      The University of Tokyo

All 2021 2020 2019 2018 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 Other

All Journal Article Presentation

  • [Journal Article] Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security2021

    • Author(s)
      K. Sekine and H. Koga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: vol E104-A Issue: 9 Pages: 1235-1244

    • DOI

      10.1587/transfun.2020dmp0010

      10.1587/transfun.2020DMP0010

    • NAID

      130008081883

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11151, KAKENHI-PROJECT-18H01133
  • [Journal Article] Coding Theorems on Digital Fingerprinting Coding under Informed and Uninformed Setups2021

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proceedings of 2021 IEEE Information Theory Workshop (ITW 2021)

    • DOI

      10.1109/itw48936.2021.9611451

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Journal Article] Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes2020

    • Author(s)
      Hiroki Koga
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 61-65

    • DOI

      10.34385/proc.65.A01-13

    • NAID

      230000012551

    • ISSN
      2188-5079
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Journal Article] An Ideal Secret Sharing Scheme Realizing an Access Structure Based on a Finite Projective Plane of Order 32020

    • Author(s)
      Yohei Ookawa and Hiroki Koga
    • Journal Title

      Proceedings of 2020 International Symposium on Information Theory

    • DOI

      10.1109/isit44484.2020.9174121

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Journal Article] A Lower Bound on the Joint Capacity of Digital Fingerprinting Codes Using Score Functions Based on Log-Likelihood Ratio2018

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proceedings of 2018 IEEE International Symposium on Information Theory

    • DOI

      10.1109/isit.2018.8437922

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Journal Article] New Fundamental Properties on a Secret-key Cryptosystem under Guessing Secrecy Criteria2016

    • Author(s)
      Shota Kamiya and Hiroki Koga
    • Journal Title

      Proceedings of 2016 Information Theory and its Applications

      Volume: -

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Journal Article] A Higher Order Analysis of the Joint Capacity of Digital FIngerprinting Codes against the Interleaving Attack2016

    • Author(s)
      Hiroki Koga and Kaoru Itabashi
    • Journal Title

      Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security

      Volume: -

    • DOI

      10.1145/2909827.2930788

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Journal Article] A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack2016

    • Author(s)
      Hiroki Koga and Kaoru Itabashi
    • Journal Title

      Proceedings of ACM Workshop on Information Hiding and Multimedia Security

      Volume: --

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Journal Article] On a Partition of a Finite Set and its Relationships to Encoding Tasks and the Renyi Entropy2015

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proceedings of 2015 IEEE International Symposium on Information Theory

      Volume: --

    • DOI

      10.1109/isit.2015.7282696

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Journal Article] On the capacity and the zero-error capacity of k-resilient AND anti-collusion codes2014

    • Author(s)
      Hiroki Koga
    • Journal Title

      2014 IEEE Information Theory Workshop

      Volume: 1 Pages: 177-181

    • DOI

      10.1109/itw.2014.6970816

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Journal Article] Characterization of the Smooth Renyi Entropy Using Majorization2013

    • Author(s)
      H. Koga
    • Journal Title

      Proc. 2013 IEEE Information Theory Workshop

      Pages: 604-608

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Journal Article] Characterization of the Smooth Renyi Entropy Using Majorization2013

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proceedings of 2013 IEEE Information Theory Workshop

      Volume: なし

    • DOI

      10.1109/itw.2013.6691332

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Journal Article] On the Role of Mutual Information between the Shares in a Robust Secret Sharing Scheme2012

    • Author(s)
      H. Koga and K. Koyano
    • Journal Title

      Proc. 2012 International Symposium on Information Theory

      Pages: 260-265

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Journal Article] On the Role of Mutual Information between the Shares in a Robust Secret Sharing Scheme2012

    • Author(s)
      H. Koga and K. Koyano
    • Journal Title

      Proc. 2012 International Symposium on Information Theory and its Applications

      Volume: DVD

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Journal Article] Four Limits in Probability and Their Roles in Source Coding2011

    • Author(s)
      Hiroki Koga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 11 Pages: 2073-2082

    • DOI

      10.1587/transfun.e94.a.2073

      10.1587/transfun.E94.A.2073

    • NAID

      10030191410

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Journal Article] A Digital Fingerprinting Code Based on a Projective Plane with Identifiability of All Malicious Users2011

    • Author(s)
      Hiroki Koga, Yusuke Minami
    • Journal Title

      IECIE Trans. Fundamentals vol.E94-A

      Pages: 223-232

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] A Digital Fingerprinting Code Based on a Projective Plane with Identifi ability of All Malicious Users2011

    • Author(s)
      Hiroki Koga, Yusuke Minami
    • Journal Title

      IEICE Trans.on Fundamentals.

      Volume: E94-A Pages: 223-232

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] A Simple Secret Sharing Scheme Using a Key and its Security against Substitution of Shares2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2010 IEEE International Symposium on Information Theory

      Volume: CD-ROM Pages: 2483-2487

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] Two Generalizations of a Coding Theorem for a (2, 2)-Threshold Scheme with a Cheater2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2010 International Symposium on Information Theory and its Applications

      Volume: CD-ROM Pages: 678-683

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] Two Generalizations of a Coding Theorem for a (2,2)-Threshold Scheme with a Cheater2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2010 International Symposium on Information Theory and its Applications, Taichung

      Pages: 678-683

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] A Simple Secret Sharing Scheme Using a Key and its Security against Substitution of Shares2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.International Symposium on Information Theory Austin

      Pages: 2483-2487

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] New Coding Theorems for Fixed-Length Source Coding and Shannon's Cipher System with a General Source2008

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc. International Symposium on Information Theory and its Applications

      Pages: 251-256

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] Coding Theoremson the Threshold Scheme for a General Source2008

    • Author(s)
      Hiroki koga
    • Journal Title

      IEEE Transactions on Information Theony vol.54,n06(To appear)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17700005
  • [Journal Article] New Coding Theorems for Fixed-Length Source Coding and Shannon's Cipher System with a General Source2008

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.International Symposium on Information Theory and its Applications Auckland

      Pages: 251-256

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] Basic Properties of Complete Complementary Codes Using the DFT Matrices and Kronecker Products2008

    • Author(s)
      Yi Jin and Hiroki Koga
    • Journal Title

      Proc. International Symposium on Information Theory and its Applications

      Pages: 887-892

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] Basic Properties of Complete Complementary Codes Using the DFT Matrices and Kronecker Products2008

    • Author(s)
      Yi Jin, Hiroki Koga
    • Journal Title

      Pro.International Symposium on Information Theory and its Applications Auckland

      Pages: 887-892

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Journal Article] Proposal of an Asyrptotically Contrast-Ideal (t_rn)-Threshold Visual Secret Sharing Scheme2006

    • Author(s)
      H.Koga, E.Veda
    • Journal Title

      Proc.2006 IEEE International Symposium on Information Theory

      Pages: 912-916

    • Data Source
      KAKENHI-PROJECT-17700005
  • [Journal Article] Baste Properties of the(tu)-Threshold Visual : Secret sharing, Scheme with Perfect Recorstruction of Black Pixels2006

    • Author(s)
      H.Koga, E.Veda
    • Journal Title

      Desigus, Codes, and Cryptography vol.40,no.2

      Pages: 81-102

    • Data Source
      KAKENHI-PROJECT-17700005
  • [Journal Article] Asymptotic properties on the codeword lengths of optimal FV cods for general sources2005

    • Author(s)
      H. Koga, H. Yamamoto
    • Journal Title

      IEICE Transactions on Fundamentals vol.51, no.4

      Pages: 1546-1555

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17360174
  • [Journal Article] Goding Theorems on the Threshold Schome for a General Source2005

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Cryptography

      Pages: 67-72

    • Data Source
      KAKENHI-PROJECT-17700005
  • [Journal Article] On an Upper Bound of the Secrecy Capacits for a General Wiretop Channel2005

    • Author(s)
      Hiroki Koga, Naoki Sato
    • Journal Title

      Proc.2005 IEEE International Symposium on Information Theory

      Pages: 1641-1645

    • Data Source
      KAKENHI-PROJECT-17700005
  • [Journal Article] Coding theorems on Secret Sharing Schemes for a General Source with the Strong Converse Proputy2004

    • Author(s)
      H.Koga, T.Ooishi
    • Journal Title

      Proc.of 2004 International Symposium an Information Theory and Its Applications

      Pages: 1104-1109

    • Data Source
      KAKENHI-PROJECT-15700006
  • [Journal Article] The Optimal (t,n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels2004

    • Author(s)
      H.Koga, E.Ueda
    • Journal Title

      Proc.of 4-th Asian-European Workshop or Information Theory

      Pages: 45-48

    • NAID

      10014281283

    • Data Source
      KAKENHI-PROJECT-15700006
  • [Presentation] シェアの回転により複数の秘密画像を復元できる視覚暗号の最適な構成法2021

    • Author(s)
      関根恭平,古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] 1ビットの秘密情報に対する秘密分散法に同値な条件とその拡張2021

    • Author(s)
      岡村亮,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Presentation] Coding theorems on the simple capacity for digital fingerprinting codes2020

    • Author(s)
      H. Koga
    • Organizer
      2020 International Symposium on Information Theory and Its Applications (ISITA 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] Optimal basis matrices of a visual cryptography scheme with meaningful shares and analysis of its security2020

    • Author(s)
      K. Sekine, H. Koga
    • Organizer
      2020 International Symposium on Information Theory and Its Applications (ISITA 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] New constructions of an evolving 2-threshold scheme based on binary or D-ary prefix codes2020

    • Author(s)
      R. Okamura, H. Koga
    • Organizer
      2020 International Symposium on Information Theory and Its Applications (ISITA 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] An ideal secret sharing scheme realizing an access structure based on a finite projective plane of order 32020

    • Author(s)
      Y. Okawa, H. Koga
    • Organizer
      2020 IEEE International Symposium on Information Theory (ISIT2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] あるEvolving型アクセス構造のクラスに対する秘密分散法の最適性について2019

    • Author(s)
      古賀弘樹
    • Organizer
      第41回情報理論とその応用シンポジウム
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] 参加者が多いいくつかのアクセス構造に対する秘密分散法の 最悪情報レートについて2019

    • Author(s)
      久留嵩史,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会 IT2018-120
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] 電子指紋符号の同時ユニバーサル容量の下界の導出2019

    • Author(s)
      古賀弘樹
    • Organizer
      第11回シャノン理論ワーウショップ
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Presentation] 電子指紋符号の単純容量に関する符号化定理2019

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Presentation] 拡張型視覚暗号における整数計画法を用いた最適な基本行列の構成2019

    • Author(s)
      関根恭平, 古賀弘樹
    • Organizer
      第42回情報理論とその応用シンポジウム2019
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] 位数3の有限射影平面に基づくアクセス構造に対する理想的な秘密分散法2019

    • Author(s)
      大川耀平, 古賀弘樹
    • Organizer
      第42回情報理論とその応用シンポジウム2019
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] A construction of the (4,n)-threshold visual cryptography using a 3-design2018

    • Author(s)
      Koutaro Okada, Hiroki Koga
    • Organizer
      The 2018 International Symposium on Information Theory and Its Applications (ISITA2018)
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] 混合型の攻撃に対する電子指紋符号の同時容量の評価2018

    • Author(s)
      關根達也,古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Data Source
      KAKENHI-PROJECT-18K11151
  • [Presentation] A construction of secret sharing schemes with threshold 3 for countably infinite participants2018

    • Author(s)
      Takashi Hisatome, Hiroki Koga
    • Organizer
      The 2018 International Symposium on Information Theory and Its Applications (ISITA2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H01133
  • [Presentation] インタリーブ攻撃に対する電子指紋符号の同時容量の評価2016

    • Author(s)
      古賀弘樹,板橋薫
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      電気通信大学(東京都調布市)
    • Year and Date
      2016-03-10
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Presentation] 連続分布に基づき符号語が生成される電子指紋符号の容量の下界について2015

    • Author(s)
      古賀弘樹,板橋薫
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      京都国際交流会館(京都府京都市)
    • Year and Date
      2015-05-21
    • Data Source
      KAKENHI-PROJECT-26330003
  • [Presentation] 定常性を仮定しない確率的な電子指紋符号の性能に関する一考察2014

    • Author(s)
      金井紘平,古賀弘樹
    • Organizer
      電子情報通信学会
    • Place of Presentation
      名古屋大学
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 定常性を仮定しない確率的な電子指紋符号の性能に関する一考察2014

    • Author(s)
      金井紘平, 古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      名古屋大学, 愛知県
    • Year and Date
      2014-03-11
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 不正者の対称性のもとでの確率的な電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹,児矢野和也
    • Organizer
      電子情報通信学会
    • Place of Presentation
      芦原温泉 まつや千千
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] (k,n)しきい値法における多数決を用いた不正検出方式とその性能評価2013

    • Author(s)
      島崎憲明,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      関西学院大学
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 不正者の対称性のもとでの電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹,児矢野和也
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      まつや千千
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 不正者の対称性のもとでの確率的な電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹, 児矢野和也
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      あわら温泉まつや千千, 福井県
    • Year and Date
      2013-05-24
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 確率的攻撃モデルにおけるBoneh-Shaw 符号の不正者追跡アルゴリズム2012

    • Author(s)
      金井紘平, 古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      豊田工業大学, 愛知県
    • Year and Date
      2012-07-19
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 確率的攻撃モデルにおけるBoneh-Shaw符号の不正者追跡アルゴリズム2012

    • Author(s)
      金井紘平,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      豊田工業大学
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] なりすまし攻撃を検出できる(k,n)しきい値法の構成とその最適性2012

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報学会2012年総合大会
    • Place of Presentation
      岡山大学(岡山県)
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 4種類の確率的極限と情報源符号化2011

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      奈良学セミナーハウス
    • Year and Date
      2011-01-18
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 4種類の確率的極限と情報源符号化2011

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会,IT2010-60
    • Place of Presentation
      国際奈良学セミナーハウス
    • Year and Date
      2011-01-18
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 情報スペクトルの幅と固定長符号化の最悪冗長度2011

    • Author(s)
      古賀弘樹, 有村光晴, 岩田賢一
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      大阪大学吹田キャンパス
    • Year and Date
      2011-03-03
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 確率的電子指紋符号の性能に関する情報理論的考察2011

    • Author(s)
      児矢野和也, 古賀弘樹
    • Organizer
      第34回情報理論とその応用シンポジウム
    • Place of Presentation
      鶯宿温泉ホテル森の風, 岩手県
    • Year and Date
      2011-12-02
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] 情報スペクトルの幅と固定長符号の最悪冗長度2011

    • Author(s)
      古賀弘樹, 有村光晴, 岩田賢一
    • Organizer
      電子情報通信学会情報理論研究会,IT2010-83
    • Place of Presentation
      大阪大学
    • Year and Date
      2011-03-03
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 確率的電子指紋符号の性能に関する情報理論的考察2011

    • Author(s)
      児矢野和也,古賀弘樹
    • Organizer
      情報理論とその応用シンポジウム
    • Place of Presentation
      ホテル森の風(岩手県)
    • Data Source
      KAKENHI-PROJECT-23500004
  • [Presentation] On the Necessary Conditions for Identification of all the Malicious Users by a Digital Watermarking Code Based on a Projective Plane2010

    • Author(s)
      Hiroki Koga
    • Organizer
      第33回情報理論とその応用シンポジウム
    • Place of Presentation
      信州松代ロイヤルホテル
    • Year and Date
      2010-12-01
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] On the Necessary Conditions for Identification of all the Malicious Users by a Digital Watermarking Code Based on a Projective Plane2010

    • Author(s)
      古賀弘樹
    • Organizer
      第33回情報理論とその応用シンポジウム予稿集,pp.426-431
    • Place of Presentation
      信州松代ロイヤルホテル
    • Year and Date
      2010-12-01
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] AND攻撃に耐性をもつ詰託耐性符号の容量について2010

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] AND攻撃に耐性をもつ結託耐性符号の容量について2010

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会,IT2009-110
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] BIBDを用いた結託耐性符号の基礎的性質2009

    • Author(s)
      南祐典・古賀弘樹
    • Organizer
      第32回情報理論とその応用シンポジウム
    • Place of Presentation
      ホテルかめ福(山口県)
    • Year and Date
      2009-12-03
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 不正者全員を特定できるアフィン平面を利用した結託耐性符号の一構成法2009

    • Author(s)
      南佑典, 古賀弘樹
    • Organizer
      2009年暗号と情報セキュリティシンポジウム,IDI-1
    • Place of Presentation
      大津プリンスホテル
    • Year and Date
      2009-01-20
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 情報スペクトル的手法の発展とその秘密分散法への応用(招待講演)2009

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      ホテルかめ福(山口県)
    • Year and Date
      2009-12-01
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] BIBDを用いた結託耐性符号の基礎的性質2009

    • Author(s)
      南佑典, 古賀弘樹
    • Organizer
      第32回情報理論とその応用シンポジウム予稿集,pp.532-537
    • Place of Presentation
      山口湯田温泉ホテルかめ福
    • Year and Date
      2009-12-03
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 不正者全員を特定できるアフィン平面を利用した結託耐性符号の一構成法2009

    • Author(s)
      南佑典、古賀弘樹
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      大津プリンスホテル (滋賀県大津市)
    • Year and Date
      2009-01-20
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 情報スペクトル的手法の発展とその秘密分散法への応用2009

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会,IT2009-47,(招待講演)
    • Place of Presentation
      山口湯田温泉ホテルかめ福
    • Year and Date
      2009-12-01
    • Data Source
      KAKENHI-PROJECT-20500004
  • [Presentation] 複数,画像と復元できる視覚復号型(2,2)秘密分散法,提案2007

    • Author(s)
      坂本木志・古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      神戸大学
    • Year and Date
      2007-07-20
    • Data Source
      KAKENHI-PROJECT-17700005
  • [Presentation] 連続分布に基づき符号語が生成される電子指紋符号の容量の下界について

    • Author(s)
      板橋薫,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      京都市国際交流会館(京都)
    • Year and Date
      2015-05-21 – 2015-05-22
    • Data Source
      KAKENHI-PROJECT-26330003
  • 1.  YAMAMOTO Hirosuke (30136212)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 1 results
  • 2.  ARIMOTO Suguru (00029399)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 3.  ARIMURA Mitsuharu (80313427)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 4.  NANIWA Tomohide (40231493)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  小川 朋宏 (00323527)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 6.  繆 いん (10302382)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 7.  三嶋 美和子 (00283284)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 8.  盧 暁南 (10805683)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 9.  LU SHAN (30755385)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 10.  神保 雅一 (50103049)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 11.  澤 正憲 (50508182)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 12.  鎌部 浩 (80169614)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 13.  HAMANO Kenji
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 14.  TANGUCHI Elliot
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 15.  SUIMON Yoshiyuki
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 16.  TASHIRO Yusuke
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results

URL: 

Are you sure that you want to connect your ORCID iD to this researcher?
* This action can be performed only by the researcher themselves.

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi