研究者業績

萩原 学

ハギワラ マナブ  (Manabu Hagiwara)

基本情報

所属
千葉大学 大学院理学研究院 教授 (2020/06/01~)
学位
博士(数理科学)(東京大学)

研究者番号
80415728
J-GLOBAL ID
201801014798025618
researchmap会員ID
B000318413

外部リンク

出身:栃木県足利市
趣味:テレビ&映画鑑賞、クラフトビール、世界遺産

関係ないと思われている概念と概念、分野と分野などを結び付ける研究を心がけています。
また、他の人にはできない(他の人には興味が湧かないわけかも知れませんが)手法や視点での研究を心がけています。

論文

 69
  • Hironori UCHIKAWA, Manabu HAGIWARA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E108-A(3) 2024年9月  査読有り
  • K. Niki, R. Asano, R. Sakanoue, A. Hasegawa, Y. Yamada, M. Hagiwara, K. Mimura
    The Journal of Physical Chemistry A A-H 2024年3月26日  査読有り
  • Manabu HAGIWARA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Scienc 2024年  査読有り招待有り筆頭著者
  • Kazuhisa Nakasho, Manabu Hagiwara, Austin Anderson, J. B. Nation
    第46回情報理論とその応用シンポジウム予稿集 282-286 2023年11月  
  • Manabu Hagiwara, Whan-Hyuk Choi, Jon-Lark Kim
    Applicable Algebra in Engineering, Communication and Computing 2023年9月19日  査読有り筆頭著者
  • Manabu HAGIWARA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2022年9月  査読有り筆頭著者
  • Taro Shibayama, Manabu Hagiwara
    Proc. of 2022 IEEE International Symposium on Information Theory (ISIT) 2970-2975 2022年6月  査読有り
  • Hokuto Takahashi, Manabu Hagiwara
    Designs, Codes and Cryptography 284-288 2022年2月22日  査読有り
  • Taro Shibayama, Manabu Hagiwara
    2021 IEEE International Symposium on Information Theory (ISIT) 1493-1498 2021年7月12日  査読有り
  • Yeow Meng Chee, Manabu Hagiwara, Vu Van Khu
    2021 IEEE International Symposium on Information Theory (ISIT) 2792-2797 2021年7月12日  査読有り
  • Takehiko Mori, Manabu Hagiwara
    IEEE Transactions on Information Theory 67(6) 3315-3321 2021年6月  査読有り
  • Manabu Hagiwara
    IEICE Communications Express 10(5) 243-247 2021年5月1日  査読有り筆頭著者最終著者責任著者
  • Ryutaroh MATSUMOTO, Manabu HAGIWARA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E105-A(3) 2021年  査読有り
  • Ryutaroh MATSUMOTO, Manabu HAGIWARA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E104-A 1654-1664 2021年  査読有り
  • Yuki Kondo, Manabu Hagiwara, Midori Kudo
    IEICE Proceeding of ISITA2020 597-601 2020年10月  査読有り
  • Manabu Hagiwara
    IEICE Proceeding of ISITA2020 274-278 2020年10月  査読有り筆頭著者最終著者責任著者
  • Ayumu Nakayama, Manabu Hagiwara
    IEICE Proceeding of ISITA2020 329-333 2020年10月  査読有り
  • Manabu Hagiwara, Justin Kong
    Annals of Combinatorics 24 379-393 2020年6月3日  査読有り筆頭著者
  • Manabu Hagiwara, Ayumu Nakayama
    2020 IEEE International Symposium on Information Theory (ISIT) 1870-1874 2020年6月  査読有り筆頭著者
  • Takehiko Mori, Manabu Hagiwara
    Discrete Mathematics 343(6) 2020年6月  査読有り
  • Ayumu Nakayama, Manabu Hagiwara
    IEICE Communications Express 9(4) 100-104 2020年1月  査読有り
  • Takehiko Mori, Manabu Hagiwara
    Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018 1-5 2019年3月8日  
    This paper presents a formula for the cardinality of a class of BAD correcting codes proposed at ISIT2017. Furthermore, we show that the cardinality is approximately optimal. In other words, the ratio of the cardinality of the code and that of maximal cardinality BAD correcting code converges to 1 for sufficiently large length.
  • Manabu Hagiwara, Justin Kong
    Proceeding of 2018 IEEE International Symposium on Information Theory (ISIT) 81-85 2018年6月  査読有り
  • Manabu Hagiwara, Justin Kong
    DESIGNS CODES AND CRYPTOGRAPHY 85(3) 483-521 2017年12月  査読有り
    Invented in the 1960s, permutation codes have reemerged in recent years as a topic of great interest because of properties making them attractive for certain modern technological applications, especially flash memory. In 2011 a polynomial time algorithm called linear programming (LP) decoding was introduced for a class of permutation codes where the feasible set of codewords was a subset of the vertex set of a code polytope. In this paper we investigate a new class of linear constraints for matrix polytopes with no fractional vertices through a new concept called "consolidation." We then introduce a necessary and sufficient condition for which LP decoding methods, originally designed for the Euclidean metric, may be extended to provide an efficient decoding algorithm for permutation codes with the Kendall tau metric.
  • Justin Kong, Manabu Hagiwara
    IEEE International Symposium on Information Theory - Proceedings 1628-1632 2017年8月9日  査読有り
    Permutation codes, in the form of rank modulation, have shown promise for applications such as flash memory. One of the metrics recently suggested as appropriate for rank modulation is the Ulam metric. Multipermutation codes have also been proposed as a generalization of permutation codes that would improve code size. In this paper we analyze the Ulam metric in the context of multipermutations, noting similarities and differences with the Ulam metric in the context of permutations. We then consider sphere sizes for multipermutations under the Ulam metric and resulting bounds on code size.
  • Manabu Hagiwara
    Proceeding of 2017 IEEE International Symposium on Information Theory (ISIT) 1938-1942 2017年6月  査読有り
  • Kyosuke Nakano, Manabu Hagiwara
    Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016 512-516 2017年2月2日  
    In this paper, we formalize the channel capacity of the binary symmetric erasure channel (BSEC) by using a proof-assistant system called Coq/SSReflect. This study is for the formalization of the fact that the binary symmetric channel (BSC) and binary erasure channel (BEC), which were previously formalized, are specializations of the BSEC.
  • 萩原学
    応用数理 26(4) 28-33 2016年12月  査読有り招待有り
  • 萩原学
    応用数理 26(3) 125-130 2016年9月  査読有り招待有り
  • Manabu Hagiwara
    IEICE Communications Express 5(2) 49-51 2016年  査読有り
    A short proof for the s-deletion error-correction property of Helberg codes is given.
  • Manabu Hagiwara
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY 625-629 2016年  査読有り
    Classes of multi insertion/deletion error-correcting codes based on order theory and axiomatic algebra are proposed by an abstraction of Helberg's construction.
  • Manabu Hagiwara, Kyosuke Nakano, Justin Kong
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016) 522-526 2016年  査読有り
    In this paper we report on work done to formalize coding theory in the Lean theorem prover, released by Microsoft Research and Carnegie Mellon University in 2015. We formalize definitions and theorems in a downloadable library named "Cotoleta" (COding Theory Over the LEan Theorem proof Assistant). This is the first coding theory library for Lean. Our formalization includes new template-like structures for formalizing error-correcting systems. As examples, repetition codes and the Ilamming (7,4) code are formalized using these structures. The reader is assumed to have some knowledge of information and coding theory but no formalization experience is assumed.
  • Ken'ichi Kuga, Manabu Hagiwara, Mitsuharu Yamamoto
    Intelligent Computer Mathematics 9791 18-27 2016年  査読有り
    Bing's shrinking method is a key technique for constructing homeomorphisms between topological manifolds in geometric topology. Applications of this method include the generalized Schoenflies theorem, the double suspension theorem for homology spheres, and the 4-dimensional Poincare conjecture. Homeomorphisms obtained in this method are sometimes counter-intuitive and may even be pathological. This makes Bing's shrinking method a good target of formalization by proof assistants. We report our formalization of this method in Coq/Ssreflect.
  • Justin Kong, Manabu Hagiwara
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016) 691-695 2016年  査読有り
    The possibility of perfect permutation codes in the Ulam metric is explored, motivated by recent proposals of rank modulation schemes for flash memory devices. First a method of calculating sphere size of permutations under the Ulam distance utilizing Young tableaux is introduced. The nonexistence of perfect permutation codes in the Ulam metric is then proven.
  • Reynald Affeldt, Manabu Hagiwara, Jonas Sénizergues
    Journal of automated reasoning 53(1) 63-103 2014年6月  査読有り
  • Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura
    Lecture Notes in Electrical Engineering 280 277-284 2014年  査読有り
    The extraction of a stable signal from noisy data is very useful in applications that aim to combine it with a cryptographic key. An approach based on an error correcting code was proposed by Dodis et al., which is known as a fuzzy extractor. Physical unclonable functions (PUFs) generate device-specific data streams, although PUFs are noisy functions. In this paper, we describe a method for preparing a PUF key during fuzzy extractor implementation. The experimental results showed that all possible combinations of input message length and the number of correctable errors were tested for a BCH code with codeword length N, which was the length of the PUF responses. © Springer-Verlag Berlin Heidelberg 2014.
  • Ryosuke Obi, Manabu Hagiwara, Reynald Affeldt
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA) 201-205 2014年  査読有り
    Modern mathematical proofs are becoming so big that they cause a problem of trust. Formal verification using proof-assistants has recently emerged as a solution to ensure the correctness of big proofs. Before being able to verify formally big proofs one must build substantial libraries of formal definitions and formal theorems. In this paper, we explain how we contribute to an existing formalization of information theory by extending it with a foundational theorem; namely, the variable-length source coding theorem.
  • Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT) 23-26 2014年  査読有り
    Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in practice as cryptographic key generators, they need to be combined with an extraction technique to derive reliable bit strings (i.e., cryptographic key). An approach based on an error correcting code was proposed by Dodis et al. and is known as a fuzzy extractor. However, this method appears to be difficult for non-specialists to implement. In our recent study, we reported the results of some example implementations using PUF data and presented a detailed implementation diagram. In this paper, we describe a more efficient implementation method by replacing the hash function output with the syndrome from the BCH code. The experimental results show that the Hamming distance between two keys vary according to the key size and information-theoretic security has been achieved.
  • Masakazu Yoshida, Manabu Hagiwara, Takayuki Miyadera, Hideki Imai
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E95A(9) 1561-1569 2012年9月  査読有り
    Entangled states play crucial roles in quantum information theory and its applied technologies. In various protocols such as quantum teleportation and quantum key distribution, a good entangled state shared by a pair of distant players is indispensable. In this paper, we numerically examine entanglement sharing protocols using quantum LDPC CSS codes. The sum-product decoding method enables us to detect uncorrectable errors, and thus, two protocols, Detection and Resending (DR) protocol and Non-Detection (ND) protocol are considered. In DR protocol, the players abort the protocol and repeat it if they detect the uncorrectable errors, whereas in ND protocol they do not abort the protocol. We show that DR protocol yields smaller error rate than ND protocol. In addition, it is shown that rather high reliability can be achieved by DR protocol with quantum LDPC CSS codes.
  • Manabu Hagiwara, Marc PC Fossorier, Hideki Imai
    IEEE Transactions on Information Theory 58(4) 2321-2329 2012年1月  査読有り
  • Justin Kong, Manabu Hagiwara
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012) 91-95 2012年  査読有り
    In recent years permutation codes have emerged as a field of great interest with new applications being suggested. In this paper we investigate two distance metrics and their induced weight functions on subgroups of the symmetric group, S-n, of permutations on n elements. Specifically, we introduce the Euclidean weight and compare its weight distribution to that of the Kendall tau weight. Our primary contribution is to extend LP (linear programming) decoding methods invented for permutation codes endowed with a Euclidean distance metric to codes utilizing the Kendall tau distance metric.
  • Reynald Affeldt, Manabu Hagiwara
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7406 233-249 2012年  査読有り
    The most fundamental results of information theory are Shannon's theorems. These theorems express the bounds for reliable data compression and transmission over a noisy channel. Their proofs are non-trivial but rarely detailed, even in the introductory literature. This lack of formal foundations makes it all the more unfortunate that crucial results in computer security rely solely on information theory (the so-called "unconditional security"). In this paper, we report on the formalization of a library for information theory in the SSReflect extension of the Coq proof-assistant. In particular, we produce the first formal proofs of the source coding theorem (that introduces the entropy as the bound for lossless compression), and the direct part of the more difficult channel coding theorem (that introduces the capacity as the bound for reliable communication over a noisy channel). © 2012 Springer-Verlag.
  • Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa
    IEEE Transactions on Information Theory 58(2) 1223-1230 2011年9月  査読有り
  • Tadashi Wadayama, Manabu Hagiwara
    IEEE International Symposium on Information Theory - Proceedings 58(8) 139-143 2011年  査読有り
    A set of linearly constrained permutation matrices are proposed for constructing a class of permutation codes. Making use of linear constraints imposed on the permutation matrices, we can formulate a minimum Euclidian distance decoding problem for the proposed class of permutation codes as a linear programming (LP) problem. The main feature of this novel class of permutation codes, called LP decodable permutation codes, is this LP decodability. It is demonstrated that the LP decoding performance of the proposed class of permutation codes is characterized by the vertices of the code polytope of the code. In addition, based on a probabilistic method, several theoretical results for randomly constrained permutation codes are derived. © 2011 IEEE.
  • Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT) 653-657 2011年  査読有り
    In this paper, we propose a construction method for two-level quantum error-correcting codes via non-binary LDPC codes over an extended field of order 2(p), p an integer p > 1. The proposed quantum error-correcting codes are based on binary quasi-cyclic LDPC codes which have almost achieved a "Bounded Distance Decoding (BDD)" limit but have not surpassed the limit yet. Quantum codes constructed from the proposed method surpass the BDD limit. Furthermore the codes outperform the efficiently-decodable state-of-the-art quantum codes.
  • Manabu Hagiwara, Kenta Kasai, Hideki Imai, Kohichi Sakaniwa
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT) 638-642 2011年  査読有り
    For designing low-density parity-check (LDPC) codes for quantum error-correction, we desire to satisfy the conflicting requirements below simultaneously. 1) The row weights of parity-check "should be large": The minimum distances are bounded above by the minimum row weights of parity-check matrices of constituent classical codes. Small minimum distance tends to result in poor decoding performance at the error-floor region. 2) The row weights of parity-check matrices " should not be large": The performance of the sum-product decoding algorithm at the water-fall region is degraded as the row weight increases. Recently, Kudekar et al. showed spatially-coupled (SC) LDPC codes exhibit capacity-achieving performance for classical channels. SC LDPC codes have both large row weight and capacity-achieving error-floor and water-fall performance. In this paper, we propose a new class of quantum LDPC codes based on spatially coupled quasi-cyclic LDPC codes. The performance outperforms that of quantum "non-coupled" quasi-cyclic LDPC codes.
  • Manabu Hagiwara, Marc P. C. Fossorier, Takashi Kitagawa, Hideki Imai
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E92A(11) 2891-2894 2009年11月  査読有り
    In this paper, we investigate the smallest value of p for which a (J. L. p)-QC LDPC code with girth 6 exists for J = 3 and J = 4. For J = 3, we determine the smallest value of p for any L. For J = 4, we determine the smallest value of p for L <= 301. Furthermore we provide examples of specific constructions meeting these smallest values of p.
  • 今井 秀樹, 萩原 学
    電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review 2(4) 9-15 2009年  
    符号理論はディジタル情報の信頼性確保のために不可欠な理論であり,現在の情報化社会を支える基盤理論の一つである.この理論は約60 年前に米国で生まれたが,日本でもこの時期から符号理論の研究が行われていた.しかし,研究者が増え,国際的に認められる研究成果が出るようになったのは40~50 年前のことである.それには,この研究を米国で始めた方々の帰国とW. W. Peterson の著書の影響が大きい.このころ,日本において現在につながる符号理論研究の原点が形成されたといってよいだろう.その後,特に符号理論の応用の面で日本は世界を先導する役割も担ってきた.この間,符号理論は何度かの大きな変革を経ながら,その応用範囲を拡大しつつ発展を続けてきている.本稿では,このような符号理論の流れを日本の視点から俯瞰する.

MISC

 28
  • 萩原 学
    電子情報通信学会誌 = The journal of the Institute of Electronics, Information and Communication Engineers 94(4) 341-343 2011年4月1日  
  • 笠井 健太, 萩原 学, 今井 秀樹, 坂庭 好一
    電子情報通信学会技術研究報告. IBISML, 情報論的学習理論と機械学習 = IEICE technical report. IBISML, Information-based induction sciences and machine learning 110(265) 135-145 2010年10月28日  
    量子誤り訂正は,量子状態を確実に保存し高信頼度で通信すること,つまり量子計算および量子通信を実現するために必要な技術である.量子LDPC符号は,味なパリティ検査方程式によって定義された,古典LDPC符号に対応する量子誤り訂正符号である.CSS(Calderbank, Shor and Steane)符号は,量子誤り訂正符号の重要な符号クラスである.本研究では,有限体上で定義されたLDPC符号を用いたCSS符号を提案している.この提案符号は,限界距離復号法の性能限界を超えた復号性能を有し,従来知られている最良の量子誤り訂正符号に比べて2倍の誤りを訂正することが可能である.
  • 吉田 雅一, 萩原 学, 宮寺 隆之, 今井 秀樹
    電子情報通信学会技術研究報告. IT, 情報理論 110(205) 51-56 2010年9月14日  
    量子通信などで重要な役割を果たすのがエンタングルド状態である.通信路に雑音が加わる場合でも,そのエンタングルド状態を二者間で共有する技術がエンタングルメント蒸留プロトコルである.本論文において量子誤り訂正符号の持つ誤り検出符号としての機能を用い高い信頼性を実現するエンタングルメント蒸留プロトコルのシミュレーションによる性能評価を行う.
  • Manabu Hagiwara, Marc P. C. Fossorier, Hideki Imai
    IEEE International Symposium on Information Theory - Proceedings 784-788 2010年  
    In this paper, we introduce the concept of correctable error set for the BSC, which allows to generalize sum-product decoding for this channel. As a result, better error performance or faster convergence can be achieved. Furthermore, the correctable error set allows to evaluate the error performance of generalized sum-product decoding with a given iteration number for the BSC. © 2010 IEEE.
  • 山川 茂紀, 崔 洋, 萩原 学, 古原 和邦, 今井 秀樹
    電子情報通信学会技術研究報告. ISEC, 情報セキュリティ 108(473) 537-543 2009年3月2日  
    現在広く使われているRSA暗号やElGamal暗号といった公開鍵暗号は,将来的に量子計算機の攻撃に耐えられなくなると考えられている.そのなかで,1978年に提案されたMcEliece暗号方式が量子計算機の攻撃に耐えうる可能性をもつ公開鍵暗号として見直されてきている.2001年にはGoppa符号を用いた現実的なMcEliece(CFS)署名方式がCourtoisらによって提案されたが,この署名方式には公開鍵のサイズが極めて大きくなってしまうという問題があった.この問題を解決するためにLDPC符号を用いることが考えられるが,LDPC符号を用いたMcEliece署名方式の実用性や安全性に関する研究はこれまでに報告されていない.本稿では,署名・検証に要する計算量と既存の攻撃に対する耐性を評価することで,LDPC符号を用いたMcEliece署名方式の実用性と安全性について検討する.

書籍等出版物

 3

講演・口頭発表等

 17

共同研究・競争的資金等の研究課題

 12