• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Multi-user quantum network

Research Project

Project/Area Number 23246071
Research Category

Grant-in-Aid for Scientific Research (A)

Allocation TypeSingle-year Grants
Section一般
Research Field Communication/Network engineering
Research InstitutionNagoya University

Principal Investigator

HAYASHI Masahito  名古屋大学, 多元数理科学研究科, 教授 (40342836)

Co-Investigator(Kenkyū-buntansha) 小川 朋宏  電気通信大学, 情報システム学研究科, 准教授 (00323527)
松本 隆太郎  東京工業大学, 理工学研究科, 准教授 (10334517)
石坂 智  広島大学, 総合科学研究科, 教授 (10443631)
小柴 健史  埼玉大学, 理工学研究科, 准教授 (60400800)
西村 治道  名古屋大学, 情報科学研究科, 准教授 (70433323)
渡辺 峻  徳島大学, ソシオテクノサイエンス研究部, 助教 (70546910)
Project Period (FY) 2011-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥48,620,000 (Direct Cost: ¥37,400,000、Indirect Cost: ¥11,220,000)
Fiscal Year 2015: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2014: ¥9,360,000 (Direct Cost: ¥7,200,000、Indirect Cost: ¥2,160,000)
Fiscal Year 2013: ¥9,490,000 (Direct Cost: ¥7,300,000、Indirect Cost: ¥2,190,000)
Fiscal Year 2012: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2011: ¥11,570,000 (Direct Cost: ¥8,900,000、Indirect Cost: ¥2,670,000)
Keywords量子情報 / 情報理論的安全性 / 秘匿依頼計算 / 安全性評価 / 有限長評価 / ハッシュ関数 / 秘匿性増強 / 測定型量子計算 / 精度保証 / 盗聴通信路モデル / ネットワーク符号 / エンタングル状態 / 局所ユニタリ / エンタングル状態変換 / 秘匿情報検索 / 量子対話型証明系 / 量子秘密分散 / 量子ブラインド計算 / アンシラ駆動測定型 / 認証 / 状態変換 / )量子セキュリティ / マルチユーザ型ネットワーク / レニーエントロピー / 量子対話型証明 / 縮約密度行列 / スワップ操作 / 通信路 resolvability / 盗聴通信路 / 放送型通信路 / ユニバーサル符号 / 量子ネットワーク符号 / 汎用ブラインド計算
Outline of Final Research Achievements

We have studied quantum communication technology on a multi-user network. Especially, we have studied the information theoretic security based on quantum communication technology because its realization is not easy for existing communication technology. The information theoretic security is usually realized by privacy amplification based on a code. We have clarified the effect by the finiteness of the length of the code while it had not been studied sufficiently. Further, we have investigated the blind computation based on quantum communication, which enables the client to ask the server the difficult computation without informing the server the knowledge of the request, whose security can be guaranteed information theoretically. We have derived the formula for guaranteeing the correctness of the computation result with a given significance level.

Report

(6 results)
  • 2016 Final Research Report ( PDF )
  • 2015 Annual Research Report
  • 2014 Annual Research Report
  • 2013 Annual Research Report
  • 2012 Annual Research Report
  • 2011 Annual Research Report
  • Research Products

    (217 results)

All 2017 2016 2015 2014 2013 2012 Other

All Int'l Joint Research (6 results) Journal Article (66 results) (of which Int'l Joint Research: 8 results,  Peer Reviewed: 66 results,  Acknowledgement Compliant: 43 results,  Open Access: 1 results) Presentation (144 results) (of which Int'l Joint Research: 19 results,  Invited: 34 results) Book (1 results)

  • [Int'l Joint Research] National University of Singapore(Singapore)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] The University of Sydney(Australia)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] The University of Hong Kong/Beihang University(China)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] University of Cologne(Germany)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] University of California(米国)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research]

    • Related Report
      2015 Annual Research Report
  • [Journal Article] Finite-length Analysis on Tail probability for Markov Chain and Application to Simple Hypothesis Testing2017

    • Author(s)
      S. Watanabe and M. Hayashi
    • Journal Title

      Annals of Applied Probability

      Volume: 印刷中

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Equivocations, Exponents, and Second-Order Coding Rates Under Various Renyi Information Measures2017

    • Author(s)
      M. Hayashi, and V. Y. F. Tan,
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 63 Issue: 2 Pages: 975-1005

    • DOI

      10.1109/tit.2016.2636154

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Second-Order Asymptotics of Conversions of Distributions and Entangled States Based on Rayleigh-Normal Probability Distributions2017

    • Author(s)
      W. Kumagai, and M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 63 Issue: 3 Pages: 1829-1857

    • DOI

      10.1109/tit.2016.2645223

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Random Number Conversion and LOCC Conversion via Restricted Storage,” IEEE Transactions on Information Theory2017

    • Author(s)
      W. Kumagai, and M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 63 Issue: 4 Pages: 2504-2532

    • DOI

      10.1109/tit.2017.2657514

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Finite-block-length analysis in classical and quantum information theory2017

    • Author(s)
      M. Hayashi
    • Journal Title

      Proceedings of the Japan Academy, Series B

      Volume: 93 Issue: 3 Pages: 99-124

    • DOI

      10.2183/pjab.93.007

    • NAID

      130005440129

    • ISSN
      0386-2208, 1349-2896
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Measurement-based formulation of quantum heat engine2017

    • Author(s)
      M. Hayashi, and H. Tajima
    • Journal Title

      Physical Review A

      Volume: 95 Issue: 3 Pages: 032132-032132

    • DOI

      10.1103/physreva.95.032132

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state2017

    • Author(s)
      M. Hayashi, and M. Owari
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 63 Issue: 6 Pages: 4008-4036

    • DOI

      10.1109/tit.2017.2687932

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages2017

    • Author(s)
      Ryutaroh Matsumoto and Masahito Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 63

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Discrimination power of a quantum detector2017

    • Author(s)
      Christoph Hirche, Masahito Hayashi, Emilio Bagan, and John Calsamiglia,
    • Journal Title

      Physical Review Letters

      Volume: 印刷中

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] List Decoding Algorithm based on Voting in Grobner Bases for General One-Point AG Codes2017

    • Author(s)
      R. Matsumoto, D. Ruano, and O. Geil
    • Journal Title

      Journal of Symbolic Computation

      Volume: 79 Pages: 384-410

    • DOI

      10.1016/j.jsc.2016.02.015

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Universal steering criteria2016

    • Author(s)
      H. Zhu, M. Hayashi, and L. Chen
    • Journal Title

      Phys. Rev. Lett.

      Volume: 116 Issue: 7 Pages: 070403-070403

    • DOI

      10.1103/physrevlett.116.070403

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Optimal decoy intensity for decoy quantum key distribution2016

    • Author(s)
      M. Hayashi
    • Journal Title

      Journal of Physics A:

      Volume: 49 Issue: 16 Pages: 165301-165301

    • DOI

      10.1088/1751-8113/49/16/165301

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses2016

    • Author(s)
      M. Hayashi, S. Watanabe
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 62 Issue: 4 Pages: 1795-1822

    • DOI

      10.1109/tit.2016.2530084

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function2016

    • Author(s)
      M. Hayashi, T. Tsurumaru
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 62 Issue: 4 Pages: 2213-2232

    • DOI

      10.1109/tit.2016.2526018

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Security analysis of epsilon-almost dual universal2 hash functions: smoothing of min entropy vs. smoothing of Renyi entropy of order 22016

    • Author(s)
      M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 62 Issue: 5 Pages: 3451-3476

    • DOI

      10.1109/tit.2016.2530088

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Key Agreement: General Capacity and Second-Order Asymptotics2016

    • Author(s)
      M. Hayashi, Himanshu Tyagi, and S. Watanabe
    • Journal Title

      Transactions on Information Theory

      Volume: 62 Issue: 7 Pages: 3796-3810

    • DOI

      10.1109/tit.2016.2567440

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Information Geometry Approach to Parameter Estimation in Markov Chains2016

    • Author(s)
      M. Hayashi, S. Watanabe
    • Journal Title

      Annals of Statistics

      Volume: 44 Issue: 4 Pages: 1495-1535

    • DOI

      10.1214/15-aos1420

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Fourier Analytic Approach to Quantum Estimation of Group Action2016

    • Author(s)
      M. Hayashi
    • Journal Title

      Communications in Mathematical Physics

      Volume: 347 Issue: 1 Pages: 3-82

    • DOI

      10.1007/s00220-016-2738-0

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Optimal compression for identically prepared qubit states2016

    • Author(s)
      Y. Yang, G. Chiribella, and M. Hayashi
    • Journal Title

      Physical Review Letters

      Volume: 117 Issue: 9 Pages: 090502-090502

    • DOI

      10.1103/physrevlett.117.090502

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Correlation Detection and an Operational Interpretation of the Renyi Mutual Information2016

    • Author(s)
      M. Hayashi and M. Tomamichel
    • Journal Title

      Journal of Mathematical Physics

      Volume: 57 Issue: 10 Pages: 102201-102201

    • DOI

      10.1063/1.4964755

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Quantum interpretations of AWPP and APP2016

    • Author(s)
      Tomoyuki Morimae, Harumichi Nishimura
    • Journal Title

      Quantum Information and Computation

      Volume: 16 Pages: 498-514

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes2016

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science (FPS 2015)

      Volume: 9482 Pages: 117-133

    • DOI

      10.1007/978-3-319-30303-1_8

    • ISBN
      9783319303024, 9783319303031
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information2015

    • Author(s)
      M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 61 Issue: 10 Pages: 5595-5622

    • DOI

      10.1109/tit.2015.2464215

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Error-Control Coding for Physical-Layer Secrecy2015

    • Author(s)
      M. Bloch, M. Hayashi, A. Thangaraj,
    • Journal Title

      Proceedings of IEEE

      Volume: 103 Issue: 10 Pages: 1725-1746

    • DOI

      10.1109/jproc.2015.2463678

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Quantum Merlin-Arthur with Cliford Arthur2015

    • Author(s)
      T. Morimae, M. Hayashi, H. Nishimura, K. Fujii
    • Journal Title

      Quantum Information and Computation

      Volume: 15 Pages: 1420-1430

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Asymmetric Evaluations of Erasure and Undetected Error Probabilities2015

    • Author(s)
      M. Hayashi, V. Tan
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 61 Issue: 12 Pages: 6560-6577

    • DOI

      10.1109/tit.2015.2495258

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State2015

    • Author(s)
      M. Owari, M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 61 Issue: 12 Pages: 6995-7011

    • DOI

      10.1109/tit.2015.2492958

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Asymptotic compatibility between local operations and classical communication conversion and recovery2015

    • Author(s)
      K. Ito, W. Kumagai, M. Hayashi
    • Journal Title

      Phys. Rev. A

      Volume: 92 Issue: 5 Pages: 052308-052308

    • DOI

      10.1103/physreva.92.052308

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Verifiable measurement-only blind quantum computing with stabilizer testing2015

    • Author(s)
      M. Hayashi, T. Morimae
    • Journal Title

      Phys. Rev. Lett.

      Volume: 115 Issue: 22 Pages: 220502-220502

    • DOI

      10.1103/physrevlett.115.220502

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding2015

    • Author(s)
      J. Kurihara, R. Matsumoto, and T. Uyematsu
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 61 Issue: 7 Pages: 3912-3936

    • DOI

      10.1109/tit.2015.2429713

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Strong Security of the Strongly Multiplicative Ramp Secret Sharing Based on Algebraic Curves2015

    • Author(s)
      R. Matsumoto
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 7 Pages: 1576-1578

    • DOI

      10.1587/transfun.E98.A.1576

    • NAID

      130005085807

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Optimal multiple assignment scheme for strongly secure ramp secret sharing schemes with general access structures2015

    • Author(s)
      R. Matsumoto
    • Journal Title

      IEICE Communications Express

      Volume: 4 Issue: 11 Pages: 317-320

    • DOI

      10.1587/comex.4.317

    • NAID

      130005108345

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Entanglement and swap of quantum states2015

    • Author(s)
      T. Ikuto and S. Ishizaka
    • Journal Title

      Quantum Information and Computation

      Volume: 15 Pages: 0923-0931

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Secure statistical analysis using RLWE-based homomorphic encryption2015

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science (ACISP 2015)

      Volume: 9144 Pages: 471-487

    • DOI

      10.1007/978-3-319-19962-7_27

    • ISBN
      9783319199610, 9783319199627
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New packing method in somewhat homomorphic encryption and its applications2015

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Security and Communication Networks

      Volume: 8 Issue: 13 Pages: 2194-2213

    • DOI

      10.1002/sec.1164

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker2015

    • Author(s)
      Masahito Hayashi
    • Journal Title

      Communications in Mathematical Physics

      Volume: 333 Issue: 1 Pages: 335-350

    • DOI

      10.1007/s00220-014-2174-y

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Stronger Methods of Making Quantum Interactive Proofs Perfectly Complete.2015

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall and Harumichi Nishimura.
    • Journal Title

      SIAM Journal on Computing, published online

      Volume: - Issue: 2 Pages: 243-289

    • DOI

      10.1137/140971944

    • NAID

      110009779047

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Quantum strongly secure ramp secret sharing2015

    • Author(s)
      P. Zhang and R. Matsumoto
    • Journal Title

      Quantum Information Processing

      Volume: 14 Issue: 2 Pages: 715-729

    • DOI

      10.1007/s11128-014-0863-2

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Quantum Hypothesis Testing and the Operational Interpretation of the Quantum Renyi Relative Entropies2015

    • Author(s)
      Milan Mosonyi and Tomohiro Ogawa
    • Journal Title

      Communications in Mathematical Physics

      Volume: 334 Issue: 3 Pages: 1617-1648

    • DOI

      10.1007/s00220-014-2248-x

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Large deviation analysis for quantum security via smoothing of Renyi entropy of order 22014

    • Author(s)
      Masahito Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 60 Issue: 10 Pages: 6702-6732

    • DOI

      10.1109/tit.2014.2337884

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Relating different quantum generalizations of the conditional Renyi entropy2014

    • Author(s)
      Marco Tomamichel, Mario Berta, and Masahito Hayashi
    • Journal Title

      Journal of Mathematical Physics

      Volume: 55 Issue: 8 Pages: 082206-082206

    • DOI

      10.1063/1.4892761

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths2014

    • Author(s)
      M. Hayashi, and R. Nakayama
    • Journal Title

      New Journal of Physics

      Volume: 16 Issue: 6 Pages: 063009-063009

    • DOI

      10.1088/1367-2630/16/6/063009

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Asymptotic local hypothesis testing between a pure bipartite state and the completely mixed state2014

    • Author(s)
      M. Owari, M. Hayashi
    • Journal Title

      Physical review A

      Volume: 90 Issue: 3 Pages: 032327-032327

    • DOI

      10.1103/physreva.90.032327

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes2014

    • Author(s)
      O.Geil, S. Martin, R. Matsumoto, D. Ruano, Y. Luo
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 60 Issue: 10 Pages: 5938-5949

    • DOI

      10.1109/tit.2014.2345375

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Optimal axis compensation in quantum key distribution protocols over unital channels2014

    • Author(s)
      S. Watanabe, R. Matsumoto, and T. Uyematsu
    • Journal Title

      Theoretical Computer Science

      Volume: 560 Pages: 91-106

    • DOI

      10.1016/j.tcs.2014.09.020

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption2014

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 8544 Pages: 338-353

    • DOI

      10.1007/978-3-319-08344-5_22

    • ISBN
      9783319083438, 9783319083445
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] On the exact decryption range for Gentry-Halevi's Implementation of Fully Homomorphic Encryption2014

    • Author(s)
      Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba
    • Journal Title

      Journal of Mathematical Cryptology

      Volume: 8 Issue: 3 Pages: 305-329

    • DOI

      10.1515/jmc-2013-0024

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Exact computation of tail probability of hypergeometric distribution and its application to Quantum Key Distribution2014

    • Author(s)
      Kenta Sakakibara and Ryutaroh Matsumoto
    • Journal Title

      IEICE Commuications Express

      Volume: 3 Pages: 68-73

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum-information Division and an Optimal Uncorrelated Channel2014

    • Author(s)
      Yuji Sekino,Satoshi Ishizaka
    • Journal Title

      Physical Review A

      Volume: 80 Issue: 3 Pages: 34304-34304

    • DOI

      10.1103/physreva.89.034304

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Ancilla-Driven Universal Blind Quantum Computation2013

    • Author(s)
      Sueki Takahiro,Takeshi Koshiba,Tomoyuki Morimae
    • Journal Title

      Physical Review A

      Volume: 89 Issue: 6 Pages: 60301-60301

    • DOI

      10.1103/physreva.87.060301

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Gilbert-Varshamov-type bound for relative dimension length profile2013

    • Author(s)
      R.Matsumoto
    • Journal Title

      IEICE Communications Express

      Volume: 2 Issue: 8 Pages: 343-346

    • DOI

      10.1587/comex.2.343

    • NAID

      110009778008

    • ISSN
      2187-0136
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generalization of the Lee-O’Sullivan List Decoding for One-Point AG Codes2013

    • Author(s)
      R.Matsumoto,D.Ruano,and O.Geil
    • Journal Title

      Journal of Symbolic Computation

      Volume: 55 Pages: 1-9

    • DOI

      10.1016/j.jsc.2013.03.001

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Feng-Rao decoding of primary codes2013

    • Author(s)
      O.Geil.R.Matsumoto,and D.Ruano
    • Journal Title

      Finite Fields and Their Applications

      Volume: 23 Pages: 35-52

    • DOI

      10.1016/j.ffa.2013.03.005

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure Multiplex Coding Attaining Channel Capacity in Wiretap Channels2013

    • Author(s)
      Daisuke Kobayashi,Hirosuke Yamamoto and Tomohiro Ogawa
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 59 Issue: 12 Pages: 8131-8143

    • DOI

      10.1109/tit.2013.2282673

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Entanglement Concentration is Irreversible2013

    • Author(s)
      W. Kumagai, M. Hayashi
    • Journal Title

      Physical review letters

      Volume: 111(13) Issue: 13 Pages: 130407-130407

    • DOI

      10.1103/physrevlett.111.130407

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Hierarchy of Information Quantities for Finite Block Length Analysis of Quantum Tasks2013

    • Author(s)
      M. Tomamichel and M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 59 Issue: 11 Pages: 7693-7710

    • DOI

      10.1109/tit.2013.2276628

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tight exponential analysis of universally composable privacy amplification and its applications2013

    • Author(s)
      M. Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 59 Issue: 11 Pages: 7728-7746

    • DOI

      10.1109/tit.2013.2278971

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Hypothesis Testing for Gaussian States : Quantum Analogues of _X2, t-, and F-Tests2013

    • Author(s)
      Wataru Kumagai, Masahito Hayashi
    • Journal Title

      Communications in Mathematical Physics

      Volume: 318.2 Issue: 2 Pages: 535-574

    • DOI

      10.1007/s00220-013-1678-1

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Dual universality of hash functions and its applications to quantum cryptography2013

    • Author(s)
      Toyoshiro Tsurumaru and Masahito Hayashi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 99 Issue: 7 Pages: 1-1

    • DOI

      10.1109/tit.2013.2250576

    • NAID

      110008689710

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum security analysis via smoothing of Renyi entropy of order 22013

    • Author(s)
      Masahito Hayashi
    • Journal Title

      Lecture Notes in Computer Science series

      Volume: 7582 Pages: 128-140

    • DOI

      10.1007/978-3-642-35656-8_11

    • ISBN
      9783642356551, 9783642356568
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight2012

    • Author(s)
      J.Kurihara, T.Uyematsu, and R. Matsumoto
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E95.A Issue: 11 Pages: 2067-2075

    • DOI

      10.1587/transfun.E95.A.2067

    • NAID

      10031142616

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On QMA protocols with two short quantum proofs2012

    • Author(s)
      Francois Le Gall, Shota Nakagawa, and Harumichi Nishimura
    • Journal Title

      Quantum Information & Computation

      Volume: 12 Pages: 589-600

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Achieving perfect completeness in classical-witness quantum Merlin-Arthur proof systems2012

    • Author(s)
      Stephen P.Jordan, Hirotada Kobayashi, Daniel Nagaj, and Harumichi Nishimura
    • Journal Title

      Quantum Information & Computation

      Volume: 12 Pages: 461-471

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths2012

    • Author(s)
      Masahito Hayashi and Toyoshiro Tsurumaru
    • Journal Title

      New Journal of Physics

      Volume: 14 Issue: 9 Pages: 93014-93014

    • DOI

      10.1088/1367-2630/14/9/093014

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Nondistillable entanglement guarantees distillable entanglement2012

    • Author(s)
      Lin Chen and Masahito Hayashi
    • Journal Title

      International Journal of Modern Physics B

      Volume: 26 Issue: 27n28 Pages: 124300-124300

    • DOI

      10.1142/s0217979212430084

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Private and quantum capacities of more capable and less noisy quantum channels2012

    • Author(s)
      Shun Watanabe
    • Journal Title

      Physical Review A

      Volume: 85 Issue: 1

    • DOI

      10.1103/physreva.85.012326

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Presentation] Optimal compression for identically prepared qubit states2017

    • Author(s)
      Yuxiang Yang, Giulio Chiribella, and Masahito Hayashi
    • Organizer
      The 20th workshop on Quantum Information Processing (QIP 2017),
    • Place of Presentation
      Washington, Seattle, USA
    • Year and Date
      2017-01-16
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 量子情報と有限長理論の今後の展望2016

    • Author(s)
      林正人
    • Organizer
      量子情報と有限長理論の新展開
    • Place of Presentation
      名古屋大学 東山キャンパス
    • Year and Date
      2016-08-03
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] Remaining uncertainties and exponents under Renyi information measures2016

    • Author(s)
      Masahito Hayashi, Vincent Y. F. Tan
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2016),
    • Place of Presentation
      Barcelona
    • Year and Date
      2016-07-10
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Operational interpretation of Renyi conditional mutual information via composite hypothesis testing against Markov distributions2016

    • Author(s)
      Marco Tomamichel, Masahito Hayashi
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2016),
    • Place of Presentation
      Barcelona
    • Year and Date
      2016-07-10
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Measurement-based Formulation of Quantum Heat Engine2016

    • Author(s)
      Masahito Hayashi and Hiroyasu Tajima
    • Organizer
      The International Conference on Quantum Communication, Measurement and Computing (QCMC2016)
    • Place of Presentation
      Singapore
    • Year and Date
      2016-07-04
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Optimal Efficiency of Heat Engines with Finite-Size Heat Baths,2016

    • Author(s)
      Hiroyasu Tajima and Masahito Hayashi
    • Organizer
      The International Conference on Quantum Communication, Measurement and Computing (QCMC2016)
    • Place of Presentation
      Singapore
    • Year and Date
      2016-07-04
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Unitary Estimation with Resource Constraints2016

    • Author(s)
      Masahito Hayashi, Sai Vinjanampathy and Leong Chuan Kwek
    • Organizer
      The International Conference on Quantum Communication, Measurement and Computing (QCMC2016)
    • Place of Presentation
      Singapore
    • Year and Date
      2016-07-04
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Implementable quadratic enhancement in quantum metrology2016

    • Author(s)
      M. Hayashi
    • Organizer
      Hong Kong Workshop on Quantum Information and Foundations
    • Place of Presentation
      Hong Kong,
    • Year and Date
      2016-05-04
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Shannon Theoretic Analysis for Classical and Quantum Information Security2016

    • Author(s)
      M. Hayashi
    • Organizer
      Nexus of Information and Computation Theories, Secrecy and Privacy Theme,
    • Place of Presentation
      Paris, France
    • Year and Date
      2016-03-21
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 量子版NPと量子版AMの計算複雑さ2015

    • Author(s)
      西村治道
    • Organizer
      第33回量子情報技術研究会
    • Place of Presentation
      厚木
    • Year and Date
      2015-11-24
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] Classical and Quantum Information Theoretical Analysis for Security2015

    • Author(s)
      M. Hayashi
    • Organizer
      Mathematical Tools of Information-Theoretic Security Workshop
    • Place of Presentation
      Paris, France
    • Year and Date
      2015-09-23
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 量子計算量クラス-PとNPの量子版とその先2015

    • Author(s)
      西村治道
    • Organizer
      基礎物理学研究所研究会「量子制御技術の発展により拓かれる量子情報の新時 代
    • Place of Presentation
      京都
    • Year and Date
      2015-07-13
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] Measurement-based Formulation of Quantum Heat Engine and Optimal Efficiency with Finite-Size Effect2015

    • Author(s)
      M. Hayashi
    • Organizer
      Beyond I.I.D. in Information theory
    • Place of Presentation
      Banff, Canada
    • Year and Date
      2015-07-05
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Generalized Quantum Arthur-Merlin Games.2015

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall, Harumichi Nishimura
    • Organizer
      30th Conference on Computational Complexity (CCC2015)
    • Place of Presentation
      Portland, Oregon, USA
    • Year and Date
      2015-06-17
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Equivocations and Exponents under Various Renyi Information Measures2015

    • Author(s)
      Masahito Hayashi, Vincent Tan,
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Erasure and Undetected Error Probabilities in the Moderate Deviations Regime2015

    • Author(s)
      Masahito Hayashi, Vincent Tan
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] More Efficient Privacy Amplification with Less Random Seeds2015

    • Author(s)
      Masahito Hayashi, Toyohiro Tsurumaru
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Correlation Detection and an Operational Interpretation of the Renyi Mutual Information2015

    • Author(s)
      Masahito Hayashi, Marco Tomamichel
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state2015

    • Author(s)
      Masahito Hayashi, Mwari Owari
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Key rate of the B92 quantum key distribution protocol with finite qubits2015

    • Author(s)
      H. Sasaki, R. Matsumoto, and T. Uyematsu
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Information Geometry Approach to Estimation and Hypothesis Testing for Markov Chains2015

    • Author(s)
      M. Hayashi
    • Organizer
      A Symposium on the History of Functional Analysis
    • Place of Presentation
      Xi'an, China
    • Year and Date
      2015-05-08
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Quantum Bloom Filter2015

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Workshop on Secure Quantum Computing
    • Place of Presentation
      東京大学 (東京都文京区)
    • Year and Date
      2015-03-19
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Quantum Renyi divergences and large deviation theorems2015

    • Author(s)
      Tomohiro Ogawa
    • Organizer
      QI Workshop
    • Place of Presentation
      国立情報学研究所 (東京都千代田区)
    • Year and Date
      2015-02-17 – 2015-02-18
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Estimation of group action with energy constraint2015

    • Author(s)
      M. Hayashi
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] LOCC Conversion via Entanglement Storage2015

    • Author(s)
      Wataru Kumagai and Masahito Hayashi
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function2015

    • Author(s)
      Masahito Hayashi and Toyohiro Tsurumaru
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Asymptotic Entanglement Preservability of LOCC Conversions2015

    • Author(s)
      Kosuke Ito, Wataru Kumagai and Masahito Hayashi
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state2015

    • Author(s)
      Masahito Hayashi and Masaki Owari
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Correlation Detection and an Operational Interpretation of the Renyi Mutual Information2015

    • Author(s)
      Masahito Hayashi and Marco Tomamichel
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Strong converse exponent for classical-quantum channel coding2015

    • Author(s)
      Milan Mosonyi and Tomohiro Ogawa
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Quantum-information Division and an Optimal Uncorrelated Channel2015

    • Author(s)
      Yuji Sekino and Satoshi Ishizaka
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Entanglement and swap of quantum states2015

    • Author(s)
      Ikuto Takaya, Ishizaka Satoshi
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Quantum Algorithms for Finding Constant-sized Sub-hypergraphs2015

    • Author(s)
      Francois Le Gall, Harumichi Nishimura, and Seiichiro Tani
    • Organizer
      The 18th Conference on Quantum Information Processing (QIP 2015)
    • Place of Presentation
      Sydney, NSW, Australia
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
  • [Presentation] Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption2015

    • Author(s)
      Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama
    • Organizer
      3rd International Workshop on Security in Cloud Computing (SCC@ASIACCS 2015)
    • Place of Presentation
      Singapore
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state2014

    • Author(s)
      M. Hayashi
    • Organizer
      Workshop on Quantum Metrology, Interaction, and Causal Structure
    • Place of Presentation
      Beijing, China
    • Year and Date
      2014-12-01 – 2014-12-05
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Universal Channel Coding with Continuous Output System2014

    • Author(s)
      M. Hayashi
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-26 – 2014-10-29
    • Related Report
      2014 Annual Research Report
  • [Presentation] Finite-length Analysis on Tail Probability and Simple Hypothesis Testing for Markov Chain2014

    • Author(s)
      S. Watanabe, M. Hayashi
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-26 – 2014-10-29
    • Related Report
      2014 Annual Research Report
  • [Presentation] Finite-length analysis for secret random number generation and coding theorems2014

    • Author(s)
      M. Hayashi
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-26 – 2014-10-29
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Quantum network coding and the current status of its studies2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-26 – 2014-10-29
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Coding Theoretic Study of Secure Network Coding and Quantum Secret Sharing2014

    • Author(s)
      Ryutaroh Matsumoto
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-26 – 2014-10-29
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Generalized entropies and quantum security2014

    • Author(s)
      Masahito Hayashi
    • Organizer
      Australia-Japan Workshop on Multi-user Quantum Networks
    • Place of Presentation
      Sydney (Australia)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Private information retrieval via blind quantum computation2014

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Australia-Japan Workshop on Multi-user Quantum Networks
    • Place of Presentation
      Sydney (Australia)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Recent progress in quantum ramp secret sharing2014

    • Author(s)
      Ryutaroh Matsumoto
    • Organizer
      Australia-Japan Workshop on Multi-user Quantum Networks
    • Place of Presentation
      Sydney (Australia)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Generalized quantum Arthur-Merlin games2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      Australia-Japan Workshop on Multi-user Quantum Networks
    • Place of Presentation
      Sydney (Australia)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Quantum relative Renyi relative entropies and strong converse theorems2014

    • Author(s)
      Tomohiro Ogawa
    • Organizer
      Australia-Japan Workshop on Multi-user Quantum Networks
    • Place of Presentation
      Sydney (Australia)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing2014

    • Author(s)
      M. Hayashi, H. Tyagi, and S. Watanabe
    • Organizer
      52nd Annual Allerton Conference on Communication, Control, and Computing
    • Place of Presentation
      Champaign, Illinois, USA
    • Year and Date
      2014-10-01 – 2014-10-03
    • Related Report
      2014 Annual Research Report
  • [Presentation] Asymptotic Entanglement Preservability of LOCC Conversions2014

    • Author(s)
      K. Ito, W. Kumagai, M. Hayashi
    • Organizer
      14th Asian Quantum Information Science Conference
    • Place of Presentation
      Shirankaikan, Kyoto, Japan
    • Year and Date
      2014-08-20 – 2014-08-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] Quantum Renyi divergences: operational interpretations and applications to composite coding problems2014

    • Author(s)
      Milan Mosonyi and Tomohiro Ogawa
    • Organizer
      14th Asian Quantum Information Science Conference (AQIS2014)
    • Place of Presentation
      Shirankaikan, Kyoto
    • Year and Date
      2014-08-20 – 2014-08-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] Generalized quantum Arthur-Merlin games2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      ELC Workshop at the University of Tokyo on Quantum Complexity Theory
    • Place of Presentation
      東京大学 (東京都文京区)
    • Year and Date
      2014-08-18
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Generalized entropies2014

    • Author(s)
      M. Hayashi
    • Organizer
      New Frontiers of Quantum Information Theory
    • Place of Presentation
      Palazzo dei Capitani del Popolo, Ascoli Piceno, Italy
    • Year and Date
      2014-07-07 – 2014-07-11
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Asymptotic Reversibility of LOCC Conversions2014

    • Author(s)
      K. Ito, W. Kumagai, M. Hayashi
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Information Geometry Approach to Parameter Estimation in Markov Chains2014

    • Author(s)
      M. Hayashi, S. Watanabe
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Secret key agreement: general capacity and second-order asymptotics2014

    • Author(s)
      M. Hayashi, H. Tyagi, S. Watanabe
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Moderate Deviations for Joint Source-Channel Coding of Systems With Markovian Memory2014

    • Author(s)
      V. Y. F. Tan, S. Watanabe, M. Hayashi
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Strong Converse and Second-Order Asymptotics of Channel Resolvability2014

    • Author(s)
      S. Watanabe, M. Hayashi
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Random Number Conversion via Restricted Storage2014

    • Author(s)
      W. Kumagai, M. Hayashi
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] A Duality Relation Connecting Different Quantum Generalizations of the Conditional Renyi Entropy2014

    • Author(s)
      M. Tomamichel, M. Berta, and M. Hayashi
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] New asymptotic metrics for relative generalized Hamming weight2014

    • Author(s)
      R. Matsumoto
    • Organizer
      2014 IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Asymptotic conversion of probability distribution and entangled state2014

    • Author(s)
      M. Hayashi
    • Organizer
      Beyond I.I.D.
    • Place of Presentation
      National University of Singapore, Singapore
    • Year and Date
      2014-05-19 – 2015-05-21
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Quantum hypothesis testing and the operational interpretation of the quantum Renyi divergences2014

    • Author(s)
      Milan Mosonyi and Tomohiro Ogawa
    • Organizer
      XVII Conference on Quantum Information Processing 2014 (QIP 2014)
    • Place of Presentation
      Barcelona (Spain)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Estimation of group action with energy constraint and its application to uncertainty relations on S^1 and S^32014

    • Author(s)
      M. Hayashi
    • Organizer
      The Fifth Nagoya Winter Workshop on Quantum Information, Measurement, and Foundations
    • Place of Presentation
      名古屋大学
    • Related Report
      2013 Annual Research Report
  • [Presentation] Quantum Merlin and Quantum Arthur2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      The Fifth Nagoya Winter Workshop on Quantum Information, Measurement, and Foundations
    • Place of Presentation
      名古屋大学
    • Related Report
      2013 Annual Research Report
  • [Presentation] マルコフ過程の情報幾何2014

    • Author(s)
      林正人 渡辺峻
    • Organizer
      情報理論研究会
    • Place of Presentation
      名古屋大学
    • Related Report
      2013 Annual Research Report
  • [Presentation] 乱数変換に対する二次漸近解析2014

    • Author(s)
      熊谷亘 林正人
    • Organizer
      情報理論研究会
    • Place of Presentation
      大阪市立大学 文化交流センター
    • Related Report
      2013 Annual Research Report
  • [Presentation] マルコフ型の記憶のある条件付き加法的通信路2014

    • Author(s)
      林正人 渡辺峻
    • Organizer
      情報理論研究会
    • Place of Presentation
      名古屋大学
    • Related Report
      2013 Annual Research Report
  • [Presentation] Non-asymptotic and asymptotic analyses on Markov chains in several problems2014

    • Author(s)
      Masahito Hayashi and Shun Watanabe
    • Organizer
      2014 Information Theory and Applications Workshop
    • Place of Presentation
      Catamaran Resort, San Diego (USA)
    • Related Report
      2013 Annual Research Report
  • [Presentation] LOCC Conversion for Pure State and LOCC Cloning2014

    • Author(s)
      Wataru Kumagai, Masahito Hayashi
    • Organizer
      XVII Conference on Quantum Information Processing 2014 (QIP 2014)
    • Place of Presentation
      Barcelona (Spain)
    • Related Report
      2013 Annual Research Report
  • [Presentation] More Efficient Privacy Amplification with Non-Uniform Random Seeds via Dual Universal Hash Function2014

    • Author(s)
      鶴丸豊広 林正人
    • Organizer
      2014年暗号と情報セキュリティシンポジウムSCIS2014
    • Place of Presentation
      城山観光ホテル (鹿児島県)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Quantum network coding - How can network coding be applied to quantum information?2013

    • Author(s)
      Harumichi Nishimura
    • Organizer
      The 2013 IEEE International Symposium on Network Coding (NetCod2013)
    • Place of Presentation
      Calgary (Canada)
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Composable Security of Blind Computation2013

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Third International Quantum Science Symposium Asia-2013 on ‘Quantum Information to Communications & Quantum Systems to Spintronics, Semi-conductors’
    • Place of Presentation
      東京大学 本郷キャンパス
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Dual universality of hash functions and its applications to quantum cryptography2013

    • Author(s)
      T. Tsurumaru and M. Hayashi
    • Organizer
      Third International Quantum Science Symposium Asia-2013 on ‘Quantum Information to Communications & Quantum Systems to Spintronics, Semi-conductors’
    • Place of Presentation
      東京大学 本郷キャンパス
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Composable security of measuring-Alice blind quantum computation2013

    • Author(s)
      Tomoyuki Morimae, Takeshi Koshiba
    • Organizer
      The 7th International Conference on Information Theoretic Security (ICITS 2013)
    • Place of Presentation
      Nanyang Technical University (Singapore)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Non-Asymptotic Analysis of Privacy Amplification for Markov Chains2013

    • Author(s)
      M. Hayashi and S. Watanabe
    • Organizer
      The 7th International Conference on Information Theoretic Security (ICITS 2013)
    • Place of Presentation
      Nanyang Technical University (Singapore)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Improved asymptotic key rate of the B92 protocol2013

    • Author(s)
      R.Matsumoto
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul (Turkey)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf- Spectral Entropy2013

    • Author(s)
      S.Watanabe and M. Hayashi
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul(Turkey)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Second Order Asymptotics for Random Number Generation2013

    • Author(s)
      W. Kumagai and M. Hayashi
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul (Turkey)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Non-Asymptotic Bounds on Fixed Length Source Coding for Markov Chains2013

    • Author(s)
      M. Hayashi and S.Watanabe
    • Organizer
      51st Annual Allerton Conference on Communication, Control, and Computing
    • Place of Presentation
      Allerton House, Monticello, Illinois (USA)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Quantum hypothesis testing for quantum Gaussian states2013

    • Author(s)
      W. Kumagai, M. Hayashi
    • Organizer
      Bernoulli Society Satellite Meeting to the ISI World Statistics Congress 2013
    • Place of Presentation
      The University of Tokyo
    • Related Report
      2013 Annual Research Report
  • [Presentation] Estimation of group action under the energy constraint2013

    • Author(s)
      M. Hayashi
    • Organizer
      Workshop on Quantum Metrology, Interaction, and Causal Structure
    • Place of Presentation
      Beijing (China)
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Universal Wyner-Ziv Coding for Distortion Constrained General Side-Information2013

    • Author(s)
      Shun Watanabe, Shigeaki Kuzuoka
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2013)
    • Place of Presentation
      Istanbul, Turkey
    • Related Report
      2012 Annual Research Report
  • [Presentation] Non-Asymptotic and Second-Order Achievability Bounds for Source Coding With Side-Information2013

    • Author(s)
      Shun Watanabe, Shigeaki Kuzuoka, Vincent Y. F. Tan
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2013)
    • Place of Presentation
      Istanbul, Turkey
    • Related Report
      2012 Annual Research Report
  • [Presentation] テレポーテーション型量子計算による安全な代理計算2012

    • Author(s)
      末木貴洋、小柴健史
    • Organizer
      SCIS2012: 2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢
    • Related Report
      2011 Annual Research Report
  • [Presentation] Stronger methods of making quantum interactive proofs perfectly complete

    • Author(s)
      小林 弘忠、Francois Le Gall、西村 治道
    • Organizer
      コンピュテーション研究会
    • Place of Presentation
      奈良女子大学 (奈良県)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Fourier analytic approach to estimation of group action

    • Author(s)
      Masahito Hayashi
    • Organizer
      The XXIX International Colloquium on Group-Theoretical Methods in Physics
    • Place of Presentation
      Chern Institute of Mathematics, Tianjin, China
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Explicit Construction of Universal Strongly Secure Network Coding via MRD Codes

    • Author(s)
      J. Kurihara, T. Uyematsu, and R.Matsumoto
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2012)
    • Place of Presentation
      Cambridge, MA, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] List Decoding Algorithms based on Grobner Bases for General One-Point AG Codes

    • Author(s)
      O. Geil, R. Matsumoto, and D.Ruano
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2012)
    • Place of Presentation
      Cambridge, MA, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder

    • Author(s)
      Shun Watanabe and Yasutada Oohama
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2012)
    • Place of Presentation
      Cambridge, MA, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker

    • Author(s)
      Masahito Hayashi
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2012)
    • Place of Presentation
      Cambridge, MA, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Quantum security analysis via smoothing of Renyi entropy of order 2

    • Author(s)
      Masahito Hayashi
    • Organizer
      The 7th Conference on Theory of Quantum Computation, Communication, and Cryptography (TQC2012)
    • Place of Presentation
      Koshiba Hall, The University of Tokyo, Tokyo,
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Towards Perfect Completeness in QMA

    • Author(s)
      Stephen Jordan, Hirotada Kobayashi, Francois Le Gall, Daniel Nagaj, and Harumichi Nishimura
    • Organizer
      The 15th workshop on Quantum Information Processing (QIP’2013)
    • Place of Presentation
      Beijing, China
    • Related Report
      2012 Annual Research Report
  • [Presentation] A hierarchy of information quantities for the finite block length analysis of quantum tasks

    • Author(s)
      M. Tomamichel and M. Hayashi
    • Organizer
      The 15th workshop on Quantum Information Processing (QIP’2013)
    • Place of Presentation
      Beijing, China
    • Related Report
      2012 Annual Research Report
  • [Presentation] New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding

    • Author(s)
      J. Kurihara, T. Uyematsu and R.Matsumoto
    • Organizer
      Fiftieth Annual Allerton Conference on Communication, Control, and Computing
    • Place of Presentation
      Allerton Retreat Center, Monticello, Illinois, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Secure multiplex coding with dependent and non-uniform multiple messages

    • Author(s)
      Masahito Hayashi and Ryutaroh Matsumoto
    • Organizer
      Fiftieth Annual Allerton Conference on Communication, Control, and Computing
    • Place of Presentation
      Allerton Retreat Center, Monticello, Illinois, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Large deviation type evaluation in information theoretic security

    • Author(s)
      Masahito Hayashi
    • Organizer
      Workshop on Beyond i.i.d. in information theory
    • Place of Presentation
      Cambridge, UK
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Large deviation type evaluation in information theoretic security

    • Author(s)
      Masahito Hayashi
    • Organizer
      Japan-SingaporeWorkshop on Multi-user Quantum Networks
    • Place of Presentation
      Centre for Quantum Technologies, National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] Fast exact computation of the tail probability of a hypergeometric distribution and its application to quantum cryptography

    • Author(s)
      Ryutaroh Matsumoto
    • Organizer
      Japan-SingaporeWorkshop on Multi-user Quantum Networks
    • Place of Presentation
      Centre for Quantum Technologies, National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] Reducing error probabilities of quantum Merlin-Arthur proof systems

    • Author(s)
      Harumichi Nishimura
    • Organizer
      Japan-SingaporeWorkshop on Multi-user Quantum Networks
    • Place of Presentation
      Centre for Quantum Technologies, National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] Quantum Oblivious Transfer and Quantum One-Way Functions

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Japan-SingaporeWorkshop on Multi-user Quantum Networks
    • Place of Presentation
      Centre for Quantum Technologies, National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] More Capable and Less Noisy Quantum Channels

    • Author(s)
      Shun Watanabe
    • Organizer
      Japan-SingaporeWorkshop on Multi-user Quantum Networks
    • Place of Presentation
      Centre for Quantum Technologies, National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] Irreversibility of entanglement concentration for pure state

    • Author(s)
      Wataru Kumagai and Masahito Hayashi
    • Organizer
      The 12th Asian Conference on Quantum Information Science (AQIS’12)
    • Place of Presentation
      School of Physical Science and Technology, Soochow University, Suzhou, China,
    • Related Report
      2012 Annual Research Report
  • [Presentation] Security bound with privacy amplification in quantum system

    • Author(s)
      Masahito Hayashi
    • Organizer
      The International Symposium on Quantum Information and Quantum Logic
    • Place of Presentation
      Zhejiang University, Hangzhou, China
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Asymptotic local hypothesis testing between a pure bipartite state and the completely mixed state

    • Author(s)
      Masaki Owari and Masahito Hayashi
    • Organizer
      The 2nd Institute of Mathematical Statistics Asia Pacific Rim Meeting
    • Place of Presentation
      Epochal Tsukuba, Tsukuba, Japan
    • Related Report
      2012 Annual Research Report
  • [Presentation] Quantum hypothesis testing for quantum Gaussian states

    • Author(s)
      Wataru Kumagai and Masahito Hayashi
    • Organizer
      The 2nd Institute of Mathematical Statistics Asia Pacific Rim Meeting
    • Place of Presentation
      Epochal Tsukuba, Tsukuba, Japan
    • Related Report
      2012 Annual Research Report
  • [Presentation] Classifying tripartite pure states in quantum information science and tensor rank

    • Author(s)
      Lin Chen and Masahito Hayashi
    • Organizer
      The 2nd Institute of Mathematical Statistics Asia Pacific Rim Meeting
    • Place of Presentation
      Epochal Tsukuba, Tsukuba, Japan
    • Related Report
      2012 Annual Research Report
  • [Presentation] Precise evaluation of leaked information with universal2 privacy ampli_cation in the presence of quantum attacker

    • Author(s)
      林正人
    • Organizer
      第26 回量子情報技術研究会(QIT26)
    • Place of Presentation
      福井大学文京キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] エンタングルメント抽出の非可逆性

    • Author(s)
      熊谷亘,林正人
    • Organizer
      第26 回量子情報技術研究会(QIT26)
    • Place of Presentation
      福井大学文京キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] 補助キュービット駆動型万能ブラインド量子計算

    • Author(s)
      末木貴洋、小柴健史、森前智行
    • Organizer
      第26 回量子情報技術研究会(QIT26)
    • Place of Presentation
      福井大学文京キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] ガウス状態に対する量子仮説検定

    • Author(s)
      熊谷亘,林正人
    • Organizer
      京都大学数理解析研究所:研究集会「量子論における統計的推測の理論と応用」
    • Place of Presentation
      京都大学数理解析研究所110 教室
    • Related Report
      2012 Annual Research Report
  • [Presentation] 純粋エンタングル状態間のLOCC 変換の二次漸近論

    • Author(s)
      熊谷亘,林正人
    • Organizer
      第27 回量子情報技術研究会(QIT27)
    • Place of Presentation
      慶應義塾大学日吉キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] エンタングルメント抽出および希釈の2 次漸近論

    • Author(s)
      熊谷亘,林正人
    • Organizer
      第35 回情報理論とその応用シンポジウム
    • Place of Presentation
      別府湾ロイヤルホテル
    • Related Report
      2012 Annual Research Report
  • [Presentation] 古典・量子情報における情報量の階層構造

    • Author(s)
      林正人
    • Organizer
      第11 回岡シンポジュウム
    • Place of Presentation
      奈良女子大学理学部数学教室
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] デコイ法を用いた場合での有限長安全性解析

    • Author(s)
      中山僚太, 林正人
    • Organizer
      第27 回量子情報技術研究会(QIT27)
    • Place of Presentation
      慶應義塾大学日吉キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] 量子状態のスワップとエンタングルメント

    • Author(s)
      生藤貴也、石坂智
    • Organizer
      第27 回量子情報技術研究会(QIT27)
    • Place of Presentation
      慶應義塾大学日吉キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] 衝突の列挙に関する量子質問計算量

    • Author(s)
      大和雅英、西村治道
    • Organizer
      第27 回量子情報技術研究会(QIT27)
    • Place of Presentation
      慶應義塾大学日吉キャンパス
    • Related Report
      2012 Annual Research Report
  • [Presentation] 逆シャノン定理による通信路の再現に関する研究

    • Author(s)
      長井大地、小川朋宏
    • Organizer
      IT・ISEC・WBS合同研究会
    • Place of Presentation
      関西学院大学(大阪)
    • Related Report
      2012 Annual Research Report
  • [Presentation] Esitimation of Phase Errors without the Gaussian Approximation and Improvement of the Secure Key Rate of BB84 Protocol

    • Author(s)
      K. Sakakibara, R. Matsumoto, and T.Uyematsu
    • Organizer
      2nd Annual Conferenceon Quantum Cryptography
    • Place of Presentation
      National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] Ancilla-Driven Blind Quantum Computation

    • Author(s)
      Takahiro Sueki,Takeshi Koshiba,Tomoyuki Morimae
    • Organizer
      2nd Annual Conferenceon Quantum Cryptography
    • Place of Presentation
      National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Presentation] A New Method for Constructing Small-Bias Space from Hermitian Codes

    • Author(s)
      O. Geil, S. Martin, and R. Matsumoto
    • Organizer
      International Workshop on the Arithmetic of Finite Fields (WAIFI 2012)
    • Place of Presentation
      Bochum, Germany
    • Related Report
      2012 Annual Research Report
  • [Presentation] LOCCによる量子状態スワップ

    • Author(s)
      生藤貴也、石坂智
    • Organizer
      日本物理学会第68回年次大会
    • Place of Presentation
      広島大学
    • Related Report
      2012 Annual Research Report
  • [Presentation] Expurgation Exponent of Leaked Information in Privacy Amplification for Binary Sources

    • Author(s)
      Shun Watanabe
    • Organizer
      2012 IEEE Information Theory Workshop
    • Place of Presentation
      Lausanne, Switzerland
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Cogunitive Interference Channels with Confidential Messages under Randomness Constraint

    • Author(s)
      Shun Watanabe and Yasutada Oohama
    • Organizer
      2012 International Symposium on Information Theory and Its Applications
    • Place of Presentation
      Hawaii, U.S.A
    • Related Report
      2012 Annual Research Report
  • [Presentation] Stronger methods of making quantum interactive proofs perfectly complete

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall, and Harumichi Nishimura
    • Organizer
      the 4th ACM Conference on Innovations in Theoretical Computer Science (ITCS 2013)
    • Place of Presentation
      Berkeley, California, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] On general formulas for c-q channel resolvability,private capacity,and q-q capacity

    • Author(s)
      Tomohiro Ogawa
    • Organizer
      量子情報技術研究会(QIT27)
    • Place of Presentation
      慶応義塾大学
    • Related Report
      2011 Annual Research Report
  • [Presentation] An universal resolvability and wiretap channel coding for classical-quantum channels

    • Author(s)
      Tomohiro Ogawa
    • Organizer
      Japan-Singapore Workshop on Multi-user Quantum Networks
    • Place of Presentation
      National University of Singapore,Singapore
    • Related Report
      2011 Annual Research Report
  • [Presentation] Universal Resolvability and Wiretap Channel Coding for Classical-Quantum Channels

    • Author(s)
      Tomohiro Ogawa
    • Organizer
      35th Symposium on Information Theory and its Applications (SITA2012)
    • Place of Presentation
      別府湾ロイヤルホテル (大分県)
    • Related Report
      2011 Annual Research Report
  • [Presentation] 量子通信路のノイズに関する順序と情報量に関する研究

    • Author(s)
      岡澤太志、鈴木淳、小川朋宏
    • Organizer
      IT・ISEC・WBS合同研究会
    • Place of Presentation
      関西学院大学(大阪)
    • Related Report
      2011 Annual Research Report
  • [Presentation] Secure Multiplex Coding Over Interference Channel with Confidential Messages

    • Author(s)
      X.Li and R.Matsumoto
    • Organizer
      2012 International Zurich Seminar on Communications
    • Place of Presentation
      Zurich,Switzerland
    • Related Report
      2011 Annual Research Report
  • [Presentation] テレポーテーション型量子計算による安全な代理計算

    • Author(s)
      末木貴洋、小柴健史
    • Organizer
      2012年暗号と情報セキュリティシンポジウム (SCIS2012)
    • Place of Presentation
      金沢
    • Related Report
      2011 Annual Research Report
  • [Presentation] Finite Analysis of QKD Protocol with Hashed Two-Way Classical Communication

    • Author(s)
      Shun Watanabe
    • Organizer
      QCRYPT2011:First Annual Conference on Quantum Cryptography
    • Place of Presentation
      チューリッヒ工科大学 Switerland
    • Related Report
      2011 Annual Research Report
  • [Presentation] Remarks on Private and Quantum Capacities of More Capable and Less Noisy Quantum Channels

    • Author(s)
      Shun Watanabe
    • Organizer
      第34回情報理論とその応用シンポジウム
    • Place of Presentation
      ホテル森の風鶯宿、盛岡
    • Related Report
      2011 Annual Research Report
  • [Presentation] Constructing quantum network coding schemes from classical nonlinear protocols

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall,Harumichi Nishimura, and Martin Roetteler
    • Organizer
      IEEE International Symposium on Information Theory 2011(ISIT 2011)
    • Place of Presentation
      Saint Petersburg(Russia)
    • Related Report
      2011 Annual Research Report
  • [Presentation] On QMA protocols with two short quantum proofs

    • Author(s)
      Francois Le Gall,中川翔太, 西村治道
    • Organizer
      数理解析研究所研究集会:アルゴリズムと計算理論の 新展開(2011年冬のLAシンポジウム)
    • Place of Presentation
      京都
    • Related Report
      2011 Annual Research Report
  • [Presentation] On QMA protocols with two short quantum proofs

    • Author(s)
      Francois Le Gall,中川翔太、 西村治道
    • Organizer
      第25回量子情報技術研究会
    • Place of Presentation
      大阪大学 豊中キャンパス
    • Related Report
      2011 Annual Research Report
  • [Presentation] Constructing quantum network coding schemes from classical nonlinear protocols

    • Author(s)
      小林弘忠、Francois Le Gall、 西村治道、Martin Roetteler
    • Organizer
      コンピュテーション研究会
    • Place of Presentation
      長野
    • Related Report
      2011 Annual Research Report
  • [Presentation] Quantum wiretap channel with non-uniform random number and its exponent of leaked information

    • Author(s)
      Masahito Hayashi
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2011)
    • Place of Presentation
      Cambridge, MA, USA
    • Related Report
      2011 Annual Research Report
  • [Presentation] University attainable error and information exponents,and equivocation rate for the broadcast channels with confidential messages

    • Author(s)
      M.Hayashi and R.Matsumoto
    • Organizer
      Forty-Ninth Annual Allerton Conference
    • Place of Presentation
      University of Illinois at Urbana―Champaign,IL, USA
    • Related Report
      2011 Annual Research Report
  • [Presentation] Secure multiplex network coding

    • Author(s)
      M.Hayashi and R.Matsumoto
    • Organizer
      2011 International Symposium on Network Coding (NetCod)
    • Place of Presentation
      Beijing, China
    • Related Report
      2011 Annual Research Report
  • [Presentation] Secure multiplex coding with a common message

    • Author(s)
      R.Matsumoto and M.Hayashi
    • Organizer
      IEEE International Symposium on Information Theory (ISIT 2011)
    • Place of Presentation
      Saint-Petersburg,Russia
    • Related Report
      2011 Annual Research Report
  • [Presentation] Dual university of hash functions and its applocations to classical and quantum cryptography

    • Author(s)
      T.Tsurumaru and M.Hayashi
    • Organizer
      QCRYPT2011:First Annual Conference on Quantum Cryptography
    • Place of Presentation
      Zurich, Switzerland
    • Related Report
      2011 Annual Research Report
  • [Presentation] 量子ガウス状態族に対する量子仮説検定

    • Author(s)
      熊谷 亘、林 正人
    • Organizer
      2011年度 統計関連学会連合11大会
    • Place of Presentation
      九州大学
    • Related Report
      2011 Annual Research Report
  • [Presentation] 量子ガウス状態族に対する量子仮説検定

    • Author(s)
      熊谷 亘、林 正人
    • Organizer
      第25回量子情報技術研究会(QIT25)
    • Place of Presentation
      大阪大学 豊中キャンパス
    • Related Report
      2011 Annual Research Report
  • [Presentation] 情報スペクトルによる二次オーダーの情報理論

    • Author(s)
      林 正人
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      岩手県岩手郡雫石町、ホテル森の風鶯宿
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Presentation] ユニバーサルハッシュ関数の双対性とその量子暗号への応用

    • Author(s)
      鶴丸豊広、林 正人
    • Organizer
      SCIS2012: 2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢
    • Related Report
      2011 Annual Research Report
  • [Presentation] Weaker entanglement guarantees stronger entanglement

    • Author(s)
      M. Hayashi
    • Organizer
      th Asia-Pacific Workshop on Quantum Information Science (5th APWQIS )
    • Place of Presentation
      , Nanyang Technological University, Singapore
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Book] 岩波書店2014

    • Author(s)
      小柴健史
    • Total Pages
      176
    • Publisher
      乱数生成と計算量理論
    • Related Report
      2014 Annual Research Report

URL: 

Published: 2011-04-06   Modified: 2022-01-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi