• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Deepening Theory of Quantum Protocols

Research Project

Project/Area Number 24240001
Research Category

Grant-in-Aid for Scientific Research (A)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionSaitama University

Principal Investigator

KOSHIBA Takeshi  埼玉大学, 理工学研究科, 教授 (60400800)

Co-Investigator(Kenkyū-buntansha) 河内 亮周  徳島大学, ソシオテクノサイエンス研究部, 講師 (00397035)
田中 圭介  東京工業大学, 情報理工学(系)研究科, 准教授 (20334518)
安永 憲司  金沢大学, 電子情報学系, 助教 (50510004)
ルガル フランソワ  東京大学, 情報理工学(系)研究科, 准教授 (50584299)
松本 啓史  国立情報学研究所, 情報学プリンシプル研究系, 准教授 (60272390)
小林 弘忠  国立情報学研究所, 情報学プリンシプル研究系, 研究員 (60413936)
西村 治道  名古屋大学, 情報科学研究科, 准教授 (70433323)
Project Period (FY) 2012-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥36,010,000 (Direct Cost: ¥27,700,000、Indirect Cost: ¥8,310,000)
Fiscal Year 2015: ¥8,970,000 (Direct Cost: ¥6,900,000、Indirect Cost: ¥2,070,000)
Fiscal Year 2014: ¥8,580,000 (Direct Cost: ¥6,600,000、Indirect Cost: ¥1,980,000)
Fiscal Year 2013: ¥8,450,000 (Direct Cost: ¥6,500,000、Indirect Cost: ¥1,950,000)
Fiscal Year 2012: ¥10,010,000 (Direct Cost: ¥7,700,000、Indirect Cost: ¥2,310,000)
Keywords量子プロトコル / 暗号理論 / 量子アルゴリズム / ゲーム理論 / 量子計算量理論 / 量子計算 / 計算量理論 / 量子暗号 / 量子対話証明 / 秘匿情報検索 / 通信複雑度 / 質問計算料 / 対話証明 / 通信計算量 / 量子情報 / プロトコル / エンタングルメント
Outline of Final Research Achievements

We propose a generalized model of quantum interactive proof systems and show the existence of complete problems and a quantum version of Babai's collapse theorem. We construct efficient quantum algorithms for matrix multiplication of semi-rings and for finding triangles in graphs and develop their analysis to obtain their quantum distribution protocols. In ancilla-driven model where computation systems and measurement systems are separable, we show that quantum blind computation is achievable. We characterize a classical computational complexity class AWPP, which corresponds to a quantum computational complexity class BQP, by using the notion of post-selection. We give a natural reason why AWPP is the tightest upper bound of BQP and develop a quantum complexity theoretic approach to the study of AWPP.

Report

(5 results)
  • 2016 Final Research Report ( PDF )
  • 2015 Annual Research Report
  • 2014 Annual Research Report
  • 2013 Annual Research Report
  • 2012 Annual Research Report
  • Research Products

    (113 results)

All 2016 2015 2014 2013 2012 Other

All Int'l Joint Research (4 results) Journal Article (61 results) (of which Int'l Joint Research: 2 results,  Peer Reviewed: 60 results,  Acknowledgement Compliant: 13 results,  Open Access: 9 results) Presentation (47 results) (of which Int'l Joint Research: 1 results,  Invited: 18 results) Book (1 results)

  • [Int'l Joint Research] LIAFA, Universite Paris Diderot(フランス)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] University of Nijmegen(オランダ)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] University of Latvia(ラトビア)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] Technion(イスラエル)

    • Related Report
      2015 Annual Research Report
  • [Journal Article] Quantum interpretations of AWPP and APP2016

    • Author(s)
      T. Morimae, H. Nishimura
    • Journal Title

      Quantum Information and Computation

      Volume: 16 Pages: 498-514

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Quantum algorithms for finding constant-sized sub-hypergraphs2016

    • Author(s)
      Francois Le Gall, Harumichi Nishimura, Seiichiro Tani
    • Journal Title

      Theoretical Computer Science

      Volume: 609 Pages: 569-582

    • DOI

      10.1016/j.tcs.2015.10.006

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Information cost of quantum communication protocols2016

    • Author(s)
      I. Kerenidis, M. Lauriere, F. Le Gall, M. Rennela
    • Journal Title

      Quantum Information and Computation

      Volume: 16 Pages: 181-196

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Strongly simulation-extractable leakage-resilient NIZK2016

    • Author(s)
      Y. Wang, K. Tanaka
    • Journal Title

      International Journal of Information Security

      Volume: 15 Issue: 1 Pages: 67-79

    • DOI

      10.1007/s10207-015-0291-z

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions2016

    • Author(s)
      F. Kitagawa, T. Matsuda, G. Hanaoka, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (PKC 2016)

      Volume: 9614 Pages: 99-129

    • DOI

      10.1007/978-3-662-49384-7_5

    • ISBN
      9783662493830, 9783662493847
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Public-Key Encryption with Lazy Parties2016

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99.A Issue: 2 Pages: 590-600

    • DOI

      10.1587/transfun.E99.A.590

    • NAID

      130005121513

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes2016

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science (FPS 2015)

      Volume: 9482 Pages: 117-133

    • DOI

      10.1007/978-3-319-30303-1_8

    • ISBN
      9783319303024, 9783319303031
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Merlin-Arthur with Clifford Arthur2015

    • Author(s)
      T. Morimae, M. Hayashi, H. Nishimura, K. Fujii
    • Journal Title

      Quantum Information and Computation

      Volume: 15 Pages: 1420-1430

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Generalized Arthur-Merlin games2015

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall, Harumichi Nishimura
    • Journal Title

      Leibniz International Proceedings in Informatics (30th Conference on Computational Complexity (CCC2015))

      Volume: 33 Pages: 488-511

    • DOI

      10.4230/LIPIcs.CCC.2015.488

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Quantum Algorithm for Triangle Finding in Sparse Graphs2015

    • Author(s)
      Francois Le Gall, Shogo Nakajima
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 9472 Pages: 590-600

    • DOI

      10.1007/978-3-662-48971-0_50

    • ISBN
      9783662489703, 9783662489710
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Fast Matrix Multiplication: Limitations of the Coppersmith-Winograd Method2015

    • Author(s)
      Andris Ambainis, Yuval Filmus, Francois Le Gall
    • Journal Title

      Proceedings of the 47th ACM Symposium on Theory of Computing

      Volume: 2015 Pages: 585-593

    • DOI

      10.1145/2746539.2746554

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Disavowable Public Key Encryption with Non-Interactive Opening2015

    • Author(s)
      A. Ishida, K. Emura, G. Hanaoka, Y. Sakai, K.Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 12 Pages: 2446-2455

    • DOI

      10.1587/transfun.E98.A.2446

    • NAID

      130005111996

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency2015

    • Author(s)
      Y. Wang, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ACISP 2015)

      Volume: 9144 Pages: 213-229

    • DOI

      10.1007/978-3-319-19962-7_13

    • ISBN
      9783319199610, 9783319199627
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Completeness of Single-Bit Projection-KDM Security for Public Key Encryption2015

    • Author(s)
      F. Kitagawa, T. Matsuda, G. Hanaoka, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (CT-RSA 2015)

      Volume: 9048 Pages: 201-219

    • DOI

      10.1007/978-3-319-16715-2_11

    • ISBN
      9783319167145, 9783319167152
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Comparison of Watermarking Schemes Using Linear and Nonlinear Feature Matching2015

    • Author(s)
      Ta Minh Thanh, K. Tanaka
    • Journal Title

      KSE 2015

      Volume: - Pages: 262-267

    • DOI

      10.1109/kse.2015.67

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Blind Watermarking using QIM and the Quantized SVD Domain based on the q-Logarithm Function2015

    • Author(s)
      Ta Minh Thanh, K. Tanaka
    • Journal Title

      VISAPP 2015

      Volume: - Pages: 14-25

    • DOI

      10.5220/0005291900140025

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] New packing method in somewhat homomorphic encryption and its applications2015

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Security and Communication Networks

      Volume: 8 Issue: 13 Pages: 2194-2213

    • DOI

      10.1002/sec.1164

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure statistical analysis using RLWE-based homomorphic encryption2015

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science (ACISP 2015)

      Volume: 9144 Pages: 471-487

    • DOI

      10.1007/978-3-319-19962-7_27

    • ISBN
      9783319199610, 9783319199627
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption2015

    • Author(s)
      Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama
    • Journal Title

      Proceedings of the 3rd International Workshop on Security in Cloud Computing (SCC@ASIACCS 2015)

      Volume: - Pages: 53-61

    • DOI

      10.1145/2732516.2732521

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model2015

    • Author(s)
      Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, Kenji Yasunaga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 3 Pages: 853-862

    • DOI

      10.1587/transfun.E98.A.853

    • NAID

      130004770983

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes2015

    • Author(s)
      Akinori Kawachi and Ikko Yamane
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E98.D Issue: 3 Pages: 532-540

    • DOI

      10.1587/transinf.2014FCP0016

    • NAID

      130004841870

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Stronger Methods of Making Quantum Interactive Proofs Perfectly Complete.2015

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall and Harumichi Nishimura.
    • Journal Title

      SIAM Journal on Computing, published online

      Volume: - Issue: 2 Pages: 243-289

    • DOI

      10.1137/140971944

    • NAID

      110009779047

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] On the exact decryption range for Gentry-Halevi's Implementation of Fully Homomorphic Encryption2014

    • Author(s)
      Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba
    • Journal Title

      Journal of Mathematical Cryptology

      Volume: 8 Issue: 3 Pages: 305-329

    • DOI

      10.1515/jmc-2013-0024

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption2014

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 8544 Pages: 338-353

    • DOI

      10.1007/978-3-319-08344-5_22

    • ISBN
      9783319083438, 9783319083445
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] The query complexity of witness finding2014

    • Author(s)
      Akinori Kawachi, Benjamin Rossman, Osamu Watanabe
    • Journal Title

      Proc. of the 9th International Computer Science Symposium in Russia

      Volume: LNCS 8476 Pages: 218-231

    • DOI

      10.1007/978-3-319-06686-8_17

    • NAID

      120006582539

    • ISBN
      9783319066851, 9783319066868
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 暗号とゲーム理論 (解説論文)2014

    • Author(s)
      安永憲司
    • Journal Title

      数学セミナー

      Volume: 53(10) Pages: 25-29

    • Related Report
      2014 Annual Research Report
  • [Journal Article] Quantum Complexity of Boolean Matrix Multiplication and Related Problems.2014

    • Author(s)
      Francois Le Gall
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 8808 Pages: 176-191

    • DOI

      10.1007/978-3-319-13350-8_13

    • ISBN
      9783319133492, 9783319133508
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Quantum Algorithms for Matrix Products over Semirings.2014

    • Author(s)
      Francois Le Gall and Harumichi Nishimura
    • Journal Title

      Proceedings of the 14th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2014)

      Volume: 1 Pages: 331-343

    • DOI

      10.1007/978-3-319-08404-6_29

    • ISBN
      9783319084039, 9783319084046
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Quantum Algorithms for Finding Constant-sized Sub-hypergraphs.2014

    • Author(s)
      Francois Le Gall, Harumichi Nishimura and Seiichiro Tani
    • Journal Title

      Proceedings of the 20th Annual International Computing and Combinatorics Conference (COCOON 2014)

      Volume: 1 Pages: 429-440

    • DOI

      10.1007/978-3-319-08783-2_37

    • ISBN
      9783319087825, 9783319087832
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency2014

    • Author(s)
      Yuyu Wang, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ProvSec 2014)

      Volume: 8782 Pages: 117-129

    • DOI

      10.1007/978-3-319-12475-9_9

    • ISBN
      9783319124742, 9783319124759
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient key dependent message security amplification against chosen ciphertext attacks2014

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ICISC 2014)

      Volume: 8949 Pages: 84-100

    • DOI

      10.1007/978-3-319-15943-0_6

    • ISBN
      9783319159423, 9783319159430
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Strongly simulation-extractable leakage-resilient NIZK2014

    • Author(s)
      Yuyu Wang, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ACISP 2014)

      Volume: 8544 Pages: 66-81

    • DOI

      10.1007/978-3-319-08344-5_5

    • ISBN
      9783319083438, 9783319083445
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Practical Packing Method in Somewhat Homomorphic Encryption2014

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science (DPM 2013)

      Volume: 8247 Pages: 34-50

    • DOI

      10.1007/978-3-642-54568-9_3

    • ISBN
      9783642545672, 9783642545689
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Randomness Leakage in the KEM/DEM Framework2014

    • Author(s)
      Hitoshi Namiki, Keisuke Tanaka, and Kenji Yasunaga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E97.A Issue: 1 Pages: 191-199

    • DOI

      10.1587/transfun.E97.A.191

    • NAID

      130003385344

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Proving Circuit Lower Bounds in High Uniform Classes2014

    • Author(s)
      A. Kawachi
    • Journal Title

      Interdisciplinary Information Sciences

      Volume: 20 Issue: 1 Pages: 1-26

    • DOI

      10.4036/iis.2014.1

    • NAID

      110009795554

    • ISSN
      1340-9050, 1347-6157
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Ancilla-Driven Universal Blind Quantum Computation2013

    • Author(s)
      Sueki Takahiro,Takeshi Koshiba,Tomoyuki Morimae
    • Journal Title

      Physical Review A

      Volume: 89 Issue: 6 Pages: 60301-60301

    • DOI

      10.1103/physreva.87.060301

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics2013

    • Author(s)
      Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science (MoCrySEn 2013)

      Volume: 8128 Pages: 55-74

    • DOI

      10.1007/978-3-642-40588-4_5

    • ISBN
      9783642405877, 9783642405884
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Weakly Nondeterministic Communication Complexity.2013

    • Author(s)
      Francois Le Gall
    • Journal Title

      Theoretical Computer Science

      Volume: 486 Pages: 43-49

    • DOI

      10.1016/j.tcs.2012.12.015

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Recovering strings in oracles: quantum and classic(招待論文)2013

    • Author(s)
      Kazuo Iwama, Harumichi Nishimura
    • Journal Title

      International Journal of Foundations of Computer Science

      Volume: 24 Issue: 07 Pages: 979-993

    • DOI

      10.1142/s0129054113400261

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2013

    • Author(s)
      Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E96.A Issue: 6 Pages: 1100-1111

    • DOI

      10.1587/transfun.E96.A.1100

    • NAID

      10031193795

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] List Decoding of Reed-Muller Codes Based on a Generalized Plotkin Construction2013

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E96.A Issue: 7 Pages: 1662-1666

    • DOI

      10.1587/transfun.E96.A.1662

    • NAID

      130003370698

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Game-theoretic security for bit commitment2013

    • Author(s)
      Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 8231 Pages: 303-318

    • DOI

      10.1007/978-3-642-41383-4_20

    • ISBN
      9783642413827, 9783642413834
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Grey-Box Public-Key Steganography2013

    • Author(s)
      Hirotoshi Takebe, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (TAMC 2013)

      Volume: 7876 Pages: 294-305

    • DOI

      10.1007/978-3-642-38236-9_27

    • ISBN
      9783642382352, 9783642382369
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Factoring-Based Proxy Re-Encryption Schemes2013

    • Author(s)
      Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ProvSec 2013)

      Volume: 8209 Pages: 309-329

    • DOI

      10.1007/978-3-642-41227-1_18

    • ISBN
      9783642412264, 9783642412271
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Attacks to the Proxy Re-Encryption Schemes from IWSEC20112013

    • Author(s)
      Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (IWSEC 2013)

      Volume: 8231 Pages: 290-302

    • DOI

      10.1007/978-3-642-41383-4_19

    • ISBN
      9783642413827, 9783642413834
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Hard Functions for Low-Degree Polynomials over Prime Fields2013

    • Author(s)
      A. Bogdanov, A. Kawachi, and H. Tanaka
    • Journal Title

      ACM Transactions on Computation Theory

      Volume: 5(2) Issue: 2 Pages: 5-5

    • DOI

      10.1145/2493246.2493248

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On Hard Functions for Low-Degree Polynomials over Prime Fields2013

    • Author(s)
      Andrej Bogdanov, Akinori Kawachi, and Hidetoki Tanaka
    • Journal Title

      ACM Transactions on Computing Theory

      Volume: To appear

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees2013

    • Author(s)
      Tatsuya Akutsu, Daiji Fukagawa, Magnus M. Halldorsson, Atsuhiro Takasu, Keisuke Tanaka
    • Journal Title

      Theoretical Computer Science

      Volume: 470 Pages: 10-22

    • DOI

      10.1016/j.tcs.2012.11.017

    • NAID

      120005241356

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2013

    • Author(s)
      Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: To appear

    • NAID

      10031193795

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA20122013

    • Author(s)
      Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (CT-RSA2013)

      Volume: 7779 Pages: 277-292

    • DOI

      10.1007/978-3-642-36095-4_18

    • ISBN
      9783642360947, 9783642360954
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Property Testing for Cyclic Groups and Beyond2012

    • Author(s)
      F. Le Gall, Y. Yoshida
    • Journal Title

      Journal of Combinatorial Optimization

      Volume: (印刷中) Issue: 4 Pages: 636-654

    • DOI

      10.1007/s10878-011-9445-8

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Quantum Network Coding for Quantum Repeaters2012

    • Author(s)
      T. Satoh, F. Le Gall, and H. Imai
    • Journal Title

      Physical Review A

      Volume: 86 Issue: 3 Pages: 32331-32331

    • DOI

      10.1103/physreva.86.032331

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Private Information Retrieval with Sublinear Communication Complexity2012

    • Author(s)
      Francois Le Gall
    • Journal Title

      Theory of Computing

      Volume: 8 Issue: 1 Pages: 369-374

    • DOI

      10.4086/toc.2012.v008a016

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On QMA Protocols with Two Short Quantum Proofs2012

    • Author(s)
      Francois Le Gall, Shota Nakagawa and Harumichi Nishimura
    • Journal Title

      Quantum Information and Computation

      Volume: 12 Pages: 589-600

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Achieving perfect completeness in classical-witness quantum Merlin-Arthur proof systems2012

    • Author(s)
      Stephen P. Jordan, Hirotada Kobayashi, Daniel Nagaj, and Harumichi Nishimura
    • Journal Title

      Quantum Information and Computation

      Volume: 12 Pages: 461-471

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Time-Efficient Output-Sensitive Quantum Algorithm for Boolean Matrix Multiplication2012

    • Author(s)
      Francois Le Gall
    • Journal Title

      Lecture Notes in Computer Science (ISAAC2012)

      Volume: 7676 Pages: 639-648

    • DOI

      10.1007/978-3-642-35261-4_66

    • ISBN
      9783642352607, 9783642352614
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Reconstructing strings from substrings with quantum queries2012

    • Author(s)
      Richard Cleve, Kazuo Iwama, Francois Le Gall, Harumichi Nishimura, Seiichiro Tani, Junichi Teruyama, Shigeru Yamashita
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 7357 Pages: 622-633

    • DOI

      10.1007/978-3-642-31155-0_34

    • NAID

      110009564275

    • ISBN
      9783642311543, 9783642311550
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Symmetric-Key Encryption Scheme with Multi-Ciphertext Non-Malleability2012

    • Author(s)
      Akinori Kawachi, Hirotoshi Takebe, and Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (IWSEC2012)

      Volume: 7631 Pages: 123-137

    • DOI

      10.1007/978-3-642-34117-5_8

    • ISBN
      9783642341168, 9783642341175
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A game-theoretic perspective on oblivious transfer2012

    • Author(s)
      Haruna Higo, Keisuke Tanaka, Akihiro Yamada, and Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science (ACISP2012)

      Volume: 7372 Pages: 29-42

    • DOI

      10.1007/978-3-642-31448-3_3

    • ISBN
      9783642314476, 9783642314483
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Public-key encryption with lazy parties2012

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science (SCN2012)

      Volume: 7485 Pages: 411-425

    • DOI

      10.1007/978-3-642-32928-9_23

    • NAID

      130005121513

    • ISBN
      9783642329272, 9783642329289
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model2012

    • Author(s)
      Mario Larangeira and Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (WISA2012)

      Volume: 7690 Pages: 124-143

    • DOI

      10.1007/978-3-642-35416-8_10

    • ISBN
      9783642354151, 9783642354168
    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Presentation] サンプル可能な誤りの効率的な訂正可能性について2016

    • Author(s)
      安永 憲司
    • Organizer
      2015年度冬のLAシンポジウム
    • Place of Presentation
      京都大学,京都市
    • Year and Date
      2016-01-27
    • Related Report
      2015 Annual Research Report
  • [Presentation] 識別不可能性難読化器を用いた二者間秘匿計算2016

    • Author(s)
      馬場 花菜子, 河内 亮周
    • Organizer
      2015年度冬のLAシンポジウム
    • Place of Presentation
      京都大学,京都市
    • Year and Date
      2016-01-27
    • Related Report
      2015 Annual Research Report
  • [Presentation] 直積定理における回路サイズ損失の下界2016

    • Author(s)
      河内 亮周
    • Organizer
      2015年度冬のLAシンポジウム
    • Place of Presentation
      京都大学,京都市
    • Year and Date
      2016-01-27
    • Related Report
      2015 Annual Research Report
  • [Presentation] Multi-Party Secure Computation Based on Linear Codes2016

    • Author(s)
      K. Sheng, T. Koshiba
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-22
    • Related Report
      2015 Annual Research Report
  • [Presentation] 検証者の不正を防ぐ合理的な証明とその委託計算への応用2016

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 繰り返しゲームを用いた乱数生成のインセンティブに関する考察2016

    • Author(s)
      湯澤 孝介, 安永 憲司, 満保 雅浩
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 鍵サイズ長の単一値を持つGateによるGarbled化方式2016

    • Author(s)
      黒河 徳大,小柴 健史
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 合理的な敵に対する安全なメッセージ伝達方式2016

    • Author(s)
      藤田舞騎,小柴健史
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 難読化技術を用いたサインデクリプション方式の構成2016

    • Author(s)
      越中谷 隼人, 安永 憲司, 満保 雅浩
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-20
    • Related Report
      2015 Annual Research Report
  • [Presentation] Secure Deduplication for Multiple Group Setting2016

    • Author(s)
      Ei Mon Cho, T. Koshiba
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] Power of quantum computation with few clean qubits2015

    • Author(s)
      H. Nishimura
    • Organizer
      Workshop around BQP
    • Place of Presentation
      Center for ELC, 東京都港区
    • Year and Date
      2015-12-08
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] 量子版NPと量子版AMの計算複雑さ2015

    • Author(s)
      西村治道
    • Organizer
      第33回量子情報技術研究会
    • Place of Presentation
      NTT厚木研究開発センタ,厚木市
    • Year and Date
      2015-11-25
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] プロトコルの安全性とゲーク理論2015

    • Author(s)
      安永 憲司
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Place of Presentation
      東北大学,仙台市
    • Year and Date
      2015-09-09
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] Impossibility of classically simulating one-clean-qubit computation2015

    • Author(s)
      藤井啓祐,小林弘忠,森前智行,西村治道,玉手修平,谷誠一郎
    • Organizer
      電子情報通信学会コンピューテーション研究会
    • Place of Presentation
      信州大学,長野市
    • Year and Date
      2015-09-01
    • Related Report
      2015 Annual Research Report
  • [Presentation] 合理的な検証者に対する合理的な証明2015

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩
    • Organizer
      2015年度夏のLAシンポジウム
    • Place of Presentation
      ゆのくに天祥,加賀市
    • Year and Date
      2015-07-15
    • Related Report
      2015 Annual Research Report
  • [Presentation] 量子計算量クラス-PとNPの量子版とその先2015

    • Author(s)
      西村治道
    • Organizer
      基礎物理学研究所研究会「量子制御技術の発展により拓かれる量子情報の新時代」
    • Place of Presentation
      京都大学,京都市
    • Year and Date
      2015-07-14
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] Disavowable Public Key Encryption with Non-interactive Opening2015

    • Author(s)
      A. Ishida, K. Emura, G. Hanaoka, Y. Sakai, K. Tanaka
    • Organizer
      ASIACCS 2015
    • Place of Presentation
      Hotel Novotel Singapore Clarke Quay, Singapore
    • Year and Date
      2015-05-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Quantum Bloom Filter2015

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Workshop on Secure Quantum Computing
    • Place of Presentation
      東京大学(東京都文京区)
    • Year and Date
      2015-03-19
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] On maximization of measured f-divergence between a given pair of quantum states2015

    • Author(s)
      Keiji Matsumoto
    • Organizer
      Nagoya Winter Workshop 2015: Reality and Measurement in Algebraic Quantum Theory
    • Place of Presentation
      名古屋大学(愛知県名古屋市)
    • Year and Date
      2015-03-09 – 2015-03-13
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Data management over garbled Bloom filter for private set intersection2015

    • Author(s)
      Amit Raj Baral, Takeshi Koshiba
    • Organizer
      The 13th International Conference on Computer Applications (ICCA 2015)
    • Place of Presentation
      Sedona Hotel, Yangon, Myanmar
    • Year and Date
      2015-02-05
    • Related Report
      2014 Annual Research Report
  • [Presentation] Quantum network coding and the current status of its studies2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      nternational Symposium on Information Theory and Its Applications (ISITA2014)
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-27 – 2014-10-29
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Generalized quantum Arthur-Merlin games2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      Australia-Japan Workshop on Multi-user Quantum Network
    • Place of Presentation
      University of Technology Sydney, Sydney, Australia
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Private Information Retrieval via Blind Quantum Computation2014

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Australia-Japan Workshop on Multi-User Quantum Networks
    • Place of Presentation
      University of Technology Sydney, Sydney, Australia
    • Year and Date
      2014-10-22
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Improved quantum algorithm for triangle finding via combinatorial arguments2014

    • Author(s)
      Francois Le Gall
    • Organizer
      55th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2014)
    • Place of Presentation
      Radisson Blu Warwick Hotel, Philadelphia, PA, USA
    • Year and Date
      2014-10-20
    • Related Report
      2014 Annual Research Report
  • [Presentation] Leakage resilience of Goldreich's pseudorandom generator against the basic linear programming2014

    • Author(s)
      Ryuhei Mori, Takeshi Koshiba, Osamu Watanabe, Masaki Yamamoto
    • Organizer
      Collective Dynamics in Information Systems
    • Place of Presentation
      Chinese Academy of Sciences, Beijing, China
    • Year and Date
      2014-10-13
    • Related Report
      2014 Annual Research Report
  • [Presentation] On the power of the Tri-Sum-And function2014

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Collective Dynamics in Information Systems
    • Place of Presentation
      Chinese Academy of Sciences, Beijing, China
    • Year and Date
      2014-10-10
    • Related Report
      2014 Annual Research Report
  • [Presentation] When one input is always better than the other?2014

    • Author(s)
      Keiji Matsumoto
    • Organizer
      New Horizons in Statistical Decision Theory
    • Place of Presentation
      Mathematisches Forschungsinstitut Oberwolfach, Oberwolfach, Germany
    • Year and Date
      2014-09-07 – 2014-09-13
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Generalized quantum Arthur-Merlin games2014

    • Author(s)
      Harumichi Nishimura
    • Organizer
      ELC Workshop on Quantum Complexity Theory
    • Place of Presentation
      東京大学(東京都文京区)
    • Year and Date
      2014-08-18
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Correction of samplable additive errors2014

    • Author(s)
      Kenji Yasunaga
    • Organizer
      2014 IEEE International Symposium on Information Theory (ISIT 2014)
    • Place of Presentation
      Hawaii Convention Center, Honolulu, USA
    • Year and Date
      2014-07-01
    • Related Report
      2014 Annual Research Report
  • [Presentation] Composable Security of Blind Computation

    • Author(s)
      Takeshi Koshiba
    • Organizer
      Quantum Science Symposium Asia 2013 (QSS-ASIA 2013)
    • Place of Presentation
      東京大学, 東京
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Composable security of measuring-Alice blind quantum computation

    • Author(s)
      Tomoyuki Morimae, Takeshi Koshiba
    • Organizer
      7th International Conference on Information Theoretic Security (ICITS 2013)
    • Place of Presentation
      Nanyang Technology University, Singapore
    • Related Report
      2013 Annual Research Report
  • [Presentation] On unidirectional public discussion in secure message transmission

    • Author(s)
      Takeshi Koshiba, Shinya Sawada
    • Organizer
      1st International Conference on Energy, Environment and Human Engineering (ICEEHE 2013)
    • Place of Presentation
      Kandawgyi Palace Hotel, Yangon, Myanmar
    • Related Report
      2013 Annual Research Report
  • [Presentation] Analysis of Message Passing Algorithms for the 3XORSAT Problem

    • Author(s)
      Takeshi Koshiba, Ryuhei Mori, Osamu Watanabe, Masaki Yamamoto
    • Organizer
      ELC International Meeting on Inference, Computation and Spin Glasses (ICSG 2013)
    • Place of Presentation
      北海道大学, 札幌
    • Related Report
      2013 Annual Research Report
  • [Presentation] Secure pattern matching using somewhat homomorphic encryption

    • Author(s)
      Masaya Yasuda, Takeshi Shiomyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
    • Organizer
      2013 ACM Cloud Computing Security Workshop
    • Place of Presentation
      Berlin Congress Center, Berlin, Germany
    • Related Report
      2013 Annual Research Report
  • [Presentation] Quantum Complexity of Matrix Multiplication

    • Author(s)
      Francois Le Gall
    • Organizer
      Satellite Workshop of ICALP 2013 on Quantum and Classical Complexity
    • Place of Presentation
      University of Latvia, Riga, Latvia
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Quantum algorithms for matrix multiplication

    • Author(s)
      Francois Le Gall
    • Organizer
      13th Asian Quantum Information Science Conference (AQIS 2013)
    • Place of Presentation
      The Institute of Mathematical Sciences, Chennai, India
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Quantum Algorithms for Matrix Products over Semirings

    • Author(s)
      Francois Le Gall and Harumichi Nishimura
    • Organizer
      第28回量子情報技術研究会研究会
    • Place of Presentation
      北海道大学, 札幌
    • Related Report
      2013 Annual Research Report
  • [Presentation] Quantum algorithms for finding constant-sized sub-hypergraphs over 3-uniform hypergraphs

    • Author(s)
      Francois Le Gall, Harumichi Nishimura and Seiichiro Tani
    • Organizer
      第29回量子情報技術研究会研究会
    • Place of Presentation
      早稲田大学, 東京
    • Related Report
      2013 Annual Research Report
  • [Presentation] Stronger Methods of Making Quantum Interactive Proofs Perfectly Complete

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall, Harumichi Nishimura
    • Organizer
      電子情報通信学会コンピュテーション研究会
    • Place of Presentation
      奈良女子大学記念館, 奈良
    • Related Report
      2013 Annual Research Report
  • [Presentation] Quantum network coding - How can network coding be applied to quantum information?

    • Author(s)
      Harumichi Nishimura
    • Organizer
      2013 IEEE International Symposium on Network Coding (NetCod2013)
    • Place of Presentation
      University of Calgary, Calgary, Canada
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Quantum Merlin and Quantum Arthur

    • Author(s)
      Harumichi Nishimura
    • Organizer
      5th Nagoya Winter Workshop on Quantum Information, Measurement, and Foundations
    • Place of Presentation
      名古屋大学, 名古屋
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] When is an input stat always better than the others? Universally optimal input states for statistical inference of quantum channels

    • Author(s)
      Keiji Matsumoto
    • Organizer
      5th Nagoya Winter Workshop on Quantum Information, Measurement, and Foundations
    • Place of Presentation
      名古屋大学, 名古屋
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Universally optimal input states for channel estimation/query complexity problems

    • Author(s)
      Keiji Matsumoto
    • Organizer
      Intensive Month on Operator Algebra and Quantum Information
    • Place of Presentation
      Universidad Autonoma de Madrid, Madrid, Spain
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Stronger methods of making quantum interactive proofs perfectly complete

    • Author(s)
      Hirotada Kobayashi, Francois Le Gall, and Harumichi Nishimura
    • Organizer
      2013 ACM Conference on Innovations in Theoretical Computer Science (ITCS 2013)
    • Place of Presentation
      UC Berkeley, Berkeley, CA, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Faster Algorithms for Rectangular Matrix Multiplication

    • Author(s)
      Francois Le Gall
    • Organizer
      The 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2012)
    • Place of Presentation
      Hyatt Regency, New Brunswick, NJ, USA
    • Related Report
      2012 Annual Research Report
  • [Presentation] Towards Perfect Completeness in QMA

    • Author(s)
      Stephen P. Jordan, Hirotada Kobayashi, Francois Le Gall, Daniel Nagaj, and Harumichi Nishimura
    • Organizer
      The 16th Workshop on Quantum Information Processing (QIP 2013)
    • Place of Presentation
      Tsinghua University, Beijing, China
    • Related Report
      2012 Annual Research Report
  • [Presentation] Ancilla-Driven Blind Quantum Computation

    • Author(s)
      Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae
    • Organizer
      The 2nd Conference on Quantum Cryptography (QCRYPT 2012)
    • Place of Presentation
      National University of Singapore, Singapore
    • Related Report
      2012 Annual Research Report
  • [Book] 乱数生成と計算量理論2014

    • Author(s)
      小柴健史
    • Total Pages
      176
    • Publisher
      岩波書店
    • Related Report
      2014 Annual Research Report

URL: 

Published: 2013-05-15   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi