• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2011 Fiscal Year Final Research Report

Advances in crossover between quantum information theory and quantum computational complexity theory

Research Project

  • PDF
Project/Area Number 21300002
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionSaitama University

Principal Investigator

KOSHIBA Takeshi  埼玉大学, 大学院・理工学研究科, 准教授 (60400800)

Co-Investigator(Kenkyū-buntansha) MATSUMOTO Keiji  国立情報学研究所, 情報学プリンシプル研 究系, 准教授 (60272390)
KOBAYASHI Hirotada  国立情報学研究所, 情報学プリンシプル研 究系, 研究員 (60413936)
TANAKA Keisuke  東京工業大学, 大学院・情報理工学研究科, 准教授 (20334518)
KAWACHI Akinori  東京工業大学, 大学院・情報理工学研究科, 助教 (00397035)
Project Period (FY) 2009 – 2011
Keywords量子計算量理論 / 量子情報理論 / 暗号理論 / 量子アルゴリズム
Research Abstract

We developed useful techniques in quantum information theory and quantum computational complexity theory and applied them to interactive proof systems, cryptography, network theory and so on. With respect to quantum interactive proof systems, we investigated effects of quantum entanglements among multiple provers. Moreover, we considered the possibility of quantum communication in network coding and proposed efficient protocols. We proved the hard-core property of a function by the quantum computational complexity theory, while it had not been proved from the classical theory. Furthermore, we proposed several classical cryptographic protocols, which bring some ideas to quantum cryptography.

  • Research Products

    (36 results)

All 2012 2011 2010 2009

All Journal Article (23 results) (of which Peer Reviewed: 23 results) Presentation (13 results)

  • [Journal Article] An efficient non-interactive universally composable string-commitment scheme2012

    • Author(s)
      R. Nishimaki, E. Fujisaki, K. Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and ComputerSciences

      Volume: E95A Pages: 167-175

    • Peer Reviewed
  • [Journal Article] A multi-trapdoor commitment scheme from the RSA assumption2012

    • Author(s)
      R. Nishimaki, E. Fujisaki, K. Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E95A Pages: 176-184

    • Peer Reviewed
  • [Journal Article] Estimating the Gowers norm of modulo functions over prime fields2012

    • Author(s)
      A. Kawachi, H. Tanaka, O. Watanabe
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E95D Pages: 755-762

    • Peer Reviewed
  • [Journal Article] Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity2011

    • Author(s)
      A. Kawachi, C. Portmann, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science 6673 (ICITS 2011)

      Pages: 6-24

    • Peer Reviewed
  • [Journal Article] Hard functions for low-degree polynomials over prime fields2011

    • Author(s)
      A. Bogdanov, A. Kawachi, H. Tanaka
    • Journal Title

      Lecture Notes in Computer Science 6907 (MFCS 2011)

      Pages: 120-131

    • Peer Reviewed
  • [Journal Article] Weak oblivious transfer from strong one-way functions2011

    • Author(s)
      K. Tanaka, A. Yamada, K. Yasunaga
    • Journal Title

      Lecture Notes in Computer Science 6980 (ProvSec 2011)

      Pages: 34-51

    • Peer Reviewed
  • [Journal Article] Randomness leakage in the KEM/DEM framework2011

    • Author(s)
      H. Namiki, K. Tanaka, K. Yasunaga
    • Journal Title

      Lecture Notes in Computer Science 6980 (ProvSec 2011)

      Pages: 309-323

    • Peer Reviewed
  • [Journal Article] Programmabilityin the generic ring and group models2011

    • Author(s)
      M. Larangeira, K. Tanaka
    • Journal Title

      Journal of Internet Services and Information Security 1

      Pages: 57-73

    • Peer Reviewed
  • [Journal Article] Test of purity by LOCC2011

    • Author(s)
      K. Matsumoto
    • Journal Title

      Progress in Informatics 8

      Pages: 111-113

    • Peer Reviewed
  • [Journal Article] Information-theoretic secrecy with access to decryption oracles, IEICE Transactions on Fundamentals of Electronics2011

    • Author(s)
      C. Portmann, K. Tanaka
    • Journal Title

      Communications and Computer SciencesE94A

      Pages: 1585-1590

    • Peer Reviewed
  • [Journal Article] Public discussion must be back and forth in Secure Message Transmission2011

    • Author(s)
      T. Koshiba, S. Sawada
    • Journal Title

      Lecture Notes in Computer Science 6829 (ICISC 2010)

      Pages: 325-337

    • Peer Reviewed
  • [Journal Article] Quantum hardcore functions by complexity-theoretical quantum list decoding2010

    • Author(s)
      A. Kawachi, T. Yamakami
    • Journal Title

      SIAM Journal on Computing

      Volume: 39 Pages: 2941-2969

    • Peer Reviewed
  • [Journal Article] CCAproxy re-encryption without bilinear maps in the standard model2010

    • Author(s)
      T. Matsuda, R. Nishimaki, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science 6056 (PKC 2010)

      Pages: 261-278

    • Peer Reviewed
  • [Journal Article] Security of encryption schemes in weakened random oracles2010

    • Author(s)
      A. Kawachi, A. Numayama, K. Tanaka, K.Xagawa
    • Journal Title

      Lecture Notes in Computer Science 6056 (PKC 2010)

      Pages: 403-419

    • Peer Reviewed
  • [Journal Article] Key generation for fast inversion of the Paillier encryption function, IEICE Trans. on Fundamentals of Electronics2010

    • Author(s)
      T. Hirano, K. Tanaka
    • Journal Title

      Communications and Computer Sciences E93A

      Pages: 1111-1121

    • Peer Reviewed
  • [Journal Article] Using entanglement in quantum multi-prover interactive proofs2009

    • Author(s)
      J. Kempe, H. Kobayashi, K. Matsumoto, T.Vidick
    • Journal Title

      Computational Complexity

      Volume: 18 Pages: 273-307

    • Peer Reviewed
  • [Journal Article] Quantum Merlin-Arthur proof systems: Are multiple Merlins more helpful to Arthur?2009

    • Author(s)
      H. Kobayashi, K. Matsumoto, T. Yamakami
    • Journal Title

      Chicago Journal of Theoretical ComputerScience, Article 3

    • Peer Reviewed
  • [Journal Article] General scheme for perfect quantum network coding with free classical communication2009

    • Author(s)
      H. Kobayashi, F. Le Gall, H. Nishimura, M.Rotteler
    • Journal Title

      Lecture Notes in Computer Science 5555 (ICALP 2009)

      Pages: 622-633

    • Peer Reviewed
  • [Journal Article] On the weak ideal compression functions2009

    • Author(s)
      A. Numayama, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science 5594 (ACISP 2009)

      Pages: 232-248

    • Peer Reviewed
  • [Journal Article] Security on hybrid encryption with the tag-KEM/DEM framework2009

    • Author(s)
      T. Matsuda, R. Nishimaki, A. Numayama, K.Tanaka
    • Journal Title

      Lecture Notes in Computer Science 5594 (ACISP2009)

      Pages: 343-359

    • Peer Reviewed
  • [Journal Article] Strengthening the security of distributed oblivious transfer2009

    • Author(s)
      K. -Y. Cheong, T. Koshiba, S. Nishiyama
    • Journal Title

      Lecture Notes in Computer Science 5594 (ACISP 2009)

      Pages: 377-388

    • Peer Reviewed
  • [Journal Article] Reducing complexity assumptions for oblivious transfer2009

    • Author(s)
      K. -Y. Cheong, T. Koshiba
    • Journal Title

      Lecture Notes in Computer Science5824 (IWSEC 2009)

      Pages: 110-124

    • Peer Reviewed
  • [Journal Article] Primitive power roots of unity and its application to encryption, IEICE Trans. on Fundamentals of Electronics2009

    • Author(s)
      T. Hirano, K. Wada, K. Tanaka
    • Journal Title

      Communications and Computer Sciences E92A

      Pages: 1836-1844

    • Peer Reviewed
  • [Presentation] Quantum interactive proofs with weak error bounds2012

    • Author(s)
      T. Ito, H. Kobayashi, J. Watrous
    • Organizer
      Innovations in Theoretical ComputerScience 2012 (ITCS 2012)
    • Place of Presentation
      Cambridge, MA, USA
    • Year and Date
      2012-01-09
  • [Presentation] Leakage-resilient CCA2 public-key encryption from 4-wise independent hash functions2011

    • Author(s)
      M. -H. Nguyen, K. Tanaka, K. Yasunaga
    • Organizer
      2011 International Conference on Advanced Technologies for Communications
    • Place of Presentation
      Nang, Vietnam
    • Year and Date
      2011-08-02
  • [Presentation] Constructing quantum network coding schemes from classical nonlinear protocols2011

    • Author(s)
      H. Kobayashi, F. Le Gall, H. Nishimura, M.Rotteler
    • Organizer
      2011 IEEE InternationalSymposium on Information Theory (ISIT2011)
    • Place of Presentation
      St. Petersburg, Russia
    • Year and Date
      2011-08-01
  • [Presentation] Constructing quantum network coding schemes from classical nonlinear protocols2011

    • Author(s)
      H. Kobayashi, F. Le Gall, H. Nishimura, M.Rotteler
    • Organizer
      The 14th Workshop on QuantumInformation Processing (QIP 2011)
    • Place of Presentation
      Singapore
    • Year and Date
      2011-01-13
  • [Presentation] Non-interactive statistically-hiding quantum bit commitment from any quantum one-way function2011

    • Author(s)
      T. Koshiba, T. Odaira
    • Organizer
      The 14th Workshop on Quantum Information Processing (QIP 2011)
    • Place of Presentation
      Singapore
    • Year and Date
      2011-01-11
  • [Presentation] Quantum interactive proofs with weak error bounds2011

    • Author(s)
      T. Ito, H. Kobayashi, J. Watrous
    • Organizer
      The 14th Workshop on Quantum Information Processing (QIP 2011)
    • Place of Presentation
      Singapore
    • Year and Date
      2011-01-10
  • [Presentation] Perfect quantum network communication protocol based on classical network coding2010

    • Author(s)
      H. Kobayashi, F. Le Gall, H. Nishimura, M.Rotteler
    • Organizer
      2010 IEEE International Symposium on Information Theory (ISIT2010)
    • Place of Presentation
      Austin, Texas,USA
    • Year and Date
      2010-06-18
  • [Presentation] Derandomizing Arthur-Merlin games and approximate counting implies exponential-size lower bounds2010

    • Author(s)
      D. Gutfreund, A. Kawachi
    • Organizer
      The 25th Annual IEEE Conference on Computational Complexity (CCC 2010)
    • Place of Presentation
      Cambridge,Massachusettes, USA
    • Year and Date
      2010-06-09
  • [Presentation] Interactive hashing and BB84 states2010

    • Author(s)
      T. Koshiba
    • Organizer
      Quantum Information in Paris
    • Place of Presentation
      Paris, France
    • Year and Date
      2010-05-27
  • [Presentation] On monotone 'metrics' in the channel spaces (Invited Talk)2010

    • Author(s)
      K. Matsumoto
    • Organizer
      The 5th Workshop ad memoriam of Carlo Novero
    • Place of Presentation
      Turin, Italy
    • Year and Date
      2010-05-26
  • [Presentation] Perfect quantum network coding with free classical communication2010

    • Author(s)
      H. Kobayashi, F. Le Gall, H. Nishimura, M.Rotteler
    • Organizer
      The 13th Workshop on Quantum InformationProcessing (QIP 2010)
    • Place of Presentation
      Zurich, Switzerland
    • Year and Date
      2010-01-21
  • [Presentation] Monotone 'metric' in thechannel space: Resource conversionapproach2010

    • Author(s)
      K. Matsumoto
    • Organizer
      The 13th Workshop on QuantumInformation Processing (QIP 2010)
    • Place of Presentation
      Zurich, Switzerland
    • Year and Date
      2010-01-20
  • [Presentation] Oracularization and two-prover one-round interactive proofs against nonlocal strategies2009

    • Author(s)
      T. Ito, H. Kobayashi, K. Matsumoto
    • Organizer
      The 24th Annual IEEE Conference on Computational Complexity (CCC 2009)
    • Place of Presentation
      Paris, France
    • Year and Date
      2009-07-17

URL: 

Published: 2014-08-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi