Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Toyohiro Tsurumaru"'
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 4, Pp 1-17 (2023)
The key relay protocol (KRP) plays an important role in improving the performance and the security of quantum key distribution networks. On the other hand, there is also an existing research field called secure network coding (SNC), which has similar
Externí odkaz:
https://doaj.org/article/08cff17c236b4483b9fb9c9f5626137f
Publikováno v:
Communications Physics, Vol 5, Iss 1, Pp 1-8 (2022)
Random number generators (RNGs) are indispensable tools for information security. The authors derive a security proof for a quantum RNG based on parity-symmetric radioactive decay, which can be made as small as a few-square-millimeter chip and whose
Externí odkaz:
https://doaj.org/article/2dfe892b8afd4b2090511a16afb2e998
Autor:
Mikio Fujiwara, Ryo Nojima, Toyohiro Tsurumaru, Shiho Moriai, Masahiro Takeoka, Masahide Sasaki
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 3, Pp 1-11 (2022)
The quantum key distribution (QKD) network with Vernam's one-time pad encryption and secret sharing are powerful security tools to realize an information theoretically secure (ITS) distributed storage system. In the work of Fujiwara et al., a single-
Externí odkaz:
https://doaj.org/article/fd7b0c8ddf774094b5283817347d4497
Autor:
Masahito Hayashi, Toyohiro Tsurumaru
Publikováno v:
New Journal of Physics, Vol 23, Iss 12, p 129504 (2021)
The paper (Hayashi M and Tsurumaru T 2012 New J. Phys. https://doi.org/10.1088/1367-2630/14/9/093014 https://doi.org/10.1088/1367-2630/14/9/093014 ) contains an error at the definition of g _t ( x ) in section 5.3 while g _t ( x ) is used for the sec
Externí odkaz:
https://doaj.org/article/cd4ee6ccea814f1ea89ef5b8154bc9dc
Autor:
Toyohiro Tsurumaru, Tsubasa Ichikawa
Publikováno v:
New Journal of Physics, Vol 18, Iss 10, p 103043 (2016)
The squash operation, or the squashing model, is a useful mathematical tool for proving the security of quantum key distribution systems using practical (i.e., non-ideal) detectors. At the present, however, this method can only be applied to a limite
Externí odkaz:
https://doaj.org/article/0663ff25306b4111a682e915813e9b01
Autor:
Masahito Hayashi, Toyohiro Tsurumaru
Publikováno v:
New Journal of Physics, Vol 14, Iss 9, p 093014 (2012)
We present a tight security analysis of the Bennett–Brassard 1984 protocol taking into account the finite-size effect of key distillation and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approxima
Externí odkaz:
https://doaj.org/article/de6e97075d1349ffb5d6e981b2646920
Autor:
Mikio Fujiwara, Ryo Nojima, Toyohiro Tsurumaru, Shiho Moriai, Masahiro Takeoka, Masahide Sasaki
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 3, Pp 1-11 (2022)
The quantum key distribution network with Vernam's One Time Pad encryption and secret sharing are powerful security tools to realize an information theoretically secure distributed storage system. In our previous work, a single-password-authenticated
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ebbeca192475c994e94efdd8494369fe
http://arxiv.org/abs/2112.12292
http://arxiv.org/abs/2112.12292
Autor:
Toyohiro Tsurumaru
Privacy amplification (PA) is an indispensable component in classical and quantum cryptography. Error correction (EC) and data compression (DC) algorithms are also indispensable in classical and quantum information theory. We here study these three a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41c8198c1cb7ccfba0d52a6567a8a35a
Autor:
Toyohiro Tsurumaru, Masahito Hayashi
Publikováno v:
New Journal of Physics. 23:129504
The paper (Hayashi M and Tsurumaru T 2012 New J. Phys. 14 093014) contains an error at the definition of g t (x) in section 5.3 while g t (x) is used for the second order asymptotic expansion for the sacrifice bit. This corrigendum corrects this erro
The random number generators (RNGs) are an indispensable tool in cryptography. Of various types of RNG method, those using radiations from nuclear decays (radioactive RNG) has a relatively long history but their security has never been discussed rigo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6056c8f56d7460debb4e1fd0d42b4ad7