Iterative minimization algorithms appear in various areas including mach...
Oblivious transfer is considered as a cryptographic primitive task for
q...
This paper studies one-sided hypothesis testing under random sampling wi...
We propose a new concept, oblivious quantum computation, which requires
...
This paper unifiedly addresses two kinds of key quantum secure tasks, i....
We study commitment scheme for classical-quantum channels. To accomplish...
We derive an analytical calculation formula for the channel capacity of ...
We formulate em algorithm in the framework of Bregman divergence, which ...
We study quantum secure direct communication by using a general preshare...
In quantum private information retrieval (QPIR), a user retrieves a clas...
A multiple access channel (MAC) consists of multiple senders simultaneou...
We propose a new concept of secure list decoding, which is related to
bi...
We study the equivalence between non-perfect secret sharing (NSS) and
sy...
Quantum private information retrieval (QPIR) for quantum messages is the...
We present a broad investigation of asymptotic binary hypothesis testing...
We derive universal classical-quantum superposition coding and universal...
It is natural in a quantum network system that multiple users intend to ...
When there exists a malicious attacker in the network, we need to be car...
When there exists a malicious attacker in the network, we need to consid...
We discuss the effect of sequential error injection on information leaka...
We introduce a variant of randomness extraction framework in the context...
Quantum private information retrieval (QPIR) is a protocol that a user
r...
We give a capacity formula for the classical communication over a noisy
...
In this work, we focus on the classical optical channel having Poissonia...
In this paper we propose a two-way protocol of physical layer security u...
We propose a new cryptographic task, which we call verifiable quantum se...
We study the distribution of brain source from the most advanced brain
i...
In this paper, we study a compute-and-forward (CAF) relaying scheme with...
Quantum private information retrieval (QPIR) is the problem to retrieve ...
We consider the capacity of quantum private information retrieval (QPIR)...
The compute-and-forward (CAF) scheme has attracted great interests due t...
In this paper, we propose a new concept of secure list decoding. While t...
We discuss secure computation of modular sum when multiple access channe...
Secure network coding realizes the secrecy of the message when the messa...
We focus on the optimal value for various information-theoretical tasks....
Compute-and-forward (CAF) relaying is effective to increase bandwidth
ef...
We consider the problem of analyzing a global property of private data, ...
We discuss secure transmission via an untrusted relay when we have a mul...
In the hidden Markovian process, there is a possibility that two differe...
Secure communications is becoming increasingly relevant in the developme...
Compute-and-forward relaying is effective to increase bandwidth efficien...
In this work we study the problem of secure communication over a fully
q...
We analyze the security for network code when the eavesdropper can
conta...