-
Breeding protocols are advantageous for finite-length entanglement distillation
Abstract: Bennett et al. proposed a family of protocols for entanglement distillation, namely, hashing, recurrence and breeding protocols. The last one is inferior to the hashing protocol in the asymptotic regime and has been investigated little. In this paper, we propose a framework of converting a stabilizer quantum error-correcting code to a breeding protocol, which is a generalization of the previous co… ▽ More
Submitted 1 February, 2024; v1 submitted 4 January, 2024; originally announced January 2024.
Comments: 9 pages, latex2e, no figure, 1 table, v2 added the two important citations (see the acknowledgment)
-
arXiv:2303.03079 [pdf, ps, other]
Steane enlargement of Entanglement-Assisted Quantum Error-Correcting Codes
Abstract: We introduce a Steane-like enlargement procedure for entanglement-assisted quantum error-correcting codes (EAQECCs) obtained by considering Euclidean inner product. We give formulae for the parameters of these enlarged codes and apply our results to explicitly compute the parameters of enlarged EAQECCs coming from some BCH codes.
Submitted 6 March, 2023; originally announced March 2023.
MSC Class: 81P73 94Bxx
Journal ref: Comp. Appl. Math. 42, 275 (2023)
-
Advance sharing of quantum shares for classical secrets
Abstract: Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand, quantum mechanics extends the capabilities of secret sharing beyond those of classical secret sharing. We propose quantum secret sharing with th… ▽ More
Submitted 17 September, 2022; v1 submitted 3 August, 2022; originally announced August 2022.
Comments: 11 pages, 1 figure, 1 table. Publisher's open access PDF. Results unchanged. This research was in part presented at QCrypt 2022, Taipei City, Taiwan, August 29-September 2, 2022
MSC Class: 94A62 (Primary) 81P94 (Secondary)
Journal ref: IEEE Access, vol.10, pp. 94458-94468, Sept. 2022
-
Explicit method to make shortened stabilizer EAQECC from stabilizer QECC
Abstract: In the previous research by Grassl, Huber and Winter, they proved a theorem which can make entanglement-assisted quantum error-correcting codes (EAQECC) from general quantum error-correcting codes (QECC). In this paper, we prove that the shortened EAQECC is a stabilizer code if the original EAQECC is a stabilizer code.
Submitted 26 May, 2022; originally announced May 2022.
Comments: 5 pages, article.cls, no figure
-
Lee Weight for Nonbinary Quantum Error Correction
Abstract: We propose the quantum Lee weight for quantum errors, provide a Gilbert-Varshamov type bound, and a code construction for the proposed weight.
Submitted 26 May, 2021; originally announced May 2021.
Comments: LaTeX2e, 8 pages, 1 figure
-
Constructions of $\ell$-Adic $t$-Deletion-Correcting Quantum Codes
Abstract: We propose two systematic constructions of deletion-correcting codes for protecting quantum information. The first one works with qudits of any dimension, but only one deletion is corrected and the constructed codes are asymptotically bad. The second one corrects multiple deletions and can construct asymptotically good codes. The second one also allows conversion of stabilizer-based quantum codes… ▽ More
Submitted 21 April, 2021; v1 submitted 8 February, 2021; originally announced February 2021.
Comments: LaTeX2e, 6 pages, no figure, version 2 only corrects typos
Journal ref: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E105-A, no.3, pp.571-575, March 2022
-
Adversarial Patch Attacks on Monocular Depth Estimation Networks
Abstract: Thanks to the excellent learning capability of deep convolutional neural networks (CNN), monocular depth estimation using CNNs has achieved great success in recent years. However, depth estimation from a monocular image alone is essentially an ill-posed problem, and thus, it seems that this approach would have inherent vulnerabilities. To reveal this limitation, we propose a method of adversarial… ▽ More
Submitted 6 October, 2020; originally announced October 2020.
Comments: Publisher's Open Access PDF with the CC-BY copyright. Associated video, data and programs are available at https://www.fujii.nuee.nagoya-u.ac.jp/Research/MonoDepth/
ACM Class: I.4.8
Journal ref: IEEE Access, vol.8, pp.179094-179104, October 2020
-
Machine Learning Guided Discovery of Gigantic Magnetocaloric Effect in HoB$_{2}$ Near Hydrogen Liquefaction Temperature
Abstract: Magnetic refrigeration exploits the magnetocaloric effect which is the entropy change upon application and removal of magnetic fields in materials, providing an alternate path for refrigeration other than the conventional gas cycles. While intensive research has uncovered a vast number of magnetic materials which exhibits large magnetocaloric effect, these properties for a large number of compound… ▽ More
Submitted 12 May, 2020; originally announced May 2020.
Comments: 12 pages including 3 figures and 1 table + 11 pages of supplementary information. Published version available at: https://rdcu.be/b36ep
Journal ref: NPG Asia Materials 12:35 (2020)
-
Improved Gilbert-Varshamov Bound for Entanglement-Assisted Asymmetric Quantum Error Correction by Symplectic Orthogonality
Abstract: We propose and prove an existential theorem for entanglement-assisted asymmetric quantum error correction. Then we demonstrate its superiority over the conventional one.
Submitted 20 May, 2020; v1 submitted 2 March, 2020; originally announced March 2020.
Comments: Publisher's Open Access PDF
MSC Class: 81P73 94B65
Journal ref: IEEE Transactions on Quantum Engineering, vol. 1, Art no. 4100604, 2020
-
arXiv:1911.10031 [pdf, ps, other]
Asymmetric entanglement-assisted quantum error-correcting codes and BCH codes
Abstract: The concept of asymmetric entanglement-assisted quantum error-correcting code (asymmetric EAQECC) is introduced in this article. Codes of this type take advantage of the asymmetry in quantum errors since phase-shift errors are more probable than qudit-flip errors. Moreover, they use pre-shared entanglement between encoder and decoder to simplify the theory of quantum error correction and increase… ▽ More
Submitted 14 January, 2020; v1 submitted 22 November, 2019; originally announced November 2019.
MSC Class: 81P70 (Primary); 94B65; 94B05 (Secondary)
Journal ref: IEEE Access, vol.8, pp.18571-18579, January 2020
-
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets
Abstract: We improve the flexibility in designing access structures of quantum stabilizer-based secret sharing schemes for classical secrets, by introducing message randomization in their encoding procedures. We generalize the Gilbert-Varshamov bound for deterministic encoding to randomized encoding of classical secrets. We also provide an explicit example of a ramp secret sharing scheme with which multiple… ▽ More
Submitted 13 September, 2020; v1 submitted 24 April, 2019; originally announced April 2019.
Comments: Publisher's Open Access PDF. arXiv admin note: text overlap with arXiv:1811.05217
MSC Class: 94A62 81P70 94B65
Journal ref: Designs, Codes and Cryptography, vol.88, no.9, pp.1893-1907, Sept. 2020
-
Rate-Distortion-Perception Tradeoff of Variable-Length Source Coding for General Information Sources
Abstract: Blau and Michaeli recently introduced a novel concept for inverse problems of signal processing, that is, the perception-distortion tradeoff. We introduce their tradeoff into the rate distortion theory of variable-length lossy source coding in information theory, and clarify the tradeoff among information rate, distortion and perception for general information sources. We also discuss the fixed-le… ▽ More
Submitted 30 November, 2018; originally announced December 2018.
Comments: comex.cls, 5 pages, no figure. This is a continuation of the previous letter arXiv:1808.07986
Journal ref: IEICE Communications Express, vol.8, no.2, pp.38-42, Feb. 2019
-
arXiv:1812.05312 [pdf, ps, other]
Entanglement-assisted quantum error-correcting codes over arbitrary finite fields
Abstract: We prove that the known formulae for computing the optimal number of maximally entangled pairs required for entanglement-assisted quantum error-correcting codes (EAQECCs) over the binary field hold for codes over arbitrary finite fields as well. We also give a Gilbert-Varshamov bound for EAQECCs and constructions of EAQECCs coming from punctured self-orthogonal linear codes which are valid for any… ▽ More
Submitted 27 January, 2021; v1 submitted 13 December, 2018; originally announced December 2018.
MSC Class: 81P70; 94B65; 94B05
Journal ref: Quantum Information Processing, vol.18, article ID 116, April 2019
-
Classical Access Structures of Ramp Secret Sharing Based on Quantum Stabilizer Codes
Abstract: In this paper we consider to use the quantum stabilizer codes as secret sharing schemes for classical secrets. We give necessary and sufficient conditions for qualified and forbidden sets in terms of quantum stabilizers. Then we give a Gilbert-Varshamove-type sufficient condition for existence of secret sharing schemes with given parameters, and by using that sufficient condition, we show that rou… ▽ More
Submitted 26 November, 2019; v1 submitted 13 November, 2018; originally announced November 2018.
Comments: Publisher's Open Access PDF with copyright held by the author
Journal ref: Quantum Information Processing, vol.19, no.1, article ID 9, January 2020
-
arXiv:1808.07986 [pdf, ps, other]
Introducing the Perception-Distortion Tradeoff into the Rate-Distortion Theory of General Information Sources
Abstract: Blau and Michaeli recently introduced a novel concept for inverse problems of signal processing, that is, the perception-distortion tradeoff. We introduce their tradeoff into the rate distortion theory of lossy source coding in information theory, and clarify the tradeoff among information rate, distortion and perception for general information sources.
Submitted 23 August, 2018; originally announced August 2018.
Comments: comex.cls, 5 pages, no figure. Accepted for publication in IEICE Communications Express. Article DOI has not been activated as of 24 August 2018. The author was given the right to upload this manuscript to arxiv.org as stated at the footnote 2 in page 13 of http://www.ieice.org/eng/copyright/files/copyright.pdf
Journal ref: IEICE Communications Express, vol.7, no.11, pp.427-431, Nov. 2018
-
arXiv:1803.10392 [pdf, ps, other]
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory
Abstract: We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.
Submitted 27 March, 2018; originally announced March 2018.
Comments: IEEEtran.cls, 3 pages, no figure
Journal ref: Proceedings of 2018 International Symposium on Information Theory and Its Applications, pp. 331-333, October 28-31, 2018, Singapore
-
arXiv:1712.06907 [pdf, ps, other]
Quasi-Cyclic Constructions of Quantum Codes
Abstract: We give sufficient conditions for self-orthogonality with respect to symplectic, Euclidean and Hermitian inner products of a wide family of quasi-cyclic codes of index two. We provide lower bounds for the symplectic weight and the minimum distance of the involved codes. Supported in the previous results, we show algebraic constructions of good quantum codes and determine their parameters.
Submitted 19 December, 2017; originally announced December 2017.
MSC Class: 94B65; 94B15; 81P70
Journal ref: Finite Fields and Their Applications, vol.52, pp.261-280, July 2018
-
arXiv:1705.04087 [pdf, ps, other]
Two Gilbert-Varshamov Type Existential Bounds for Asymmetric Quantum Error-Correcting Codes
Abstract: In this note we report two versions of Gilbert-Varshamov type existential bounds for asymmetric quantum error-correcting codes.
Submitted 19 October, 2017; v1 submitted 11 May, 2017; originally announced May 2017.
Comments: To be published in Quantum Information Processing. svjour3.cls, 6 pages, no figure
MSC Class: 94B65
Journal ref: Quantum Information Processing, vol.16, article 285, 2017
-
arXiv:1702.00942 [pdf, ps, other]
Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
Abstract: The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.
Submitted 3 February, 2017; originally announced February 2017.
Comments: ieice.cls, 3 pages, no figure
Journal ref: IEICE Trans. Fundamentals, vol. E100-A, no. 2, pp. 726-728 (Feb. 2017)
-
arXiv:1701.02911 [pdf, ps, other]
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Abstract: We show a simple example of a secret sharing scheme encoding classical secret to quantum shares that can realize an access structure impossible by classical information processing with limitation on the size of each share. The example is based on quantum stabilizer codes.
Submitted 11 January, 2017; originally announced January 2017.
Comments: LaTeX2e, 5 pages, no figure. Comments from readers are welcome
Journal ref: IEICE Trans. Fundamentals, vol.E100-A, no.12, pp. 2738-2739, Dec. 2017
-
arXiv:1701.02054 [pdf, ps, other]
Unitary Reconstruction of Secret for Stabilizer Based Quantum Secret Sharing
Abstract: We propose a unitary procedure to reconstruct quantum secret for a quantum secret sharing scheme constructed from stabilizer quantum error-correcting codes. Erasure correcting procedures for stabilizer codes need to add missing shares for reconstruction of quantum secret while unitary reconstruction procedures for certain class of quantum secret sharing are known to work without adding missing sha… ▽ More
Submitted 5 July, 2017; v1 submitted 8 January, 2017; originally announced January 2017.
Comments: svjour3.cls, 8 pages, no figure. To be published in Quantum Information Processing
MSC Class: 81P94; 94A62 ACM Class: E.3
Journal ref: Quantum Information Processing, vol.16, no.8, article 202, August 2017
-
arXiv:1612.01888 [pdf, ps, other]
Relative generalized matrix weights of matrix codes for universal security on wire-tap networks
Abstract: Universal security over a network with linear network coding has been intensively studied. However, previous linear codes and code pairs used for this purpose were linear over a larger field than that used on the network, which restricts the possible packet lengths of optimal universal secure codes, does not allow to apply known list-decodable rank-metric codes and requires performing operations o… ▽ More
Submitted 25 August, 2017; v1 submitted 6 December, 2016; originally announced December 2016.
Comments: 21 pages, LaTeX; Parts of this manuscript have been presented at the 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 2016. Conference version available at arXiv:1607.01263
MSC Class: 15A03; 15B33; 94B05; 94C99
Journal ref: IEEE Trans. Inform. Theory, vol.64, no.4, pp.2529-2549, Apr. 2018
-
arXiv:1607.01263 [pdf, ps, other]
Unifying notions of generalized weights for universal security on wire-tap networks
Abstract: Universal security over a network with linear network coding has been intensively studied. However, previous linear codes used for this purpose were linear over a larger field than that used on the network. In this work, we introduce new parameters (relative dimension/rank support profile and relative generalized matrix weights) for linear codes that are linear over the field used in the network,… ▽ More
Submitted 5 December, 2016; v1 submitted 5 July, 2016; originally announced July 2016.
Comments: 8 pages, LaTeX; the current version will appear in the Proceedings of the 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 2016
MSC Class: 15A03; 15B33; 94B05; 94C99
Journal ref: Proc. 2016 54th Annual Allerton Conference on Communication, Control, and Computing, pp.800-807, Monticello, Illinois, USA, September 27-30, 2016
-
arXiv:1504.05628 [pdf, ps, other]
Key Rate of the B92 Quantum Key Distribution Protocol with Finite Qubits
Abstract: The key rate of the B92 quantum key distribution protocol had not been reported before this research when the number of qubits is finite. We compute it by using the security analysis framework proposed by Scarani and Renner in 2008.
Submitted 21 April, 2015; originally announced April 2015.
Comments: 4 pages, 2 figures, IEEEtran.cls. Some overlap with arXiv:1301.5083. Accepted for presentation in 2015 IEEE International Symposium on Information Theory, Hong Kong, June 14-19, 2015
-
arXiv:1502.05507 [pdf, ps, other]
On asymptotically good ramp secret sharing schemes
Abstract: Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstru… ▽ More
Submitted 2 February, 2017; v1 submitted 19 February, 2015; originally announced February 2015.
MSC Class: 94A62; 94B27; 94B65
Journal ref: IEICE Trans. Fundamentals. vol. E100-A, no. 12, pages 2699-2708 (2017)
-
arXiv:1410.5126 [pdf, ps, other]
Strongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields
Abstract: The first construction of strongly secure quantum ramp secret sharing by Zhang and Matsumoto had an undesirable feature that the dimension of quantum shares must be larger than the number of shares. By using algebraic curves over finite fields, we propose a new construction in which the number of shares can become arbitrarily large for fixed dimension of shares.
Submitted 19 October, 2014; originally announced October 2014.
Comments: svjour3.cls, 8 pages, no figure
MSC Class: 81P94 (Primary) 94A62; 94B27 (Secondary)
Journal ref: Advances in Mathematics of Communications, vol. 13, no. 1, pp. 1-10, February 2019
-
arXiv:1405.0149 [pdf, ps, other]
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Abstract: We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Necessary and sufficient conditions for qualified sets and forbidden sets are given in terms of combinatorial properties of nested linear codes. An algebraic geometric construction for quantum secret sharing is also given.
Submitted 20 December, 2014; v1 submitted 1 May, 2014; originally announced May 2014.
Comments: svjour3.cls, 12 pages, no figure. Version 5 added citations to relevant prior papers that were missing in previous versions. Contents unchanged
MSC Class: 81P94 (Primary) 94A62; 94B27 (Secondary) ACM Class: E.3
Journal ref: IEICE Trans. Fundamentals, vol.E101-A, no.8, pp.1215-1222, Aug. 2018
-
arXiv:1404.0434 [pdf, ps, other]
New Asymptotic Metrics for Relative Generalized Hamming Weight
Abstract: It was recently shown that RGHW (relative generalized Hamming weight) exactly expresses the security of linear ramp secret sharing scheme. In this paper we determine the true value of the asymptotic metric for RGHW previously proposed by Zhuang et al. in 2013. Then we propose new asymptotic metrics useful for investigating the optimal performance of linear ramp secret sharing scheme constructed fr… ▽ More
Submitted 1 April, 2014; originally announced April 2014.
Comments: 3 pages, 1 figure, IEEEtran.cls. To be presented at 2014 IEEE International Symposium on Information Theory, June 29-July 4, 2014 Hawai'i Convention Center, Honolulu, HI, USA
MSC Class: 94B65
Journal ref: Proc. 2014 IEEE International Symposium on Information Theory, pp. 3142-3144
-
arXiv:1403.7985 [pdf, ps, other]
Relative generalized Hamming weights of one-point algebraic geometric codes
Abstract: Security of linear ramp secret sharing schemes can be characterized by the relative generalized Hamming weights of the involved codes. In this paper we elaborate on the implication of these parameters and we devise a method to estimate their value for general one-point algebraic geometric codes. As it is demonstrated, for Hermitian codes our bound is often tight. Furthermore, for these codes the r… ▽ More
Submitted 24 July, 2014; v1 submitted 31 March, 2014; originally announced March 2014.
Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 10, pp. 5938-5949, October 2014
-
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
Abstract: By extending the notion of minimum rank distance, this paper introduces two new relative code parameters of a linear code C_1 of length n over a field extension and its subcode C_2. One is called the relative dimension/intersection profile (RDIP), and the other is called the relative generalized rank weight (RGRW). We clarify their basic properties and the relation between the RGRW and the minimum… ▽ More
Submitted 14 May, 2015; v1 submitted 23 January, 2013; originally announced January 2013.
Comments: IEEEtran.cls, 25 pages, no figure, accepted for publication in IEEE Transactions on Information Theory
-
arXiv:1301.5083 [pdf, ps, other]
Improved Asymptotic Key Rate of the B92 Protocol
Abstract: We analyze the asymptotic key rate of the single photon B92 protocol by using Renner's security analysis given in 2005. The new analysis shows that the B92 protocol can securely generate key at 6.5% depolarizing rate, while the previous analyses cannot guarantee the secure key generation at 4.2% depolarizing rate.
Submitted 22 January, 2013; originally announced January 2013.
Comments: IEEEtran.sty, 3 pages, 1 figure. Submitted to IEEE ISIT 2013
Journal ref: Proc. 2013 IEEE International Symposium on Information Theory, pp. 351-353
-
arXiv:1210.6722 [pdf, ps, other]
Feng-Rao decoding of primary codes
Abstract: We show that the Feng-Rao bound for dual codes and a similar bound by Andersen and Geil [H.E. Andersen and O. Geil, Evaluation codes from order domain theory, Finite Fields Appl., 14 (2008), pp. 92-123] for primary codes are consequences of each other. This implies that the Feng-Rao decoding algorithm can be applied to decode primary codes up to half their designed minimum distance. The technique… ▽ More
Submitted 31 October, 2012; v1 submitted 24 October, 2012; originally announced October 2012.
Comments: elsarticle.cls, 23 pages, no figure. Version 3 added citations to the works by I.M. Duursma and R. Pellikaan
MSC Class: 94B65 (Primary) 94B35 (Secondary)
Journal ref: Finite Fields and Their Applications, vol. 23, pp. 35-52, September 2013
-
arXiv:1207.1936 [pdf, ps, other]
New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding
Abstract: The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes. Inspired by their result, this paper considers the secure network coding based on arbitrary linear codes, and investigates its security performance and error correction capability that are guaranteed inde… ▽ More
Submitted 29 September, 2012; v1 submitted 8 July, 2012; originally announced July 2012.
Comments: IEEEtran.cls, 8 pages, no figure. To appear in Proc. 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2012). Version 2 added an exact expression of the universal error correction capability in terms of the relative generalized rank weight
Journal ref: Proceedings of 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.533 -- 540, 1--5 Oct. 2012
-
arXiv:1203.6129 [pdf, ps, other]
Generalization of the Lee-O'Sullivan List Decoding for One-Point AG Codes
Abstract: We generalize the list decoding algorithm for Hermitian codes proposed by Lee and O'Sullivan based on Gröbner bases to general one-point AG codes, under an assumption weaker than one used by Beelen and Brander. Our generalization enables us to apply the fast algorithm to compute a Gröbner basis of a module proposed by Lee and O'Sullivan, which was not possible in another generalization by Lax.
Submitted 7 March, 2013; v1 submitted 27 March, 2012; originally announced March 2012.
Comments: article.cls, 14 pages, no figure. The order of authors was changed. To appear in Journal of Symbolic Computation. This is an extended journal paper version of our earlier conference paper arXiv:1201.6248
MSC Class: 94B35 (Primary) 13P10; 94B27; 14G50 (Secondary) ACM Class: E.4; F.2.1; I.1.2; I.1.4
Journal ref: Journal of Symbolic Computation, vol. 55, pp. 1-9, August 2013
-
arXiv:1203.6127 [pdf, ps, other]
List Decoding Algorithm based on Voting in Groebner Bases for General One-Point AG Codes
Abstract: We generalize the unique decoding algorithm for one-point AG codes over the Miura-Kamiya Cab curves proposed by Lee, Bras-Amorós and O'Sullivan (2012) to general one-point AG codes, without any assumption. We also extend their unique decoding algorithm to list decoding, modify it so that it can be used with the Feng-Rao improved code construction, prove equality between its error correcting capabi… ▽ More
Submitted 18 February, 2016; v1 submitted 27 March, 2012; originally announced March 2012.
Comments: Accepted for publication in J. Symbolic Computation. LaTeX2e article.cls, 42 pages, 4 tables, no figures. Ver. 6 added an illustrative example of the algorithm execution
MSC Class: 94B35 (Primary); 13P10; 94B27; 14G50 (Secondary) ACM Class: E.4; F.2.1; I.1.2; I.1.4
Journal ref: J. Symbolic Computation, vol.79, pp.384-410, 2017
-
arXiv:1202.1332 [pdf, ps, other]
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
Abstract: The secure multiplex coding (SMC) is a technique to remove rate loss in the coding for wire-tap channels and broadcast channels with confidential messages caused by the inclusion of random bits into transmitted signals. SMC replaces the random bits by other meaningful secret messages, and a collection of secret messages serves as the random bits to hide the rest of messages. In the previous resear… ▽ More
Submitted 1 February, 2016; v1 submitted 6 February, 2012; originally announced February 2012.
Comments: We made several changes to improve the presentation
Journal ref: IEEE Transactions on Information Theory, Volume 62, Issue 5, 2355 - 2409 (2016)
-
arXiv:1201.6248 [pdf, ps, other]
List Decoding Algorithms based on Groebner Bases for General One-Point AG Codes
Abstract: We generalize the list decoding algorithm for Hermitian codes proposed by Lee and O'Sullivan based on Gröbner bases to general one-point AG codes, under an assumption weaker than one used by Beelen and Brander. By using the same principle, we also generalize the unique decoding algorithm for one-point AG codes over the Miura-Kamiya $C_{ab}$ curves proposed by Lee, Bras-Amorós and O'Sullivan to gen… ▽ More
Submitted 23 April, 2012; v1 submitted 30 January, 2012; originally announced January 2012.
Comments: IEEEtran.cls, 5 pages, no figure. To appear in Proc. 2012 IEEE International Symposium on Information Theory, July 1-6, 2012, Boston, MA, USA. Version 4 corrected wrong description of the work by Lee, Bras-Amorós and O'Sullivan, and added four references
MSC Class: 94B35 (Primary) 13P10; 94B27; 14G50 (Secondary) ACM Class: E.4; F.2.1; I.1.2; I.1.4
Journal ref: Proc. 2012 IEEE International Symposium on Information Theory, July 1-6, 2012, Boston, MA, USA, pages 86-90
-
arXiv:1111.4174 [pdf, ps, other]
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages
Abstract: We consider the random linear precoder at the source node as a secure network coding. We prove that it is strongly secure in the sense of Harada and Yamamoto and universal secure in the sense of Silva and Kschischang, while allowing arbitrary small but nonzero mutual information to the eavesdropper. Our security proof allows statistically dependent and non-uniform multiple secret messages, while a… ▽ More
Submitted 12 April, 2017; v1 submitted 17 November, 2011; originally announced November 2011.
Comments: 10 pages, 1 figure, IEEEtrans.cls. Online published in IEEE Trans. Inform. Theory
-
arXiv:1109.4074 [pdf, ps, other]
Secure Multiplex Coding Over Interference Channel with Confidential Messages
Abstract: In this paper, inner and outer bounds on the capacity region of two-user interference channels with two confidential messages have been proposed. By adding secure multiplex coding to the error correction method in [15] which achieves the best achievable capacity region for interference channel up to now, we have shown that the improved secure capacity region compared with [2] now is the whole Han-… ▽ More
Submitted 19 September, 2011; v1 submitted 19 September, 2011; originally announced September 2011.
Comments: 10 pages, 6 figures
-
arXiv:1104.4285 [pdf, ps, other]
Universally Attainable Error and Information Exponents, and Equivocation Rate for the Broadcast Channels with Confidential Messages
Abstract: We show universally attainable exponents for the decoding error and the mutual information and universally attainable equivocation rates for the conditional entropy for the broadcast channels with confidential messages. The error exponents are the same as ones given by Korner and Sgarro for the broadcast channels with degraded message sets.
Submitted 3 October, 2011; v1 submitted 21 April, 2011; originally announced April 2011.
Comments: IEEEtran.sty, 6 pages, resubmitted to Allerton Conference. Ver. 1 incorrectly stated \exp(ψ) is concave in Prop. 7, which is corrected in V2. V3 changed the title and the proof argument. The results are the same in all versions
-
arXiv:1102.3002 [pdf, ps, other]
Secure Multiplex Network Coding
Abstract: In the secure network coding for multicasting, there is loss of information rate due to inclusion of random bits at the source node. We show a method to eliminate that loss of information rate by using multiple statistically independent messages to be kept secret from an eavesdropper. The proposed scheme is an adaptation of Yamamoto et al.'s secure multiplex coding to the secure network coding.
Submitted 5 June, 2011; v1 submitted 15 February, 2011; originally announced February 2011.
Comments: IEEEtran.sty, 7 pages, no figure, Version 2 will appear in Proc. NetCod 2011, Beijing, China. Version 3 adds an appendix proving that the mutual information can be made exactly zero
-
arXiv:1101.4036 [pdf, ps, other]
Secure Multiplex Coding with a Common Message
Abstract: We determine the capacity region of the secure multiplex coding with a common message, and evaluate the mutual information and the equivocation rate of a collection of secret messages to the second receiver (eavesdropper), which were not evaluated by Yamamoto et al.
Submitted 24 May, 2011; v1 submitted 20 January, 2011; originally announced January 2011.
Comments: 5 pages, no figure, IEEEtran.sty, final version to appear in Proc. ISIT 2011
Journal ref: Proc. 2011 IEEE ISIT, pp. 1965-1969, Saint Petersburg, Russia, July 31-August 5, 2011
-
arXiv:1010.0743 [pdf, ps, other]
Strong security and separated code constructions for the broadcast channels with confidential messages
Abstract: We show that the capacity region of the broadcast channel with confidential messages does not change when the strong security criterion is adopted instead of the weak security criterion traditionally used. We also show a construction method of coding for the broadcast channel with confidential messages by using an arbitrary given coding for the broadcast channel with degraded message sets.
Submitted 24 May, 2011; v1 submitted 4 October, 2010; originally announced October 2010.
Comments: LaTeX2e, two column, 9 pages, no figure, improved version registered as arXiv:1101.4036
-
A construction of universal secure network coding
Abstract: We construct a universal secure network coding. Our construction just modifies the transmission scheme at the source node and works with every linear coding at an intermediate node. We relax the security criterion such that the mutual information between the message and the eavesdropped signal is sufficiently small instead of strictly zero. Our construction allows the set of eavesdropped links to… ▽ More
Submitted 15 February, 2011; v1 submitted 24 June, 2010; originally announced June 2010.
Comments: This paper has been withdrawn by the author. The proof technique in this paper does not ensure the existence of a coding scheme that is secure against all the eavesdropping matrices of rank less than or equal to μ, which means that the proof does not prove the universal security as originally claimed. A much extended and corrected version of this paper was registered as arXiv:1102.3002. The author appreciates the helpful comment by Dr. Jun Muramatsu
-
arXiv:1003.1787 [pdf, ps, other]
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Abstract: Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. We give a proof for the impossibility of attaining universal security against such adversaries using Silva et al… ▽ More
Submitted 1 November, 2010; v1 submitted 9 March, 2010; originally announced March 2010.
Comments: 7 pages, no figure, ieice.cls, a part of this paper was presented in 2010 IEEE International Symposium on Information Theory. The proofs in V2 became more readable than V1, but the results unchanged
Journal ref: IEICE Trans. Fundamentals, vol. 93, no. 11, pp. 2026-2033, Nov. 2010
-
arXiv:1001.1197 [pdf, ps, other]
Construction of wiretap codes from ordinary channel codes
Abstract: From an arbitrary given channel code over a discrete or Gaussian memoryless channel, we construct a wiretap code with the strong security. Our construction can achieve the wiretap capacity under mild assumptions. The key tool is the new privacy amplification theorem bounding the eavesdropped information in terms of the Gallager function.
Submitted 8 January, 2010; originally announced January 2010.
Comments: 5 pages, no figure, IEEEtran.cls. Submitted to 2010 IEEE ISIT
Journal ref: Proc. 2010 IEEE ISIT, pp. 2538-2542, Austin, Texas, USA, June 13-18, 2010
-
arXiv:0908.2042 [pdf, ps, other]
Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols
Abstract: The information reconciliation in a quantum key distribution protocol can be studied separately from other steps in the protocol. The problem of information reconciliation can be reduced to that of distributed source coding. Its solution by LDPC codes is reviewed. We list some obstacles preventing the LDPC-based distributed source coding from becoming a more favorable alternative to the Cascade… ▽ More
Submitted 13 September, 2009; v1 submitted 14 August, 2009; originally announced August 2009.
Comments: 10 pages, 1 figure. short survey article
Report number: IT2009-41
-
arXiv:0906.2582 [pdf, ps, other]
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
Abstract: The privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by the privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distan… ▽ More
Submitted 7 March, 2011; v1 submitted 14 June, 2009; originally announced June 2009.
Comments: 10 pages, no figure, A part of this paper will be presented at 2009 IEEE International Symposium on Information Theory in Seoul, Korea. Version 2 is a published version. The results are not changed from version 1. Explanations are polished and some references are added. In version 3, only style and DOI are edited
Journal ref: IEICE Trans. Fundamentals, vol. 93, no. 9, pp. 1650-1659, September 2010
-
arXiv:0901.2410 [pdf, ps, other]
On the Energy Benefit of Network Coding for Wireless Multiple Unicast
Abstract: We consider the energy savings that can be obtained by employing network coding instead of plain routing in wireless multiple unicast problems. We establish lower bounds on the benefit of network coding, defined as the maximum of the ratio of the minimum energy required by routing and network coding solutions, where the maximum is over all configurations. It is shown that if coding and routing sol… ▽ More
Submitted 18 August, 2011; v1 submitted 16 January, 2009; originally announced January 2009.
Journal ref: EURASIP Journal on Wireless Communications and Networking, Vol. 2010 (2010), Art.ID 605421
-
arXiv:0806.4510 [pdf, ps, other]
On Field Size and Success Probability in Network Coding
Abstract: Using tools from algebraic geometry and Groebner basis theory we solve two problems in network coding. First we present a method to determine the smallest field size for which linear network coding is feasible. Second we derive improved estimates on the success probability of random linear network coding. These estimates take into account which monomials occur in the support of the determinant o… ▽ More
Submitted 27 June, 2008; originally announced June 2008.
Comments: 16 pages, 3 figures, 2 tables. Accepted for publication at International Workshop on the Arithmetic of Finite Fields, WAIFI 2008
Journal ref: Proceedings of the 2nd International Workshop on the Arithmetic of Finite Fields, WAIFI 2008, pp. 157-173