情報基礎理論研究グループ

[Japanese|English]

計算機やネットワーク上で情報を巧みに操るための基礎理論を構築しています。インターネット上の暗号通信プロトコルは本当に安全か? 量子コンピュータ上でうまく動くソフトウェアはどのようなものか?などを、情報科学、計算機科学的手法を用いて追求します。これによって、安全で快適な情報流通サービスの実現を目指します。

グループリーダー 安田 宜仁

研究紹介

発表文献

2024

論文

  1. Seiseki Akibue, Go Kato & Seiichiro Tani (2024). Probabilistic state synthesis based on optimal convex approximation. Quantum Information, 10 (1).
  2. Koizumi Junnosuke & Miyazaki Hiroyasu (2024). A motivic construction of the de Rham-Witt complex. Journal of Pure and Applied Algebra, 228 (6), 107602.
  3. Kazufumi Kimoto & Masato Wakayama (2024). Partition functions for non-commutative harmonic oscillators and related divergent series. Indagation Mathematicae.
  4. Ryosuke Nakahama (2024). Representation theory of sl(2,R). Mathematical Foundations for Post-Quantum Cryptography.
  5. Cid Reyes (2024). Towards hash functions based on group-subgroup pair graphs. Mathematical Foundations for Post-Quantum Cryptography.
  6. Seiseki Akibue, Go Kato & Seiichiro Tani (2024). Probabilistic unitary synthesis with optimal accuracy. ACM Transactions on Quantum Computing, 5 (3), 1-27.
  7. Jisho Miyazaki & Seiseki Akibue (2024). Non-locality of conjugation symmetry: characterization and examples in quantum network sensing. New Journal of Physics, 26 (5), 053017.

2023

論文

  1. Hiroaki Matsunaga, Tomohiro Yendo, Wataru Kihara, Yoshifumi Shiraki, Takashi G. Sato & Takehiro Moriya (2023). I/Q Demodulator based Optical Camera Communicatio. IEEE Photonics Journal, 153, 1138-1146.
  2. Akihiro Mizutani, Yuki Takeuchi & Kiyoshi Tamaki (2023). Finite-key Security Analysis of Differential-Phase-Shift Quantum Key Distribution. Physical Review Research, 5 (2).
  3. Cid Reyes-Bustos & Masato Wakayama (2023). Covering families of the asymmetric quantum Rabi model: η-shifted non-commutative harmonic oscillators. Communications in Mathematical Physics, 403, 1429-1476.
  4. Cid Reyes-Bustos (2023). The heat kernel of the asymmetric quantum Rabi model. Journal of Physics A: Mathematical and Theoretical, 56 (42).
  5. Shane Kelly & Hiroyasu Miyazaki (2023). Hodge cohomology with a ramification filtration, I. Mathematische Zeitschrift, 305 (70).
  6. Shuji Horinaga & Hiroaki Narita (2023). Cuspidal components of Siegel modular forms for large discrete series representations of Sp_4(R). Manuscripta Mathematica, (13).
  7. Tomonori Tanizawa, Yuki Takeuchi, Ryosuke Yoshii & Shunji Tsuchida (2023). Fidelity-estimation method for graph states with depolarizing noise. Physical Review Research, 5 (4).

国際会議予稿

  1. Shuji Horinaga (2023). Cuspidal Components of Siegel Modular Forms for Large Discrete Series Representations. π∞. Sendai, Japan.
  2. Ryo Hiromasa, Akihiro Mizutani, Yuki Takeuchi & Seiichiro Tani (2023). Rewindable Quantum Computation and Its Equivalence to Cloning and Adaptive Postselection. Proc. Theory of Quantum Computation, Communication and Cryptography (TQC). Aveiro, Portugal.
  3. Yuki Takeuchi, Yasuhiro Takahashi, Tomoyuki Morimae & Seiichiro Tani (2023). Divide-and-Conquer Verification Method for Noisy Intermediate-Scale Quantum Computation. Proc. Asian Quantum Information Science Conference (AQIS). Seoul, Korea.
  4. Hiroto Kasai, Yuki Takeuchi, Hideaki Hakoshima, Yuichiro Matsuzaki & Yasuhiro Tokura (2023). Anonymous Quantum Sensing. Proc. The Seventeenth International Conference on Quantum, Nano/Bio, and Micro Technologies(ICQNM 2023). Porto, Portugal.
  5. Ryosuke Nakahama (2023). Holographic and symmetry breaking operators of holomorphic discrete series representations for (SU(3,3), SO*(6)). Proc. Geometric and Harmonic Analysis on Homogeneous Spaces and Applications. Monastir, Tunisia.
  6. Seiseki Akibue, Go Kato & Seiichiro Tani (2023). Optimal convex approximation of quantum superposition and its application in reshaping compilation errors. Proc. Quantum Innovation. Tokyo, Japan.
  7. Yuki Takeuchi (2023). Quantum Computation and Sensing on Network. Proc. The International Symposium on Wireless Personal Multimedia Communications(WPMC2023). Tampa, USA.

2022

論文

  1. Ken Mano, Hideki Sakurada & Yasuyuki Tsukada (2022). Quality and quantity pair as trust metric. IEICE Transactions on Information and Systems.

国際会議予稿

  1. Masato Wakayama (2022). Quantum Interaction and number theory, representation theory - modular forms a bit beyond, infinite symmetric group, Fuchsian ODE. Painlevé Seminar.

2021

論文

  1. G. Curras-Lorenzo, A. Navarrete, K. Azuma, G. Kato, M. Curty, and M. Razavi, "Tight finite-key security for twin-field quantum key distribution," npj Quantum Inf 7, 22, 2021.
  2. Y. Takeuchi, Y. Takahashi, and S. Tani, "Hardness of efficiently generating ground states in postselected quantum computation," Physical Review Reseach, vol. 3, iss. 1, p. 013213, 2021.
  3. Y. Shiraki, T. G. Sato, Y. Kamamoto, T. Izumi, Y. Nakahara, K. Kondo, and T. Moriya, "A Demodulation Method Using a Gaussian Mixture Model for Unsynchronous Optical Camera Communication With on-off Keying," Journal of Lightwave Technology, vol. 39, no. 6, pp. 1742-1755, 15 March15, 2021.
  4. K. Ishikawa, K. Yatabe, and Y. Oikawa, "Physical-model-based reconstruction of axisymmetric three-dimensional sound field from optical interferometric measurement," Measurement Science and Technology, Vol. 32, No. 4, 045202, 04.2021.
  5. R. Sugiura, Y. Kamamoto, and T. Moriya, "Extended-domain Golomb code and symmetry of relative redundancy," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2021.
  6. Y. Takahashi and S. Tani, "Power of uninitialized qubits in shallow quantum circuits," Theoretical Computer Science, Vol. 851, pp. 129-153, 2021.
  7. Y. Takeuchi, Y. Takahashi, and S. Tani, "Hardness of efficiently generating ground states in postselected quantum computation," Physical Review Research, Vol. 3, Iss. 1, p. 013213-1, 2021.

国際会議予稿

  1. Y. Takeuchi, [Invited] "Efficiently generating ground states is hard for postselected quantum computation," Recent progress in theoretical physics based on quantum information theory, 2021.

2020

論文

  1. G. Kato, M. Owari, and K. Maruyama, "Algebra and Hilbert space structures induced by quantum probes," Annals of Physics, vol.412, p. 168046, 2020.
  2. M. Miyauchi, "Topological stack-queue mixed layouts of graphs," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E103.A, no. 2, pp. 510-522, 2020.
  3. Y. Matsuzaki, V. M. Bastidas, Y. Takeuchi, W. J. Munro, and S. Saito, “One-way Transfer of Quantum States via Decoherence,” Journal of the Physical Society of Japan, vol. 89, no. 4, p. 044003, 2020.
  4. M. Pereira, G. Kato, A. Mizutani, M. Curty, and K. Tamaki, "Quantum key distribution with correlated sources," Sci. Adv.6, eaaz4487, 2020.
  5. S. Bauml, K. Azuma, G. Kato, and D. Elkouss, "Linear programs for entanglement and key distribution in the quantum internet," Commun Phys 3, 55, 2020.
  6. T. Hatomura, and G. Kato, "Bounds for nonadiabatic transitions," Phys. Rev. A 102, 012216, 2020.
  7. M. Hayashi, M. Owari, G. Kato, and N. Cai, "Reduction Theorem for Secrecy over Linear Network Code for Active Attacks," Entropy 2020, 22(9), 1053, 2020.
  8. D. Hermawanto, K. Ishikawa, K. Yatabe, and Y. Oikawa, "Determination of Frequency Response of MEMS Microphone from Sound Field Measurements using Optical Phase-shifting Interferometry Method," Applied Acoustics, Vol. 170, 107523, 15.12.2020.
  9. K. Ishikawa, K. Yatabe, and Y. Oikawa, "Seeing the sound of castanets: Acoustic resonances between shells captured by high-speed optical visualization with 1-mm resolution," Journal of the Acoustical Society of America, 148(5), pp. 3171-3180, 2020.
  10. A. Hosoyamada, Y. Sasaki, S. Tani, and K. Xagawa, "Quantum algorithm for the multicollision problem," Theoretical Computer Science, Vol. 842, pp. 100-117, 2020.
  11. P. Yin, Y. Takeuchi, W.-H. Zhang, Z.-Q. Yin, Y. Matsuzaki, X.-X. Peng, X.-Y. Xu, J.-S. Xu, J.-S. Tang, Z.-Q. Zhou, G. Chen, C.-F. Li, and G.-C. Guo, "Experimental Demonstration of Secure Quantum Remote Sensing," Physical Review Applied, Vol. 14, Iss. 1, p. 014065-1, 2020.

国際会議予稿

  1. Y. Takeuchi, T. Morimae, and S. Tani, "Sumcheck-based delegation of quantum computing to rational server," Proc. 16th Annual Conference on Theory and Applications of Models of Computation (TAMC 2020), 2020.
  2. S. Tani, "Quantum Algorithm for Finding the Optimal Variable Ordering for Binary Decision Diagrams”, Proc. 17th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2020), 2020.
  3. Y. Takahashi, Y. Takeuchi, and S. Tani, "Classically simulating quantum circuits with local depolarizing noise, " In Proc. the 45th International Symposium on Mathematical Foundations of Computer Science (MFCS 2020), Leibniz International Proceedings in Informatics (LIPIcs) 170, pp. 83:1-83:13, 2020.

2019

論文

  1. S. Akibue, G. Kato, and N. Marumo, "Perfect discrimination of nonorthogonal quantum states with posterior classical partial information," Physical Review A, vol. 99, iss. 2, p. 020102, 2019.
  2. Y. Takeuchi, Y. Matsuzaki, K. Miyanishi, T. Sugiyama, and W. J.Munro, "Quantum remote sensing with asymmetric information gain," Physical Review A, vol. 99, iss. 2, p. 022325, 2019.
  3. Y. Takeuchi, A. Mantri, T. Morimae, A. Mizutani, and J. F. Fitzsimons, "Resource-efficient verification of quantum computing using Serfling's bound," npj Quantum Information, vol. 5, no. 27, pp.1-8, 2019.
  4. T. Morimae, H. Nishimura, Y. Takeuchi, and S. Tani, "Impossibility of blind quantum sampling for classical client," Quantum Information & Comput. vol. 19, no. 9&10, pp. 793-806, 2019.
  5. Y. Takeuchi, T. Morimae, and M. Hayashi, "Quantum computational universality of hypergraph states with Pauli-X and Z basis measurements," Scientific Reports, vol. 9, no. 13585, pp. 1-14, 2019.
  6. M. Hayashi and Y. Takeuchi, "Verifying commuting quantum computations via fidelity estimation of weighted graph states," New Journal of Physics, vol. 21, no. 093060, 2019.
  7. A. Mizutani, T. Sasaki, Y. Takeuchi, K. Tamaki, and M. Koashi, "Quantum key distribution with simply characterized light sources," npj Quantum Information, vol. 5, no. 87, pp. 1-7, 2019.

国際会議予稿

  1. Y. Takeuchi, [Invited] "Quantum computational universality of hypergraph states with Pauli-X and Z basis measurements," Quantum Information and String Theory 2019, 2019.
  2. A. Hosoyamada, Y. Sasaki, S. Tani, and K. Xagawa, "Improved Quantum Multicollision-Finding Algorithm”, Proc. 10th International Conference on Post-Quantum Cryptography (PQCrypto 2019), pp. 350-367, vol. 11505 of LNCS, Springer, 2019.
  3. T. G. Sato and T. Moriya, "Respiration rate change induced by controlling the phasic relationship between melodic sound and respiration," In Proc. 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 3123-3126, 2019.

2018

論文

  1. Fujii, K., Kobayashi, H., Morimae, T., Nishimura, H., Tamate, S., Tani, S.: Impossibility of Classically Simulating One-Clean-Qubit Model with Multiplicative Error. Physical Review Letters, vol. 120, 200502 (2018).
  2. Akibue, S., Kato, G.: Bipartite discrimination of independently prepared quantum states as a counterexample of a parallel repetition conjecture. Physical Review A, vol. 97, 042309, (2018).
  3. Morimae, T., Takeuchi, Y., Nishimura, H.: Merlin-Arthur with efficient quantum Merlin and quantum supremacy for the second level of the Fourier hierarchy. Quantum, vol. 2, 106 (2018).
  4. Mizutani, A. Sasaki, T., Kato, G., Takeuchi, Y., Tamaki, K.: Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity Quantum Science and Technology, vol. 3,014003(2018)
  5. Tamaki, K., Lo H. K., Mizutani, A., Kato, G., Wen, C. L. C., Azuma, K., Curty. M.,: Security of quantum key distribution with iterative sifting Quantum Science and Technology, vol.3,014002(2018)
  6. Owari, M. Kato, G., Hayashi M.: Single-shot secure quantum network coding on butterfly network with free public communication Quantum Science and Technology, vol.3,014001(2018)
  7. Rigovacca, L., Kato, G., Baeuml, S., Kim, M. S., Munro, W. J., Azuma, K.: Versatile relative entropy bounds for quantum networks. New Journal of Physics, vol. 20, 013033 (2018)

国際会議予稿

  1. Le Gall, F., Morimae, T., Nishimura, H., Takeuchi, Y.: Interactive Proofs with Polynomial-Time Quantum Prover for Computing the Order of Solvable Groups. Proc. of the 43rd International Symposium on Mathematical Foundations of Computer Science (MFCS 2018), pp.26:1-26:13 (2018).
  2. Takahashi, Y. and Tani, S.: Power of uninitialized qubits in shallow quantum circuits, Proc. of the 35th International Symposium on Theoretical Aspects of Computer Science (STACS 2018), LIPIcs 96, pp. 57:1-57:13 (2018).
  3. Akibue, S., Kato, G., Marumo N.: Perfect discrimination of nonorthogonal quantum states with posterior classical partial information. The 1st International Conference on the Quantum Computing(ICoQC 2018)(2018)
  4. Baeum, S., Azuma, K., Kato, G., Elkouss, D.: Linear programs for entanglement and key distribution in the quantum Internet. 18th Asian Quantum Information Science Conference (AQIS 2018) (2018).
  5. Le Gall, F., Morimae, T., Nishimura, H., Takeuchi, Y.: Interactive Proofs with Polynomial-Time Quantum Prover for Computing the Order of Solvable Groups. 18th Asian Quantum Information Science Conference (AQIS 2018) (2018).
  6. Takahashi, Y. and Tani, S.: Power of uninitialized qubits in shallow quantum circuits, 18th Asian Quantum Information Science Conference (AQIS 2018) (2018).
  7. Takeuchi, Y., Morimae, T.: Verification of many-qubit states. 18th Asian Quantum Information Science Conference (AQIS 2018) (2018).
  8. Takeuchi, Y.: Resource-efficient verification of quantum computing using Serfling's bound. AQIS2018 Kyoto satellite workshop on quantum computing (2018).
  9. Akibue, S., Kato, G.: Bipartite discrimination of independently prepared quantum states as a counterexample of a parallel repetition conjecture. The 13th Conference on the Theory of Quantum Computation, Communication and Cryptography(TQC2018)(2018)
  10. Rigovacca, L., Kato, G., Baeuml, S., Kim, M. S., Munro, W. J., Azuma, K.: Versatile relative entropy bounds for quantum networks. 8th International Conference on Quantum Cryptography(Qcrypt2018)(2018)

2017

論文

  1. Hatakeyama, Y., Mizutani, A., Kato, G., Imoto, N., Tamaki, K.: Differential-phase-shift quantum key distribution protocol with small number of random delays. Physical Review A, 95, 042301 (2017).
  2. Tani, S.: A fast exact quantum algorithm for solitude verification. Quantum Information & Computation, Vol. 17, No. 1&2, pp. 15-40 (2017).
  3. Karsaklian Dal Bosco, A., Ohara, S., Sato, N., Akizawa, Y., Uchida, A., Harayama, T., Inubushi, M.: Dynamics versus feedback delay time in photonic integrated circuits: Mapping the short cavity regime.
    IEEE Photonics Journal, Vol. 9, Issue 2 (2017).
  4. Ugajin, K., Terashima, Y., Iwakawa, K., Uchida, A., Harayama, T., Yoshimura, K., Inubushi, M.: Real-time fast physical random number generator with a photonic integrated circuit. Optics Express, Vol. 25, No. 6, pp. 6511-6523 (2017).

国際会議予稿

  1. Azuma, K., Mizutani, A., Lo, H.-K., Kato G.: Theory of the quantum internet. Quantum Information Processing (QIP 2017) (2017).
  2. Hayashi, M., Owari, M., Kato G., Cai, N.: Secrecy and Robustness for Active Attack in Secure Network Coding. IEEE International Symposium on Information Theory (ISIT 2017) (2017).
  3. Mano, K., Sakurada, H., Tsukada, Y.: Trust, Trust Me (The Additivity). IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2017) (2017).
  4. Muramatsu, J., Miyake, S.: On the error probability of stochastic decision and stochastic decoding. IEEE International Symposium on Information Theory (ISIT 2017) (2017).

2016

論文

  1. Takahashi, Y., Tani, S., Yamazaki, T., and Tanaka, K.: Commuting quantum circuits with few outputs are unlikely to be classically simulatable. Quantum Information and Computation, Vol.16, No.3&4, pp.251-270 (2016).
  2. Le Gall, F., Nishimura, H., and Tani, S.: Quantum algorithms for finding constant-sized sub- hypergraphs. Theoretical Computer Science, Vol.609, Part 3, pp. 569-582 (2016).
  3. Kubota, T., Kakutani, Y., Kato, G., Kawano, Y., and Sakurada, H.: Semi-automated verification of security proofs of quantum cryptographic protocols. Journal of Symbolic Computation, Vol. 73, pp. 192-220 (2016).
  4. Kawano, Y., and Sekigawa, H.: Quantum Fourier transform over symmetric groups --- improved result, Journal of Symbolic Computation, Vol. 75, pp. 219-243 (2016).
  5. Kubota, T., Kakutani, Y., Kato, G., Kawano, Y., Sakurada, H.: Semi-Automated Verification of Security Proofs of Quantum Cryptographic Protocols. Journal of Symbolic Computation, 73, 192 (2016).
  6. Kato, G., Tamaki, K.: Security of six-state quantum key distribution protocol with threshold detectors. Scientific Reports, 60044 (2016).
  7. Takeuchi, Y. and Takahashi, Y.: Ancilla-driven instantaneous quantum polynomial time circuit for quantum supremacy. Physical Review A, 94, 062336 (2016).
  8. Takahashi, Y. and Tani, S.: Collapse of the hierarchy of constant-depth exact quantum circuits. Computational Complexity, Vol. 25, Issue 4, pp. 849-881 (2016).
  9. Ambainis, A., Iwama, K., Nakanishi, M., Nishimura, N., Raymond, R., Tani, S., Yamashita, S.: Quantum Query Complexity of Almost All Functions with Fixed On-set Size. Computational Complexity, Vol. 25, No.4, pp. 723-735 (2016).
  10. Tsukada, Y., Sakurada, H., Mano, K., Manabe, Y.: On compositional reasoning about anonymity and privacy in epistemic logic. Annals of Mathematics and Artificial Intelligence, Volume 78, Issue 2, pp. 101-129 (2016).

国際会議予稿

  1. Kato, G., Tamaki, K., Azuma, K., Owari, M.: Security of CV-QKD with transmitted local oscillator.
    Quantum Information Processing (QIP 2016) (2016).
  2. Akibue, S., Owari, M., Kato, G., Murao, M.: Entanglement assisted classical communication simulates “classical communication” without causal order. The International Conference on Quantum Communication, Measurement and Computing (QCMC 2016) (2016).
  3. Fujii, K., Kobayashi, H., Morimae, T., Nishimura, H., Tamate, S., Tani, S.: Power of Quantum Computation with Few Clean Qubits. Proc. 43rd International Colloquium on Automata, Languages and Programming (ICALP 2016), pp. 13:1-13:14 (2016).
  4. Sakurada, H., Yoneyama, K., Hanatani, Y., Yoshida, M.: Analyzing and Fixing the QACCE Security of QUIC. Security Standardisation Research (SSR 2016), pp 1-31 (2016).
  5. K. Fujimoto and J. Muramatsu: Active Bayesian observer correcting overconfidence effects due to E-type confirmatory bias. Proc. IEEE International Conference on Systems, Man, and Cybernetics, pp. 1443-1448 (2016).
  6. J. Muramatsu and S. Miyake: Fundamental limits are achievable with countable alphabet. Proc. International Symposium on Information Theory and its Applications, pp. 573-577 (2016).
  7. J. Muramatsu and S. Miyake: Construction of a channel code from an arbitrary source code with side information. Proc. International Symposium on Information Theory and its Applications, pp. 176-180 (2016).

2015

論文

  1. Inubushi, M., Yoshimura, K., Daivs, P.: Noise robustness of unpredictability in a chaotic laser system Toward reliable physical random bit generation. Physical Review E, 91, 022918 (2015).
  2. Inubushi, M., Yoshimura, K., Arai, K., Davis, P.: Physical random bit generators and their reliability focusing on chaotic laser systems. Nonlinear Theory and Its Applications (NOLTA), IEICE, 6, 2 (2015).
  3. Owari, M., Maruyama, K., Takui, T., and Kato, Go.: Probing an untouchable environment as a resource for quantum computing. Physical Review A, 91, 012343 (2015).

国際会議予稿

  1. Inubushi, M., Takehiro, S., Yamada, M.: Covariant Lyapunov analysis and its application to Navier-Stokes flows. Prog. and Abstract Book of The 9th International Conference on Computational Physics (ICCP9), p.121 (2015).
  2. Inubushi, M., Yoshimura, K., Arai, K., Davis, P.: Noise-robustness of physical random bit generation. The 35th Dynamics Days Europe 2015 (2015).
  3. Inubushi, M. and Yoshimura, K.: Memory capacity and time scales in delay dynamical systems for reservoir computing. The 35th Dynamics Days Europe 2015 (2015).
  4. Owari, M., Maruyama, K., and Kato, G.: Probing an untouchable environment as a resource for quantum computing. Quantum Information Processing (QIP 2015) (2015).
  5. Akibue, S., Owari, M., Kato, G., and Murao, M.: Globalness of separable maps in terms of classical indefinite causal correlations. Quantum Information Processing (QIP 2015) (2015).
  6. Takahashi, Y., Tani, S., Yamazaki, T., and Tanaka, K.: Commuting quantum circuits with few outputs are unlikely to be classically simulatable. Proc. of the 21st International Computing and Combinatorics Conference (COCOON 2015), LNCS, Vol.9198, pp.223-234 (2015).
  7. Takahashi, Y.: On the computational power of constant-depth exact quantum circuits. Computability Theory and Foundations of Mathematics (CTFM 2015) (2015).
  8. Tani, S.: Improved hardness results for classically simulating quantum computation models. Workshop on Quantum Computational Complexity (ICALP 2015 Satellite Workshop, Invited talk), (2015).
  9. Miyauchi, M: Track layouts of Graph Subdivisions. 18th Japan Conference on Discrete and Computational Geometry and Graphs (JCDCG2 2015) (2015).

書籍、解説記事

  1. 吉村和之, 砂田哲, 新井賢一: 共通ランダム信号による同期現象 位相縮約による理論解析と半導体レーザーにおける実験. レーザー研究, 43巻, 6号, pp.376-380 (2015).
  2. 櫻田英樹: 特集編集にあたって. 電子情報通信学会誌, Vol.98, No.11, p.945 (2015).(小特集「非線形理論とその応用」編集リーダー)

2014

論文

  1. Tamaki, K., Curty, M., Kato, G., Lo, H.-K., Azuma, K.: Loss-tolerant quantum cryptography with imperfect sources. Physical Review A, 90, 052314 (2014)
  2. Kawano, Y. and Sekigawa, H.: Quantum Fourier Transform over Symmetric Groups --- Improved Result. ACM Communications in Computer Algebra, Vol.48, No.3, Issue 189, pp.127-129 (2014).
  3. Tanjo, T. and Minami, K. and Mano, K. and Maruyama, H.: Evaluating data utility of privacy-preserving pseudonymized location datasets. Journal of Wireless Mobile Networks Ubiquitous Computing, and Dependable Applications, Vol.5, No.3, pp.63-78 (2014).
  4. Owari, M. and Hayashi, M.: Asymptotic local hypothesis testing between a pure bipartite state and the completely mixed state. Physical Review A, Vol.90, 032327 (2014).
  5. Takahashi, Y., Yamazaki, T., and Tanaka, K.: Hardness of classically simulating quantum circuits with unbounded Toffoli and fan-out gates. Quantum Information and Computation, Vol.14, No.13&14, pp.1149-1164 (2014).
  6. Kobayashi, H., Matsumoto, K., and Tani, S.: Simpler exact leader election via quantum reduction. Chicago Journal of Theoretical Computer Science, Vol.2014, No.10 (2014).
  7. Shinohara, S., Fukushima, T., Sunada, S., Harayama, T., Arai, K., and Yoshimura, K.: Anticorrelated bidirectional output from quasistadium-based semiconductor microlasers. Optical Review, Vol.21, No.2, pp.113-116 (2014).
  8. Sunada, S., Arai, K., Yoshimura, K., and Adachi, M.: Optical phase synchronization by injection of common broadband low-coherent light. Physical Review Letters, Vol.112, No.20, 204101 (2014).
  9. Takahashi, R., Akizawa, Y., Uchida, A., Harayama, T., Tsuzuki, K., Sunada, S., Arai, K., Yoshimura, K., and Davis, P.: Fast physical random bit generation with photonic integrated circuits with different external cavity lengths for chaos generation. Optics Express, Vol.22, No.10, pp.11727-11740 (2014).
  10. Shinohara, S., Sunada, S., Fukushima, T., Harayama, T., Arai, K., and Yoshimura, K.: Efficient optical path folding by using multiple total internal reflections in a microcavity. Applied Physics Letters, Vol.105, No.15, 151111 (2014).
  11. 藤田邦彦, 塚田恭章: 素性構造に基づいたアクセス制御モデルの提案. 情報処理学会論文誌, Vol.55, No.9, pp.2081-2091 (2014).

国際会議予稿

  1. Inubushi, M., Yoshimura, K., Daivs, P.: Noise-robustness of Random Bit Generations by Chaotic Semiconductor Lasers. Proc. of the 2014 International Symposium on Nonlinear Theory and Its Applications (NOLTA 2014), pp.561-564 (2014).
  2. Akibue, S., Owari,M., Kato, G., and Murao, M.: Globalness of separable maps in terms of classical indefinite causal correlations. 14th Asian Quantum Information Science Conference (AQIS 2014) (2014).
  3. Kawano, Y. and Sekigawa, H.: Quantum Fourier Transform over Symmetric Groups --- Improved Result. Proc. of the International Symposium on Symbolic and Algebraic Computation (ISSAC 2014), pp.31-33 (2014).
  4. Kawano, Y. and Sekigawa, H: Quantum Fourier Transform over Symmetric Groups --- Improved Result. XVIII Conference on Quantum Information Processing (QIP 2014) (2014).
  5. Tanjo, T., Minami, K., Mano, K., and Maruyama, H.: On Safety of Pseudonym-based Location Data in the Context of Constraint Satisfation Problems. Proc. of the 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014), pp.511-520 (2014).
  6. Mano, K. and Minami, K. and Maruyama, H.: Pseudonym Exchange for Privacy-Preserving Publishing of Trajectory Data Set. Proc. of 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE 2014), pp.691-695 (2014).
  7. Miyauchi, M.: Track layouts of Graph Subdivisions. Proc. of the 17th Japan-Korea Joint Workshop on Algorithms and Computation (WAAC 2014), pp.145--149 (2014).
  8. Sakurada, H.: Computational Soundness of Symbolic Blind Signatures under Active Attacker. Foundations and Practice of Security (6th International symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers), LNCS, Vol.8352, pp.247-263 (2014).
  9. Le Gall, F., Nishimura, H., and Tani, S.: Quantum algorithms for finding constant-sized sub-hypergraph. Proc. of the 20th International Computing and Combinatorics Conference (COCOON 2014), LNCS, Vol.8591, pp.429-440 (2014).
  10. Doi, Y. and Yoshimura, K.: Constructing a lattice model supporting highly mobile discrete breathers. Proc. of the 2014 International Symposium on Nonlinear Theory and Its Applications (NOLTA 2014), pp.401-403 (2014).
  11. Kakesu, I., Suzuki, N., Uchida, A., Yoshimura, K., Arai, K., and Davis, P.: Frequency dependence of common-signal-induced synchronization in semiconductor lasers with constant-amplitude and random-phase light. Proc. of the 2014 International Symposium on Nonlinear Theory and Its Applications (NOLTA 2014), pp.466-469 (2014).
  12. Sunada, S., Arai, K., Yoshimura, K., and Adachi, M.: Common noise-induced optical phase synchronization in lasers. Proc. of the 2014 International Symposium on Nonlinear Theory and Its Applications (NOLTA 2014), pp.470-473 (2014).
  13. Arai, K., Yoshimura, K., Sunada, S., and Uchida, A.: Synchronization induced by common ASE noise in semiconductor lasers. Proc. of the 2014 International Symposium on Nonlinear Theory and Its Applications (NOLTA 2014), pp.474-477 (2014).
  14. Yoshimura, K., Uchida, A., Muramatsu, J., and Davis, P.: Spectral characteristics of consistency of a single-mode semiconductor laser injected with broadband random light. Proc. of the 2014 International Symposium on Nonlinear Theory and Its Applications (NOLTA 2014), pp.545-548 (2014).

書籍、解説記事

  1. Yoshimura, K., Doi, Y. and Kimura, M.: Localized modes in nonlinear discrete systems. in M. Ohtsu and T. Yatsui (ed.), Progress in Nanophotonics 3, Chap. 4 (Springer-Verlag, Berlin Heidelberg, 2014).
  2. 高橋康博:量子回路と古典回路の相違:加算回路を例として. 情報処理学会誌 「情報処理」, Vol.55, No.7, pp.689-694 (2014).
  3. 高橋康博:ステップ数の少ない量子回路の計算能力. 電子情報通信学会誌, Vol.97, No.12, pp.1110-1114 (2014).
  4. 内田淳史, 吉村和之, 村松純, デイビス ピーター, 原山卓久, 砂田哲: 半導体レーザーのランダム現象を用いた超高速物理乱数生成と相関乱数秘密鍵配送. 日本光学会機関誌「光学」 43巻, 5号 (2014).

2013

  1. Takahashi, Y., Yamazaki, T., and Tanaka, K.: Hardness of classically simulating quantum circuits with unbounded Toffoli and fan-out gates. Proc. of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS 2013), Lecture Notes in Computer Science 8087, pp.801-812 (2013).
  2. Takahashi, Y., and Tani, S.: Collapse of the hierarchy of constant-depth exact quantum circuits. Proc. of the 28th IEEE Conference on Computational Complexity (CCC 2013), pp.168-178 (2013).
  3. Owari M., Maruyama K., and Kato G.: Probing an untouchable environment as a resource for quantum. Workshop on Quantum Metrology, Interaction, and Causal Structure (2013).
  4. Kato G.: Analytical Optimization of Local Quantum Operation and Classical Communication. Math-for-Industry (2013).
  5. Owari M., Maruyama K., Takui T., and Kato G.: Probing an untouchable environment as a resource for quantum computing. NIC@QS (2013).
  6. Kato G., Tamaki K., Azuma K., and Owari M.: Security of CV-QKD with transmitted local oscillator. QCrypt (2013).
  7. Kubota, T., Kakutani, Y., Kato, G., Kawano, Y., and Sakurada, H.: Automated Verification of Equivalence on Quantum Cryptographic Protocols. Proc. of SCSS 2013 Symbolic Computation in Software Science 5th International Symposium, pp.64-69 (2013).
  8. Kawano, Y. and Sekigawa, H.: Quantum Fourier Transform over Symmetric Groups. Proc. of the International Symposium on Symbolic and Algebraic Computation (ISSAC 2013), pp. 227-234 (2013).
  9. Kubota, T., Kakutani, Y., Kato, G., Kawano, Y., and Sakurada, H.: Automated Verification of Equivalence on Quantum Cryptographic Protocols. Proc. of SCSS 2013 Symbolic Computation in Software Science 5th International Symposium, pp.64-69 (2013).
  10. Mano, K., Minami, K., and Maruyama, H.: Privacy-preserving publishing of pseudonym-based trajectory location data set. The 2nd International Workshop on Security of Mobile Applications (IWSMA 2013) , (2013).
  11. Mano, K., Minami, K., and Maruyama, H.: Protecting Location Privacy with K-Confusing Paths Based on Dynamic Pseudonyms. 5th IEEE International Workshop on Security and Social Networking (SESOC 2013), pp. 285-290 (2013).
  12. Tsukada, Y., Sakurada, H., Mano, K., and Manabe, Y.: An Epistemic Approach to Compositional Reasoning about Anonymity and Privacy. Proc. of 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), pp.239-248 (2013).
  13. Mitsunaga, T., Manabe, Y., and Okamoto, T.: Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. IEICE Transactions on Fundamentals of electronics, communications and computer sciences, Vol.E96-A, No.1, pp.68-75 (2013).

2012

  1. Cleve, R., Iwama, K., Le Gall, F., Nishimura, H., Tani, S., Teruyama, J., and Yamashita, S.: Reconstructing strings from substrings with quantum queries. Proc. of Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2013), Lecture Notes in Computer Science 7357, pp. 388-397 (2012).
  2. Kubota, T., Kakutani, T., Kato G., Kawano, Y., and Sakurada, H.: Application of a Process Calculus to Security Proofs of Quantum Protocols, The 2012 International Conference on Foundations of Computer Science, in press (2012).
  3. Tani, S. and Kobayashi, H., and Matsumoto, K.: Exact quantum algorithms for the leader election problem. ACM Transactions on Computation Theory, Vol.4, No.1, Article 1 (2012).
  4. Tani, S.: Compression of View on Anonymous Networks -- Folded View --. IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.2, pp.255-262 (2012).
  5. Owari, M., Hayashi, M.: Asymptotic local hypothesis testing between a pure bipartite state and the completely mixed state, The 2nd Institute of Mathematical Statistics, Asia Pacific Rim Meeting (2012).
  6. Kato, G., Maruyama, K., Owari, M.: The Environment Tomography, The 2nd Institute of Mathematical Statistics, Asia Pacific Rim Meeting (2012).
  7. Azuma, A., Kato, G.: Optimal entanglement manipulation via coherent-state transmission, Physical Review A (PRA) 85, 060303(R) (2012).
  8. Fujita, K. and Tsukada, Y.: An approach to the formal analysis of license interoperability, Elsevier, Computers and Electrical Engineering, Vol. 38, No. 6, pp. 1670-1686 (2012).
  9. Bana, G, Adão, Sakurada, H.: Computationally Complete Symbolic Attacker in Action. IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2012), pp.546-560 (2012).
  10. Adão, P., Bana, G., and Sakurada, H.: Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker (Abstract). Eighth Workshop on Formal and Computational Cryptography (FCC 2012) (2012).
  11. Manabe, Y. and Okamoto, T.: Meta-envy-free Cake-cutting and Pie-cutting Protocols. Journal of Information Processing, Vol.20, No.3, pp.686-693 (2012).
  12. Kiyoshima, S., Manabe, Y., and Okamoto, T.: Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. Proc. of 7th International Workshop on Security (IWSEC2012), LNCS Vol.7631, pp.216-232 (2012).
  13. Manabe, Y. and Okamoto, T.: Meta-envy-free Cake-cutting and Pie-cutting Protocols. Journal of Information Processing, Vol.20, No.3, in press (2012).
  14. Comon-Lundh, H., Hagiya, M., Kawamoto, Y., Sakurada, H.: Computational Soundness of Indistinguishability Properties without Computable Parsing. The 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, Vol.7232, pp.63-79 (2012).
  15. 竹内泉, 真野健: 確率様相論理による秘匿性の証明. 応用数理学会論文誌, Vol.22, No.1, pp.23-45 (2012).
  16. Bana, G. and Comon-Lundh, H.: Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. Proc. of the First International Conference on Principles of Security and Trust (POST 2012), Springer LNCS, Vol.7215, pp.189-208 (2012).
  17. Manabe, Y. and Okamoto, T.: A Cryptographic Moving-knife Cake-Cutting Protocol. Proc. of International Workshop on Interactions, Games and Protocols (iWIGP2012), EPTCS Vol.78, pp.15-23 (2012).
  18. Hermanto, Manabe, Y., and Okamoto, T.: A Simplified Private Stable Matching Algorithm. Financial Cryptography and Data Security (FC 2012) (2012).

メンバー

Last Update: 2025/4/15

関連する研究グループ