Skip to main content

Showing 1–50 of 110 results for author: Hayashi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.11025  [pdf, other

    quant-ph cs.IT cs.LG

    Generalization Bounds for Quantum Learning via Rényi Divergences

    Authors: Naqueeb Ahmad Warsi, Ayanava Dasgupta, Masahito Hayashi

    Abstract: This work advances the theoretical understanding of quantum learning by establishing a new family of upper bounds on the expected generalization error of quantum learning algorithms, leveraging the framework introduced by Caro et al. (2024) and a new definition for the expected true loss. Our primary contribution is the derivation of these bounds in terms of quantum and classical Rényi divergences… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

    Comments: 36 pages, 2 figures

  2. arXiv:2504.00911  [pdf, other

    cs.SE

    Foundation Models for Autonomous Driving System: An Initial Roadmap

    Authors: Xiongfei Wu, Mingfei Cheng, Qiang Hu, Jianlang Chen, Yuheng Huang, Manabu Okada, Michio Hayashi, Tomoyuki Tsuchiya, Xiaofei Xie, Lei Ma

    Abstract: Recent advancements in Foundation Models (FMs), such as Large Language Models (LLMs), have significantly enhanced Autonomous Driving Systems (ADSs) by improving perception, reasoning, and decision-making in dynamic and uncertain environments. However, ADSs are highly complex cyber-physical systems that demand rigorous software engineering practices to ensure reliability and safety. Integrating FMs… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

  3. arXiv:2502.01464  [pdf, other

    quant-ph cs.IT

    Predicting symmetries of quantum dynamics with optimal samples

    Authors: Masahito Hayashi, Yu-Ao Chen, Chenghong Zhu, Xin Wang

    Abstract: Identifying symmetries in quantum dynamics, such as identity or time-reversal invariance, is a crucial challenge with profound implications for quantum technologies. We introduce a unified framework combining group representation theory and subgroup hypothesis testing to predict these symmetries with optimal efficiency. By exploiting the inherent symmetry of compact groups and their irreducible re… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

    Comments: 16 pages including appendix

  4. arXiv:2501.00281  [pdf, other

    cs.IT cs.CR

    String commitment from unstructured noisy channels

    Authors: Jiawei Wu, Masahito Hayashi, Marco Tomamichel

    Abstract: Noisy channels are valuable resources for cryptography, enabling information-theoretically secure protocols for cryptographic primitives like bit commitment and oblivious transfer. While existing work has primarily considered memoryless channels, we consider more flexible channel resources that a dishonest player can configure arbitrarily within some constraints on their min-entropy. We present a… ▽ More

    Submitted 31 December, 2024; originally announced January 2025.

    Comments: 18 pages, 2 figures

  5. arXiv:2410.16704  [pdf, other

    quant-ph cs.ET cs.IT

    Resolvability of classical-quantum channels

    Authors: Masahito Hayashi, Hao-Chung Cheng, Li Gao

    Abstract: Channel resolvability concerns the minimum resolution for approximating the channel output. We study the resolvability of classical-quantum channels in two settings, for the channel output generated from the worst input, and form the fixed independent and identically distributed (i.i.d.) input. The direct part of the worst-input setting is derived from sequential hypothesis testing as it involves… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

    Comments: 20 pages, 3 figures. Comments are welcome!

  6. Universal tester for multiple independence testing and classical-quantum arbitrarily varying multiple access channel

    Authors: Ayanava Dasgupta, Naqueeb Ahmad Warsi, Masahito Hayashi

    Abstract: We study two kinds of different problems. One is the multiple independence testing, which can be considered as a kind of generalization of quantum Stein's lemma. We test whether the quantum system is correlated to the classical system or is independent of it. Here, the null hypothesis is composed of states having the quantum system is correlated to the classical system in an arbitrarily varying fo… ▽ More

    Submitted 9 September, 2024; originally announced September 2024.

    Comments: 60 pages

  7. arXiv:2408.05454  [pdf, other

    math.OC cs.IT quant-ph

    Bregman-divergence-based Arimoto-Blahut algorithm

    Authors: Masahito Hayashi

    Abstract: We generalize the generalized Arimoto-Blahut algorithm to a general function defined over Bregman-divergence system. In existing methods, when linear constraints are imposed, each iteration needs to solve a convex minimization. Exploiting our obtained algorithm, we propose a minimization-free-iteration algorithm. This algorithm can be applied to classical and quantum rate-distortion theory. We num… ▽ More

    Submitted 8 March, 2025; v1 submitted 10 August, 2024; originally announced August 2024.

  8. arXiv:2406.16662  [pdf, other

    cs.IT

    Adaptive Coding for Two-Way Wiretap Channel under Strong Secrecy

    Authors: Yanling Chen, Masahito Hayashi

    Abstract: This paper studies adaptive coding for the two-way wiretap channel. Especially, the strong secrecy metric is of our interest that is defined by the information leakage of transmitted messages to the eavesdropper. First, we consider an adaptive coding, the construction of which is based on running the well studied non-adaptive coding in several rounds and the dependency between the adjacent rounds… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2310.13881

  9. arXiv:2406.09854  [pdf, other

    quant-ph cs.IT

    Three-Receiver Quantum Broadcast Channels: Classical Communication with Quantum Non-unique Decoding

    Authors: Farzin Salek, Patrick Hayden, Masahito Hayashi

    Abstract: In network communication, it is common in broadcasting scenarios for there to exist a hierarchy among receivers based on information they decode due, for example, to different physical conditions or premium subscriptions. This hierarchy may result in varied information quality, such as higher-quality video for certain receivers. This is modeled mathematically as a degraded message set, indicating… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  10. arXiv:2403.09252  [pdf, other

    cs.IT math.OC quant-ph

    Reverse em-problem based on Bregman divergence and its application to classical and quantum information theory

    Authors: Masahito Hayashi

    Abstract: The recent paper (IEEE Trans. IT 69, 1680) introduced an analytical method for calculating the channel capacity without the need for iteration. This method has certain limitations that restrict its applicability. Furthermore, the paper does not provide an explanation as to why the channel capacity can be solved analytically in this particular case. In order to broaden the scope of this method and… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  11. arXiv:2311.10297  [pdf, other

    cs.IT

    Secure network coding with adaptive and active attack

    Authors: Masahito Hayashi

    Abstract: Ning Cai and the author jointly studied secure network codes over adaptive and active attacks, which were rarely studied until these seminal papers. This paper reviews the result for secure network code over adaptive and active attacks. We focus on two typical network models, a one-hop relay network and a unicast relay network.

    Submitted 7 January, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

  12. arXiv:2310.15519  [pdf, other

    cs.IT

    Covert communication with Gaussian noise: from random access channel to point-to-point channel

    Authors: Masahito Hayashi, Angeles Vazquez-Castro

    Abstract: We propose a covert communication protocol for the spread-spectrum multiple random access with additive white Gaussian noise (AWGN) channel. No existing paper has studied covert communication for the random access channel. Our protocol assumes binary discrete phase-shift keying (BPSK) modulation, and it works well under imperfect channel state information (I-CSI) for both the legitimate and advers… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  13. Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints

    Authors: Masahito Hayashi, Yanling Chen

    Abstract: This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions for the TW-WC under strong joint and individual secrecy constraints. For the TW-WC without cost constr… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Journal ref: IEEE Transactions on Information Theory, vol. 70, 4611 - 4633 (2024)

  14. Iterative minimization algorithm on a mixture family

    Authors: Masahito Hayashi

    Abstract: Iterative minimization algorithms appear in various areas including machine learning, neural networks, and information theory.The em algorithm is one of the famous iterative minimization algorithms in the area of machine learning, and the Arimoto-Blahut algorithm is a typical iterative algorithm in the area of information theory.However, these two topics had been separately studied for a long time… ▽ More

    Submitted 31 December, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

  15. arXiv:2211.03308  [pdf, other

    quant-ph cs.CR cs.IR cs.IT

    Two-Server Oblivious Transfer for Quantum Messages

    Authors: Masahito Hayashi, Seunghoan Song

    Abstract: Oblivious transfer is considered as a cryptographic primitive task for quantum information processing over quantum network. Although it is possible with two servers, any existing protocol works only with classical messages. We propose two-server oblivious transfer protocols for quantum messages.

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: Advanced Quantum Technologies, 2300184 (2024)

  16. arXiv:2211.00962  [pdf, other

    quant-ph cs.CR

    Oblivious Quantum Computation and Delegated Multiparty Quantum Computation

    Authors: Masahito Hayashi

    Abstract: We propose a new concept, oblivious quantum computation, which requires performing oblivious transfer with respect to the computation outcome of the quantum computation, where the secrecy of the input qubits and the program to identify the quantum gates are required. Exploiting quantum teleportation, we propose a two-server protocol for this task, which realizes an exponential improvement for the… ▽ More

    Submitted 11 May, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

  17. arXiv:2205.14622  [pdf, other

    quant-ph cs.CR cs.IR cs.IT

    Unified Approach to Secret Sharing and Symmetric Private Information Retrieval with Colluding Servers in Quantum Systems

    Authors: Masahito Hayashi, Seunghoan Song

    Abstract: This paper unifiedly addresses two kinds of key quantum secure tasks, i.e., quantum versions of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi-target monotone span program (MMSP), which characterizes the classical linear protocols of SS and SPIR. SS has two quantum extensions; One is the classical-quantum (CQ) setting, in which the secret to be sent is classi… ▽ More

    Submitted 17 February, 2023; v1 submitted 29 May, 2022; originally announced May 2022.

    Journal ref: IEEE Transactions on Information Theory, Volume: 69, Issue: 10, 6537 - 6563 (2023)

  18. arXiv:2201.06333  [pdf, ps, other

    cs.IT quant-ph

    Commitment capacity of classical-quantum channels

    Authors: Masahito Hayashi, Naqueeb Ahmad Warsi

    Abstract: We study commitment scheme for classical-quantum channels. To accomplish this we define various notions of commitment capacity for these channels and prove matching upper and lower bound on it in terms of the conditional entropy. Our achievability (lower bound) proof is quantum generalisation of the work of one of the authors (arXiv:2103.11548) which studied the problem of secure list decoding and… ▽ More

    Submitted 5 May, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 23 pages; added a new subsection in section V

  19. Analytical calculation formulas for capacities of classical and classical-quantum channels

    Authors: Masahito Hayashi

    Abstract: We derive an analytical calculation formula for the channel capacity of a classical channel without any iteration while its existing algorithms require iterations and the number of iteration depends on the required precision level. Hence, our formula is its first analytical formula without any iteration. We apply the obtained formula to examples and see how the obtained formula works in these exam… ▽ More

    Submitted 14 February, 2023; v1 submitted 7 January, 2022; originally announced January 2022.

    Journal ref: IEEE Transactions on Information Theory, Volume: 69, Issue: 3, 1381 - 1393 (2023)

  20. Bregman divergence based em algorithm and its application to classical and quantum rate distortion theory

    Authors: Masahito Hayashi

    Abstract: We formulate em algorithm in the framework of Bregman divergence, which is a general problem setting of information geometry. That is, we address the minimization problem of the Bregman divergence between an exponential subfamily and a mixture subfamily in a Bregman divergence system. Then, we show the convergence and its speed under several conditions. We apply this algorithm to rate distortion a… ▽ More

    Submitted 4 May, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Journal ref: IEEE Transactions on Information Theory, Volume: 69, Issue: 6, 3460 - 3492 (2023)

  21. Quantum secure direct communication with private dense coding using general preshared quantum state

    Authors: Jiawei Wu, Gui-Lu Long, Masahito Hayashi

    Abstract: We study quantum secure direct communication by using a general preshared quantum state and a generalization of dense coding. In this scenario, Alice is allowed to apply a unitary on the preshared state to encode her message, and the set of allowed unitaries forms a group. To decode the message, Bob is allowed to apply a measurement across his own system and the system he receives. In the worst sc… ▽ More

    Submitted 22 May, 2022; v1 submitted 30 December, 2021; originally announced December 2021.

    Comments: This paper is accepted for publicaiotn in Physical Review Applied

    Journal ref: Physical Review Applied Vol. 17, No. 6 (2022)

  22. arXiv:2111.01075  [pdf, ps, other

    quant-ph cs.IT math-ph

    Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification

    Authors: Ke Li, Yongsheng Yao, Masahito Hayashi

    Abstract: The max-relative entropy together with its smoothed version is a basic tool in quantum information theory. In this paper, we derive the exact exponent for the asymptotic decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance. We then apply this result to the problem of privacy amplification against quantum side information, and we obta… ▽ More

    Submitted 1 June, 2023; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: V3: close to published version

    Journal ref: IEEE Trans. Inf. Theory 69(3), 1680-1694 (2023)

  23. arXiv:2106.14719  [pdf, ps, other

    cs.IT cs.IR quant-ph

    On the Capacity of Quantum Private Information Retrieval from MDS-Coded and Colluding Servers

    Authors: Matteo Allaix, Seunghoan Song, Lukas Holzbaur, Tefjol Pllaha, Masahito Hayashi, Camilla Hollanti

    Abstract: In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity is the maximal achievable ratio of the retrieved file size to the total download size. In this paper, the capacity of QPIR from MDS-coded and colluding servers is studied for the first time. Two general… ▽ More

    Submitted 8 November, 2021; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: This work extends arXiv:2102.02511

  24. Computation-aided classical-quantum multiple access to boost network communication speeds

    Authors: Masahito Hayashi, Angeles Vazquez-Castro

    Abstract: A multiple access channel (MAC) consists of multiple senders simultaneously transmitting their messages to a single receiver. For the classical-quantum case (cq-MAC), achievable rates are known assuming that all the messages are decoded, a common assumption in quantum network design. However, such a conventional design approach ignores the global network structure, i.e., the network topology. When… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Journal ref: Physical Review Applied, 16, 054021 (2021)

  25. Secure list decoding and its application to bit-string commitment

    Authors: Masahito Hayashi

    Abstract: We propose a new concept of secure list decoding, which is related to bit-string commitment. While the conventional list decoding requires that the list contains the transmitted message, secure list decoding requires the following additional security conditions to work as a modification of bit-string commitment. The first additional security condition is the receiver's uncertainty for the transmit… ▽ More

    Submitted 23 April, 2022; v1 submitted 21 March, 2021; originally announced March 2021.

    Comments: This paper is a different paper from arXiv:1901.02590 as follows. (1) The definition of secure list decoding of this paper contains the equivocation rate while arXiv:1901.02590 does not consider it. (2) This paper shows that our secure list decoding can be applied to bit-string commitment while the paper arXiv:1901.02590 does not consider it

    Journal ref: IEEE Transactions on Information Theory, Volume: 68, Issue: 6, 3620 - 3642 (2022)

  26. arXiv:2101.11194  [pdf, ps, other

    cs.CR cs.IT

    Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: We study the equivalence between non-perfect secret sharing (NSS) and symmetric private information retrieval (SPIR) with arbitrary response and collusion patterns. NSS and SPIR are defined with an access structure, which corresponds to the authorized/forbidden sets for NSS and the response/collusion patterns for SPIR. We prove the equivalence between NSS and SPIR in the following two senses. 1) G… ▽ More

    Submitted 13 December, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

  27. arXiv:2101.09041  [pdf, ps, other

    quant-ph cs.CR

    Quantum Private Information Retrieval for Quantum Messages

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: Quantum private information retrieval (QPIR) for quantum messages is the protocol in which a user retrieves one of the multiple quantum states from one or multiple servers without revealing which state is retrieved. We consider QPIR in two different settings: the blind setting, in which the servers contain one copy of the message states, and the visible setting, in which the servers contain the de… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  28. Usefulness of adaptive strategies in asymptotic quantum channel discrimination

    Authors: Farzin Salek, Masahito Hayashi, Andreas Winter

    Abstract: Adaptiveness is a key principle in information processing including statistics and machine learning. We investigate the usefulness of adaptive methods in the framework of asymptotic binary hypothesis testing, when each hypothesis represents asymptotically many independent instances of a quantum channel, and the tests are based on using the unknown channel and observing outputs. Unlike the familiar… ▽ More

    Submitted 17 March, 2024; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: v3 is the accepted version

    Journal ref: Phys. Rev. A 105, 022419 (2022)

  29. Universal classical-quantum superposition coding and universal classical-quantum multiple access channel coding

    Authors: Masahito Hayashi, Ning Cai

    Abstract: We derive universal classical-quantum superposition coding and universal classical-quantum multiple access channel code by using generalized packing lemmas for the type method. Using our classical-quantum universal superposition code, we establish the capacity region of a classical-quantum compound broadcast channel with degraded message sets. Our universal classical-quantum multiple access channe… ▽ More

    Submitted 5 May, 2021; v1 submitted 31 October, 2020; originally announced November 2020.

    Journal ref: IEEE Transactions on Information Theory, Volume: 68, Issue: 3, 1822 - 1850 (2022)

  30. arXiv:2005.09183  [pdf, other

    cs.CV cs.CL cs.IR

    Retrieving and Highlighting Action with Spatiotemporal Reference

    Authors: Seito Kasai, Yuchi Ishikawa, Masaki Hayashi, Yoshimitsu Aoki, Kensho Hara, Hirokatsu Kataoka

    Abstract: In this paper, we present a framework that jointly retrieves and spatiotemporally highlights actions in videos by enhancing current deep cross-modal retrieval methods. Our work takes on the novel task of action highlighting, which visualizes where and when actions occur in an untrimmed video setting. Action highlighting is a fine-grained task, compared to conventional action recognition tasks whic… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted to ICIP 2020

  31. arXiv:2003.13293  [pdf, ps, other

    quant-ph cs.IT

    Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

    Authors: Go Kato, Masaki Owari, Masahito Hayashi

    Abstract: It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. I… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

  32. arXiv:2003.12225  [pdf, other

    cs.IT cs.NI

    Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution

    Authors: Masahito Hayashi, Ning Cai

    Abstract: When there exists a malicious attacker in the network, we need to be careful of eavesdropping and contamination. This problem is crucial for network communication when the network is realized by a partially trusted relay of quantum key distribution. We discuss the asymptotic rate in a linear network with the secrecy and robustness conditions when the above type of attacker exists. Also, under the… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:1703.00723

  33. Secure network code over one-hop relay network

    Authors: Masahito Hayashi, Ning Cai

    Abstract: When there exists a malicious attacker in the network, we need to consider the possibilities of eavesdropping and the contamination simultaneously. Under an acyclic broadcast network, the optimality of linear codes was shown when Eve is allowed to attack any $r$ edges. The optimality of linear codes is not shown under a different assumption for Eve. As a typical example of an acyclic unicast netwo… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

    Journal ref: Journal on Selected Areas in Information Theory vol. 2, no. 1, 296 - 305 (2021)

  34. Reduction Theorem for Secrecy over Linear Network Code for Active Attacks

    Authors: Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai

    Abstract: We discuss the effect of sequential error injection on information leakage under a network code. We formulate a network code for the single transmission setting and the multiple transmission setting. Under this formulation, we show that the eavesdropper cannot improve the power of eavesdropping by sequential error injection when the operations in the network are linear operations. We demonstrate t… ▽ More

    Submitted 25 March, 2020; originally announced March 2020.

    Journal ref: Entropy, Information Theory, Probability and Statistics Section, Special Issue: Multiuser Information Theory III, 22 (9), 1053 (2020)

  35. arXiv:2002.12004  [pdf, other

    quant-ph cs.IT math-ph

    Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction

    Authors: Masahito Hayashi, Kun Fang, Kun Wang

    Abstract: We give the first systematic study on the second order asymptotics of the operational task of coherence distillation with and without assistance. In the unassisted setting, we introduce a variant of randomness extraction framework where free incoherent operations are allowed before the incoherent measurement and the randomness extractors. We then show that the maximum number of random bits extract… ▽ More

    Submitted 10 November, 2020; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: v2 added the second order analysis on the assisted coherence distillation, one author is added; comments are welcome

    Journal ref: IEEE Transactions on Information Theory ( Volume: 67, Issue: 6, June 2021)

  36. arXiv:2001.04436  [pdf, ps, other

    quant-ph cs.IT

    Capacity of Quantum Private Information Retrieval with Colluding Servers

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: Quantum private information retrieval (QPIR) is a protocol in which a user retrieves one of multiple files from $\mathsf{n}$ non-communicating servers by downloading quantum systems without revealing which file is retrieved. As variants of QPIR with stronger security requirements, symmetric QPIR is a protocol in which no other files than the target file are leaked to the user, and $\mathsf{t}$-pri… ▽ More

    Submitted 22 April, 2021; v1 submitted 13 January, 2020; originally announced January 2020.

  37. arXiv:2001.01845  [pdf, other

    quant-ph cs.IT

    Permutation Enhances Classical Communication Assisted by Entangled States

    Authors: Kun Wang, Masahito Hayashi

    Abstract: We give a capacity formula for the classical communication over a noisy quantum channel, when local operations and global permutations allowed in the encoding and bipartite states preshared between the sender and the receiver. The two endpoints of this formula are the Holevo capacity (without entanglement assistance) and the entanglement-assisted capacity (with unlimited entanglement assistance).… ▽ More

    Submitted 9 January, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: 27 pages, 4 figures. Comments are welcome

  38. Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack

    Authors: Masahito Hayashi, Angeles Vazquez-Castro

    Abstract: In this work, we focus on the classical optical channel having Poissonian statistical behavior and propose a novel secrecy coding-based physical layer protocol. Our protocol is different but complementary to both (computationally secure) quantum immune cryptographic protocols and (information theoretically secure) quantum cryptographic protocols. Specifically, our (information theoretical) secrecy… ▽ More

    Submitted 30 December, 2019; originally announced December 2019.

    Journal ref: IEEE Transactions on Information Forensics and Security, Volume: 15, Issue: 1, 2295 - 2305 (2020)

  39. Two-Way Physical Layer Security Protocol for Gaussian Channels

    Authors: Masahito Hayashi, Angeles Vazquez-Castro

    Abstract: In this paper we propose a two-way protocol of physical layer security using the method of privacy amplification against eavesdroppers. First we justify our proposed protocol by analyzing the physical layer security provided by the classic wiretap channel model (i.e. one-way protocol). In the Gaussian channels, the classic one-way protocol requires Eve's channel to be degraded w.r.t. Bob's channel… ▽ More

    Submitted 19 November, 2019; originally announced November 2019.

    Journal ref: IEEE Transactions on Communications, vol. 68, Issue 5, 3068 - 3078 (2020)

  40. Verifiable Quantum Secure Modulo Summation

    Authors: Masahito Hayashi, Takeshi Koshiba

    Abstract: We propose a new cryptographic task, which we call verifiable quantum secure modulo summation. Secure modulo summation is a calculation of modulo summation $Y_1+\ldots+ Y_m$ when $m$ players have their individual variables $Y_1,\ldots, Y_m$ with keeping the secrecy of the individual variables. However, the conventional method for secure modulo summation uses so many secret communication channels.… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

    Journal ref: Quantum Information Processing, 21, 291 (2022)

  41. arXiv:1904.08306  [pdf, other

    cs.IT

    Compute-and-forward relaying with LDPC codes over QPSK scheme

    Authors: Satoshi Takabe, Tadashi Wadayama, Ángeles Vazquez-Castro, Masahito Hayashi

    Abstract: In this paper, we study a compute-and-forward (CAF) relaying scheme with low-density parity-check (LDPC) codes, a special case of physical layer network coding, under the quadrature phase shift keying (QPSK) modulation. The novelty of this paper is the theoretical analysis of decoding performance of the CAF scheme and traditional separation decoding (SD) scheme with joint decoding or with successi… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

    Comments: 6 pages, 5 figures

  42. Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: Quantum private information retrieval (QPIR) is a protocol in which a user retrieves one of multiple classical files by downloading quantum systems from non-communicating $\mathsf{n}$ servers each of which contains a copy of all files, while the identity of the retrieved file is unknown to each server. Symmetric QPIR (QSPIR) is QPIR in which the user only obtains the queried file but no other info… ▽ More

    Submitted 1 February, 2021; v1 submitted 29 March, 2019; originally announced March 2019.

    Journal ref: IEEE Journal on Selected Areas in Information Theory, 2021

  43. arXiv:1903.10209  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Capacity of Quantum Private Information Retrieval with Multiple Servers

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: We study the capacity of quantum private information retrieval (QPIR) with multiple servers. In the QPIR problem with multiple servers, a user retrieves a classical file by downloading quantum systems from multiple servers each of which contains the copy of a classical file set while the identity of the downloaded file is not leaked to each server. The QPIR capacity is defined as the maximum rate… ▽ More

    Submitted 19 January, 2021; v1 submitted 25 March, 2019; originally announced March 2019.

    Journal ref: IEEE Transactions on Information Theory, vol. 67, no. 1, pp. 452-463, Jan. 2021

  44. arXiv:1901.05262  [pdf, other

    cs.IT

    Asymptotic Analysis on LDPC-BICM Scheme for Compute-and-Forward Relaying

    Authors: Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi

    Abstract: The compute-and-forward (CAF) scheme has attracted great interests due to its high band-width efficiency on two-way relay channels. In the CAF scheme, a relay attempts to decode a linear combination of transmitted messages from other terminals or relays. It is a crucial issue to study practical error-correcting codes in order to realize the CAF scheme with low computational complexity. In this pap… ▽ More

    Submitted 16 January, 2019; originally announced January 2019.

    Comments: 5 pages, 7 figures

  45. arXiv:1901.02590  [pdf, other

    cs.IT cs.CR

    Secure list decoding

    Authors: Masahito Hayashi

    Abstract: We propose a new concept of secure list decoding. While the conventional list decoding requires that the list contains the transmitted message, secure list decoding requires the following additional security conditions. The first additional security condition is the impossibility of the correct decoding, i.e., the receiver cannot uniquely identify the transmitted message even though the transmitte… ▽ More

    Submitted 19 June, 2020; v1 submitted 8 January, 2019; originally announced January 2019.

  46. arXiv:1812.10862  [pdf, ps, other

    cs.IT

    Secure Modulo Sum via Multiple Access Channel

    Authors: Masahito Hayashi

    Abstract: We discuss secure computation of modular sum when multiple access channel from distinct players $A_1, \ldots, A_c$ to a third party (Receiver) is given. Then, we define the secure modulo sum capacity as the supremum of the transmission rate of modulo sum without information leakage of other information. We derive its useful lower bound, which is numerically calculated under a realistic model that… ▽ More

    Submitted 5 May, 2021; v1 submitted 27 December, 2018; originally announced December 2018.

  47. Secure physical layer network coding versus secure network coding

    Authors: Masahito Hayashi

    Abstract: Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped. In this framework, if the channels of the network has noise, we apply the error correction to noisy channel before applying the secure network coding. In contrast, secure physical layer network coding is a method to se… ▽ More

    Submitted 30 November, 2018; originally announced December 2018.

    Journal ref: Entropy, 24(1), 47 (2022)

  48. arXiv:1811.00262  [pdf, ps, other

    cs.IT cs.CR

    Semi-Finite Length Analysis for Information Theoretic Tasks

    Authors: Masahito Hayashi

    Abstract: We focus on the optimal value for various information-theoretical tasks. There are several studies for the asymptotic expansion for these optimal values up to the order $\sqrt{n}$ or $\log n$. However, these expansions have errors of the order $o(\sqrt{n})$ or $o(\log n)$, which does not goes to zero asymptotically. To resolve this problem, we derive the asymptotic expansion up to the constant ord… ▽ More

    Submitted 10 November, 2018; v1 submitted 1 November, 2018; originally announced November 2018.

  49. arXiv:1807.01599  [pdf, other

    cs.IT

    Asymptotic Analysis of Spatial Coupling Coding for Compute-and-Forward Relaying

    Authors: Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi

    Abstract: Compute-and-forward (CAF) relaying is effective to increase bandwidth efficiency of wireless two-way relay channels. In a CAF scheme, a relay is designed to decode a linear combination composed of transmitted messages from other terminals or relays. Design for error-correcting codes and its decoding algorithms suitable for CAF relaying schemes remain as an important issue to be studied. As describ… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: 8 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1801.06328

  50. Secure Computation-and-Forward with Linear Codes

    Authors: Masahito Hayashi, Tadashi Wadayama, Angeles Vazquez-Castro

    Abstract: We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes. To realize the security, we construct a code that securely transmits the modulo sum of the messages of two nodes via a multiple access channel. In this code, the relay cannot obtain any information for the message of each node,… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

    Journal ref: IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, 139 - 148 (2021)