Skip to main content

Showing 1–3 of 3 results for author: Owari, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2003.13293  [pdf, ps, other

    quant-ph cs.IT

    Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

    Authors: Go Kato, Masaki Owari, Masahito Hayashi

    Abstract: It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. I… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

  2. Reduction Theorem for Secrecy over Linear Network Code for Active Attacks

    Authors: Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai

    Abstract: We discuss the effect of sequential error injection on information leakage under a network code. We formulate a network code for the single transmission setting and the multiple transmission setting. Under this formulation, we show that the eavesdropper cannot improve the power of eavesdropping by sequential error injection when the operations in the network are linear operations. We demonstrate t… ▽ More

    Submitted 25 March, 2020; originally announced March 2020.

    Journal ref: Entropy, Information Theory, Probability and Statistics Section, Special Issue: Multiuser Information Theory III, 22 (9), 1053 (2020)

  3. arXiv:1703.00723  [pdf, ps, other

    cs.IT quant-ph

    Secrecy and Robustness for Active Attack in Secure Network Coding and its Application to Network Quantum Key Distribution

    Authors: Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai

    Abstract: In network coding, we discuss the effect of sequential error injection on information leakage. We show that there is no improvement when the operations in the network are linear operations. However, when the operations in the network contains non-linear operations, we find a counterexample to improve Eve's obtained information. Furthermore, we discuss the asymptotic rate in a linear network under… ▽ More

    Submitted 25 September, 2018; v1 submitted 2 March, 2017; originally announced March 2017.

    Comments: We fixed several errors