Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2010-05-21 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext -- Masaki Sohma, Osamu Hirota (Tamagawa Univ.) ISEC2010-4 |
The basis of the information theoretic security of the symmetric ky cipher is based on the Shannon theory published in 1... [more] |
ISEC2010-4 pp.17-24 |
OPE, EMT, LQE, PN, IEE-EMT |
2010-01-28 15:00 |
Kyoto |
|
A proposal of secure photonic network based on quantum stream cipher Y-00 and its example
-- Criticism against NICT quantum ICT committee -- Osamu Hirota, Satoki Kawanishi (Tamagawa Univ.) PN2009-42 OPE2009-180 LQE2009-162 |
A new threat for high speed photonic network that is a construction of data center of attackers is closed up. This paper... [more] |
PN2009-42 OPE2009-180 LQE2009-162 pp.41-46 |
ISEC |
2009-12-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof -- Osamu Hirota (Tamagawa Univ.) ISEC2009-72 |
One of important problems in cryptography is to prove the existence of a cipher which can break the Shannon limit.
Yue... [more] |
ISEC2009-72 pp.7-14 |
ISEC |
2009-09-25 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Spy satellite system with quasi perfect secrecy by quantum stream cipher Y-00
-- Beyond the Shannon limit -- Osamu Hirota (Tamagawa Univ.) ISEC2009-42 |
It is well known that there is the Shannon limit for information theoretic security of the conventional symmetric key ci... [more] |
ISEC2009-42 pp.15-22 |
NS, OCS, PN (Joint) |
2009-06-25 16:25 |
Nagasaki |
Nagasaki Museum of History and Culture (Nagasaki) |
General discussion of randomizations for quantum stream cipher by Y-00 Osamu Hirota (Tamagawa Univ.) OCS2009-12 |
t is well known that there is the Shannon limit for the conventional symmetric key cipher. However, there is no proof su... [more] |
OCS2009-12 pp.11-16 |
PN, CS, OCS (Joint) |
2008-06-13 15:40 |
Hokkaido |
Chitose Institute of Science and Technology |
A possibility of information theoretic security of quantum stream cipher Y-00 Osamu Hirota (Tamagawa Univ.) OCS2008-17 |
Since Yuen 2000 protocol (Y-00) was introduced as a way of realizing Gauss-Yuen random cipher with the possibility of in... [more] |
OCS2008-17 pp.39-44 |
OCS, PN, CS (Joint) |
2007-06-14 13:30 |
Hokkaido |
Chitose Inst. of Science and Technology |
Capacity of attenuation channels assisted by linear amplifiers Masaki Sohma, Osamu Hirota (Tamagawa Univ.) OCS2007-10 |
[more] |
OCS2007-10 pp.1-5 |
OCS, PN, CS (Joint) |
2007-06-14 13:55 |
Hokkaido |
Chitose Inst. of Science and Technology |
Security evaluation system for quantum stream cipher by Y-00 protocol Osamu Hirota (Tamagawa Univ.), Kiichi Yamashita (Kagosima Univ.), Katsuyoshi Harasawa (Hitachi ICE), Masaru Fuse (Panasonic), Kenichi Ohhata (Kagosima Univ) OCS2007-11 |
Recently a new quantum cryptography has been invented for high speed optical communication networks so called Yuen proto... [more] |
OCS2007-11 pp.7-12 |
OCS, PN, CS (Joint) |
2007-06-14 14:20 |
Hokkaido |
Chitose Inst. of Science and Technology |
Randomization of running key for quantum stream cipher Y-00 Tetsuya Shimizu, Osamu Hirota (Tamagawa Univ.) OCS2007-12 |
[more] |
OCS2007-12 pp.13-17 |
ISEC |
2005-09-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Are attacks on Y-00(Optical communication Quantum Cryptography) the true attacks? PartII Osamu Hirota (tamagawa Univ.) |
In this letter, we clarify that the logic of the attack on Y-00 ( Yuen
protocol) by Imafuku, Imai, Nishioka, Hasegawa, ... [more] |
ISEC2005-76 pp.1-6 |
IT, WBS, ISEC |
2005-03-18 09:55 |
Kyoto |
Kyoto Univ. |
Is the attack to Y-00 optical communication quantum cryptography a true attack? Osamu Hirota (Tamagawa Univ.) |
In this letter, we clarify that the attack on Y-00 ( Yuen
protocol) by Nishioka and Imai group (Mitsubishi Electric Lt... [more] |
IT2004-70 ISEC2004-126 WBS2004-185 pp.1-6 |