Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LQE, OPE, OCS |
2010-10-28 11:45 |
Fukuoka |
Mojiko Retro Town, Minato house |
Experimental demonstration of a Yuen-2000 (Y-00) prototype in the GbE communication of the local area network (LAN) of Tamagawa University Fumio Futami, Osamu Hirota (Tamagawa University), Makoto Honda, Shigeto Akutsu, Katsuyoshi Harasawa (Hitachi Information & Communication Engineering) OCS2010-57 OPE2010-93 LQE2010-66 |
Although the current networks are playing an essential role in modern societies, the personal information and proprietar... [more] |
OCS2010-57 OPE2010-93 LQE2010-66 pp.25-30 |
NS, CS, IN (Joint) |
2010-09-03 11:15 |
Miyagi |
Tohoku University |
Method for Achieving Maximum Data Message Flow in Wireless Multihop Networks Yuki Tatsuno, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-57 |
For multimedia data message transmissions in wireless multihop networks, transmission capacity is reserved in wireless l... [more] |
IN2010-57 pp.79-84 |
ISEC |
2010-05-21 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext -- Masaki Sohma, Osamu Hirota (Tamagawa Univ.) ISEC2010-4 |
The basis of the information theoretic security of the symmetric ky cipher is based on the Shannon theory published in 1... [more] |
ISEC2010-4 pp.17-24 |
OPE, EMT, LQE, PN, IEE-EMT |
2010-01-28 15:00 |
Kyoto |
|
A proposal of secure photonic network based on quantum stream cipher Y-00 and its example
-- Criticism against NICT quantum ICT committee -- Osamu Hirota, Satoki Kawanishi (Tamagawa Univ.) PN2009-42 OPE2009-180 LQE2009-162 |
A new threat for high speed photonic network that is a construction of data center of attackers is closed up. This paper... [more] |
PN2009-42 OPE2009-180 LQE2009-162 pp.41-46 |
CS, OCS (Joint) |
2010-01-29 11:20 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111 |
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] |
OCS2009-111 pp.67-71 |
ISEC |
2009-12-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof -- Osamu Hirota (Tamagawa Univ.) ISEC2009-72 |
One of important problems in cryptography is to prove the existence of a cipher which can break the Shannon limit.
Yue... [more] |
ISEC2009-72 pp.7-14 |
OPE, LQE, OCS |
2009-10-22 16:35 |
Fukuoka |
|
An Evaluation on Eavesdropper's Capability for Intensity Modulated Y-00 Cryptosystem Yuki Nagasako (nternet Research Inst/Tamagawa Univ.) OCS2009-57 OPE2009-123 LQE2009-82 |
Yuen 2000 Protocol (Y-00) is a multi-signal level quantum transmission system that utilizes quantum noises to establish ... [more] |
OCS2009-57 OPE2009-123 LQE2009-82 pp.81-86 |
ISEC |
2009-09-25 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Spy satellite system with quasi perfect secrecy by quantum stream cipher Y-00
-- Beyond the Shannon limit -- Osamu Hirota (Tamagawa Univ.) ISEC2009-42 |
It is well known that there is the Shannon limit for information theoretic security of the conventional symmetric key ci... [more] |
ISEC2009-42 pp.15-22 |
USN, IPSJ-UBI |
2009-07-17 16:20 |
Kyoto |
ATR (Kyoto) |
On an Overhearing-based Data Transmission Reduction using Data Interpolation in Wireless Sensor Networks Akimitsu Kanzaki (Osaka Univ.), Yuuki Iima (Nomura Research Inst.), Takahiro Hara, Shojiro Nishio (Osaka Univ.) USN2009-27 |
In this paper, we propose an traffic reduction method using overhearing of wireless communications in wireless sensor ne... [more] |
USN2009-27 pp.163-168 |
NS, OCS, PN (Joint) |
2009-06-25 16:25 |
Nagasaki |
Nagasaki Museum of History and Culture (Nagasaki) |
General discussion of randomizations for quantum stream cipher by Y-00 Osamu Hirota (Tamagawa Univ.) OCS2009-12 |
t is well known that there is the Shannon limit for the conventional symmetric key cipher. However, there is no proof su... [more] |
OCS2009-12 pp.11-16 |
PN, CS, OCS (Joint) |
2008-06-13 15:40 |
Hokkaido |
Chitose Institute of Science and Technology |
A possibility of information theoretic security of quantum stream cipher Y-00 Osamu Hirota (Tamagawa Univ.) OCS2008-17 |
Since Yuen 2000 protocol (Y-00) was introduced as a way of realizing Gauss-Yuen random cipher with the possibility of in... [more] |
OCS2008-17 pp.39-44 |
NLP |
2007-08-07 10:45 |
Shizuoka |
|
A note on sequence generation power of one-bit one-state cellular automata Naoki Kamikawa, Hiroshi Umeo (OECU) NLP2007-56 |
A model of cellular automata(CA) was devised for studying self-reproduction by John von Neumann.
It is studied in many ... [more] |
NLP2007-56 pp.19-24 |
OCS, PN, CS (Joint) |
2007-06-14 13:55 |
Hokkaido |
Chitose Inst. of Science and Technology |
Security evaluation system for quantum stream cipher by Y-00 protocol Osamu Hirota (Tamagawa Univ.), Kiichi Yamashita (Kagosima Univ.), Katsuyoshi Harasawa (Hitachi ICE), Masaru Fuse (Panasonic), Kenichi Ohhata (Kagosima Univ) OCS2007-11 |
Recently a new quantum cryptography has been invented for high speed optical communication networks so called Yuen proto... [more] |
OCS2007-11 pp.7-12 |
NLP |
2007-06-08 13:00 |
Hiroshima |
|
A note on the class of sequences generated in real-time by one-bit two-state cellular automata Naoki Kamikawa, Hiroshi Umeo (Osaka Electro-Communication UOsaka Electro-Communication Unniv.) NLP2007-11 |
A model of cellular automata (CA) was devised for studying self-reproduction by John von Neumann.
It is studied in many... [more] |
NLP2007-11 pp.1-5 |
ISEC |
2005-09-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Are attacks on Y-00(Optical communication Quantum Cryptography) the true attacks? PartII Osamu Hirota (tamagawa Univ.) |
In this letter, we clarify that the logic of the attack on Y-00 ( Yuen
protocol) by Imafuku, Imai, Nishioka, Hasegawa, ... [more] |
ISEC2005-76 pp.1-6 |
IT, WBS, ISEC |
2005-03-18 09:55 |
Kyoto |
Kyoto Univ. |
Is the attack to Y-00 optical communication quantum cryptography a true attack? Osamu Hirota (Tamagawa Univ.) |
In this letter, we clarify that the attack on Y-00 ( Yuen
protocol) by Nishioka and Imai group (Mitsubishi Electric Lt... [more] |
IT2004-70 ISEC2004-126 WBS2004-185 pp.1-6 |