49 results on '"Masahito Hayashi"'
Search Results
2. Commitment capacity of classical-quantum channels.
3. Analytical calculation formulas for capacities of classical and classical-quantum channels.
4. Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure.
5. Quantum Private Information Retrieval for Quantum Messages.
6. Asymptotic Separation Between Adaptive and Non-adaptive Strategies in Quantum Channel Discrimination.
7. Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction.
8. Universal classical-quantum multiple access channel coding.
9. Secure Modulo Sum via Multiple Access Channel.
10. Capacity of Quantum Private Information Retrieval with Colluding Servers.
11. Permutation Enhances Classical Communication Assisted by Entangled States.
12. Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms.
13. Capacity of Quantum Private Information Retrieval with Multiple Servers.
14. Optimal Mechanism for Randomized Responses under Universally Composable Security Measure.
15. Semi-Finite Length Analysis for Secure Random Number Generation.
16. Asymptotic Analysis on LDPC-BICM Scheme for Compute-and-Forward Relaying.
17. Secure list decoding.
18. Compression for Qubit Clocks.
19. Secure Communication Over Fully Quantum Gel' Fand-Pinsker Wiretap Channel.
20. Asymptotically Decoupling and Mixing Properties in Quantum System.
21. Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay Channels.
22. Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication.
23. Secrecy and robustness for active attack in secure network coding.
24. Minimum rates of approximate sufficient statistics.
25. Second order analysis for joint source-channel coding with Markovian source.
26. Secure wireless communication under spatial and local Gaussian noise assumptions.
27. Compression for quantum population coding.
28. Remaining uncertainties and exponents under Rényi information measures.
29. Operational interpretation of Rényi conditional mutual information via composite hypothesis testing against Markov distributions.
30. Correlation detection and an operational interpretation of the Rényi mutual information.
31. More efficient privacy amplification with less random seeds.
32. Equivocations and exponents under various Rényi information measures.
33. Erasure and undetected error probabilities in the moderate deviations regime.
34. Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state.
35. Secret key agreement: General capacity and second-order asymptotics.
36. Moderate deviations for joint source-channel coding of systems with Markovian memory.
37. Information geometry approach to parameter estimation in Markov chains.
38. Asymptotic reversibility of LOCC conversions.
39. Strong converse and second-order asymptotics of channel resolvability.
40. A duality relation connecting different quantum generalizations of the conditional Rényi entropy.
41. Random number conversion via restricted storage.
42. Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy.
43. Second order asymptotics for random number generation.
44. Quantum wiretap channel with non-uniform random number and its exponent of leaked information.
45. Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker.
46. Secure multiplex coding with a common message.
47. Construction of wiretap codes from ordinary channel codes.
48. (4, 1)-Quantum Random Access Coding Does Not Exist.
49. Universal distortion-free entanglement concentration.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.