Toyohiro Tsurumaru

Follow

Generating author description...

All published works
Action Title Year Authors
+ Tight scaling of key rate for differential-phase-shift quantum key distribution 2024 Akihiro Mizutani
Toyohiro Tsurumaru
+ PDF Chat Tight scaling of key rate for differential-phase-shift quantum key distribution 2024 Akihiro Mizutani
Toyohiro Tsurumaru
+ PDF Chat Indistinguishability between quantum randomness and pseudorandomness under efficiently calculable randomness measures 2024 Toyohiro Tsurumaru
Tsubasa Ichikawa
Y. Takubo
Toshihiko Sasaki
Jaeha Lee
Izumi Tsutsui
+ PDF Chat Information-theoretically secure equality-testing protocol with dispute resolution 2023 Go Kato
Mikio Fujiwara
Toyohiro Tsurumaru
+ Indistinguishability between quantum randomness and pseudo-randomness under efficiently calculable randomness measures 2023 Toyohiro Tsurumaru
Tsubasa Ichikawa
Y. Takubo
Toshihiko Sasaki
Jaeha Lee
Izumi Tsutsui
+ PDF Chat Secure random number generation from parity symmetric radiations 2022 Toyohiro Tsurumaru
Toshihiko Sasaki
Izumi Tsutsui
+ Information-theoretically secure equality-testing protocol with dispute resolution 2022 Go Kato
Mikio Fujiwara
Toyohiro Tsurumaru
+ PDF Chat Long-Term Secure Distributed Storage Using Quantum Key Distribution Network With Third-Party Verification 2021 Mikio Fujiwara
Ryo Nojima
Toyohiro Tsurumaru
Shiho Moriai
Masahiro Takeoka
Masahide Sasaki
+ PDF Chat Equivalence of Three Classical Algorithms With Quantum Side Information: Privacy Amplification, Error Correction, and Data Compression 2021 Toyohiro Tsurumaru
+ Equivalence of three classical algorithms with quantum side information: Privacy amplification, error correction, and data compression. 2021 Toyohiro Tsurumaru
+ Advantage of the key relay protocol over secure network coding 2021 Go Kato
Mikio Fujiwara
Toyohiro Tsurumaru
+ Equivalence of three quantum algorithms: Privacy amplification, error correction, and data compression. 2020 Toyohiro Tsurumaru
+ PDF Chat Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution 2020 Toyohiro Tsurumaru
+ PDF Chat Multi-partite squash operation and its application to device-independent quantum key distribution 2016 Toyohiro Tsurumaru
Tsubasa Ichikawa
+ PDF Chat More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function 2016 Masahito Hayashi
Toyohiro Tsurumaru
+ More Efficient Privacy Amplification with Non-Uniform Random Seeds via Dual Universal Hash Function. 2013 Masahito Hayashi
Toyohiro Tsurumaru
+ PDF Chat Dual Universality of Hash Functions and Its Applications to Quantum Cryptography 2013 Toyohiro Tsurumaru
Masahito Hayashi
+ PDF Chat Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths 2012 Masahito Hayashi
Toyohiro Tsurumaru
+ Field test of quantum key distribution in the Tokyo QKD Network 2011 M. Sasaki
Mikio Fujiwara
Hirokazu Ishizuka
Werner Klaus
Kentaro Wakui
Masahiro Takeoka
Shigehito Miki
Taro Yamashita
Zhixin Wang
Akihiro Tanaka
+ Dual universality of hash functions and its applications to classical and quantum cryptography 2011 Toyohiro Tsurumaru
Masahito Hayashi
+ PDF Chat Squash operator and symmetry 2010 Toyohiro Tsurumaru
+ Exact Minimum and Maximum of Yield with a Finite Number of Decoy Light Intensities 2009 Toyohiro Tsurumaru
A. Soujaeff
Shigeki Takeuchi
A. I. Lvovsky
+ Security proof for quantum-key-distribution systems with threshold detectors 2008 Toyohiro Tsurumaru
Kiyoshi Tamaki
+ Exact minimum and maximum of yield with a finite number of decoy light intensities 2008 Toyohiro Tsurumaru
A. Soujaeff
Shigeki Takeuchi
+ Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol 2007 Toyohiro Tsurumaru
+ PDF Chat Group covariant protocols for quantum string commitment 2006 Toyohiro Tsurumaru
+ PDF Chat Implementable quantum-bit-string commitment protocol 2005 Toyohiro Tsurumaru
+ An Implementable Protocol of Quantum Bit String Commitment 2004 Toyohiro Tsurumaru
+ PDF Chat Instantons, monopoles and the flux quantization in the Faddeev–Niemi decomposition 2000 Toyohiro Tsurumaru
Izumi Tsutsui
Akira Fujii
+ PDF Chat Localized and extended states in one-dimensional disordered system: random-mass Dirac fermions 1999 Koujin Takeda
Toyohiro Tsurumaru
Ikuo Ichinose
Masaomi Kimura
+ PDF Chat On topological terms in the O(3) nonlinear sigma model 1999 Toyohiro Tsurumaru
Izumi Tsutsui
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Simple Proof of Security of the BB84 Quantum Key Distribution Protocol 2000 Peter W. Shor
John Preskill
10
+ PDF Chat SECURITY OF QUANTUM KEY DISTRIBUTION 2008 Renato Renner
9
+ PDF Chat Upper bounds of eavesdropper’s performances in finite-length code with the decoy method 2007 Masahito Hayashi
9
+ Field test of quantum key distribution in the Tokyo QKD Network 2011 M. Sasaki
Mikio Fujiwara
Hirokazu Ishizuka
Werner Klaus
Kentaro Wakui
Masahiro Takeoka
Shigehito Miki
Taro Yamashita
Zhixin Wang
Akihiro Tanaka
6
+ PDF Chat Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances 1999 Hoi-Kwong Lo
H. F. Chau
6
+ A framework for non-asymptotic quantum information theory 2012 Marco Tomamichel
6
+ PDF Chat Leftover Hashing Against Quantum Side Information 2011 Marco Tomamichel
Christian Schaffner
Adam Smith
Renato Renner
6
+ PDF Chat Duality of privacy amplification against quantum adversaries and data compression with quantum side information 2010 Joseph M. Renes
6
+ PDF Chat Decoy State Quantum Key Distribution 2005 Hoi‐Kwong Lo
Xiongfeng Ma
Kai Chen
6
+ PDF Chat Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths 2012 Masahito Hayashi
Toyohiro Tsurumaru
6
+ PDF Chat Tight finite-key analysis for quantum cryptography 2012 Marco Tomamichel
Charles Ci Wen Lim
Nicolas Gisin
Renato Renner
5
+ PDF Chat Unconditional security in quantum cryptography 2001 Dominic Mayers
5
+ PDF Chat Quantum Key Distribution with High Loss: Toward Global Secure Communication 2003 Won-Young Hwang
5
+ PDF Chat Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography 2005 Xiang‐Bin Wang
5
+ Security of Quantum Key Distribution 2005 Renato Renner
5
+ PDF Chat Dual Universality of Hash Functions and Its Applications to Quantum Cryptography 2013 Toyohiro Tsurumaru
Masahito Hayashi
5
+ PDF Chat Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification 2011 Masahito Hayashi
4
+ PDF Chat Trevisan's Extractor in the Presence of Quantum Side Information 2012 Anindya De
Christopher Portmann
Thomas Vidick
Renato Renner
4
+ PDF Chat Quantum random number generation 2016 Xiongfeng Ma
Xiao Yuan
Zhu Cao
Bing Qi
Zhen Zhang
4
+ PDF Chat More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function 2016 Masahito Hayashi
Toyohiro Tsurumaru
3
+ PDF Chat The Operational Meaning of Min- and Max-Entropy 2009 Robert König
Renato Renner
Christian Schaffner
3
+ Security proof for quantum-key-distribution systems with threshold detectors 2008 Toyohiro Tsurumaru
Kiyoshi Tamaki
3
+ PDF Chat Quantum cryptography 2002 Nicolas Gisin
G. Ribordy
Wolfgang Tittel
Hugo Zbinden
3
+ PDF Chat NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION 2006 Shun Watanabe
Ryutaroh Matsumoto
Tomohiko Uyematsu
3
+ PDF Chat Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication 2005 Barbara Kraus
Nicolas Gisin
Renato Renner
3
+ PDF Chat Uncertainty Relation for Smooth Entropies 2011 Marco Tomamichel
Renato Renner
3
+ PDF Chat Practical evaluation of security for quantum key distribution 2006 Masahito Hayashi
3
+ Complementarity, distillable secret key, and distillable entanglement 2007 Masato Koashi
3
+ PDF Chat Squashing Models for Optical Measurements in Quantum Communication 2008 Normand J. Beaudry
Tobias Moroder
Norbert LĂŒtkenhaus
3
+ Quantum cryptography: Public key distribution and coin tossing 2014 Charles H. Bennett
Gilles Brassard
3
+ PDF Chat Physical underpinnings of privacy 2008 Joseph M. Renes
Jean-Christian Boileau
3
+ Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker 2007 Serge Fehr
Christian Schaffner
3
+ PDF Chat Proof of security of quantum key distribution with two-way classical communications 2003 Daniel Gottesman
Hoi‐Kwong Lo
2
+ Construction of Codes for Wiretap Channel and Secret Key Agreement from Correlated Source Outputs by Using Sparse Matrices 2009 Jun Muramatsu
Shigeki Miyake
2
+ PDF Chat Device-independent quantum key distribution secure against collective attacks 2009 Stefano Pironio
Antonio AcĂ­n
Nicolas Brunner
Nicolas Gisin
Serge Massar
Valerio Scarani
2
+ PDF Chat Hash property and coding theorems for sparse matrices and maximum-likelihood coding 2010 Jun Muramatsu
Shigeki Miyake
2
+ PDF Chat Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations 2004 Valerio Scarani
Antonio AcĂ­n
G. Ribordy
Nicolas Gisin
2
+ PDF Chat Second-Order Asymptotics in Fixed-Length Source Coding and Intrinsic Randomness 2008 Masahito Hayashi
2
+ PDF Chat Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code 2010 Shun Watanabe
Ryutaroh Matsumoto
Tomohiko Uyematsu
2
+ PDF Chat Unconditionally Secure Quantum Bit Commitment is Impossible 1997 Dominic Mayers
2
+ PDF Chat Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors 2007 Hiroki Takesue
Sae Woo Nam
Qiang Zhang
Robert H. Hadfield
Toshimori Honjo
Kiyoshi Tamaki
Y. Yamamoto
2
+ PDF Chat Uncertainty Relations from Simple Entropic Properties 2012 Patrick J. Coles
Roger Colbeck
Li Yu
Michael Zwolak
2
+ PDF Chat Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths 2014 Masahito Hayashi
Ryota Nakayama
2
+ A Friendly Introduction to Number Theory 1996 Joseph H. Silverman
2
+ PDF Chat Unconditionally Secure Key Distribution Based on Two Nonorthogonal States 2003 Kiyoshi Tamaki
Masato Koashi
Nobuyuki Imoto
2
+ PDF Chat Quantum Bit String Commitment 2003 Adrian Kent
2
+ PDF Chat Unconditionally secure key distillation from multiphotons 2006 Kiyoshi Tamaki
Hoi‐Kwong Lo
2
+ Information-disturbance theorem for mutually unbiased observables 2006 Takayuki Miyadera
Hideki Imai
2
+ PDF Chat Information-theoretic security proof for quantum-key-distribution protocols 2005 Renato Renner
Nicolas Gisin
Barbara Kraus
2
+ PDF Chat Is Quantum Bit Commitment Really Possible? 1997 Hoi‐Kwong Lo
H. F. Chau
2