Skip to main content

Showing 1–22 of 22 results for author: Tsurumaru, T

  1. arXiv:2405.10033  [pdf, other

    quant-ph

    Tight scaling of key rate for differential-phase-shift quantum key distribution

    Authors: Akihiro Mizutani, Toyohiro Tsurumaru

    Abstract: The performance of quantum key distribution (QKD) protocols is evaluated based on the ease of implementation and key generation rate. Among major protocols, the differential-phase-shift (DPS) protocol has the advantage of simple implementation using a train of coherent pulses and a passive detection unit. Unfortunately, however, its key rate is known to be at least proportional to $η^2$ with respe… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: 11 pages, 1 figure

  2. Indistinguishability between quantum randomness and pseudo-randomness under efficiently calculable randomness measures

    Authors: Toyohiro Tsurumaru, Tsubasa Ichikawa, Yosuke Takubo, Toshihiko Sasaki, Jaeha Lee, Izumi Tsutsui

    Abstract: We present a no-go theorem for the distinguishability between quantum random numbers (i.e., random numbers generated quantum mechanically) and pseudo-random numbers (i.e., random numbers generated algorithmically). The theorem states that one cannot distinguish these two types of random numbers if the quantum random numbers are efficiently classically simulatable and the randomness measure used fo… ▽ More

    Submitted 15 January, 2024; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: 17 pages, 8 figures, 3 tables. title updated, minor revision

    Journal ref: Phys. Rev. A, 109, 022243 (2024)

  3. Information-theoretically secure equality-testing protocol with dispute resolution

    Authors: Go Kato, Mikio Fujiwara, Toyohiro Tsurumaru

    Abstract: There are often situations where two remote users each have data, and wish to (i) verify the equality of their data, and (ii) whenever a discrepancy is found afterwards, determine which of the two modified his data. The most common example is where they want to authenticate messages they exchange. Another possible example is where they have a huge database and its mirror in remote places, and when… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

    Comments: 7 pages, 2 figures

    Journal ref: 2023 IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, 2023, pp. 472-476

  4. Long-term secure distributed storage using quantum key distribution network with third-party verification

    Authors: Mikio Fujiwara, Ryo Nojima, Toyohiro Tsurumaru, Shiho Moriai, Masahiro Takeoka, Masahide Sasaki

    Abstract: The quantum key distribution network with Vernam's One Time Pad encryption and secret sharing are powerful security tools to realize an information theoretically secure distributed storage system. In our previous work, a single-password-authenticated secret sharing scheme based on the QKD network and Shamir's secret sharing was experimentally demonstrated; it confirmed ITS data transmission, stora… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: 12 pages, 5 figures; Accepted in IEEE trans. Quantum Technology

  5. Advantage of the key relay protocol over secure network coding

    Authors: Go Kato, Mikio Fujiwara, Toyohiro Tsurumaru

    Abstract: The key relay protocol (KRP) plays an important role in improving the performance and the security of quantum key distribution (QKD) networks. On the other hand, there is also an existing research field called secure network coding (SNC), which has similar goal and structure. We here analyze differences and similarities between the KRP and SNC rigorously. We found, rather surprisingly, that there… ▽ More

    Submitted 19 April, 2022; v1 submitted 26 November, 2021; originally announced November 2021.

    Comments: 15 pages, 14 figures. v2: We improved Theorem 2

    Journal ref: IEEE Transactions on Quantum Engineering, vol. 4, 4100517 (2023)

  6. Equivalence of three classical algorithms with quantum side information: Privacy amplification, error correction, and data compression

    Authors: Toyohiro Tsurumaru

    Abstract: Privacy amplification (PA) is an indispensable component in classical and quantum cryptography. Error correction (EC) and data compression (DC) algorithms are also indispensable in classical and quantum information theory. We here study these three algorithms (PA, EC, and DC) in the presence of quantum side information, and show that they all become equivalent in the one-shot scenario. As an appli… ▽ More

    Submitted 4 November, 2021; v1 submitted 18 September, 2020; originally announced September 2020.

    Comments: 16 pages, 5 figures. v2: Comparison with the previous literature added, presentation improved, typos corrected

    Journal ref: IEEE Transactions on Information Theory, vol. 68, no. 2, pp. 1016-1031 (2022)

  7. Secure random number generation from parity symmetric radiations

    Authors: Toyohiro Tsurumaru, Toshihiko Sasaki, Izumi Tsutsui

    Abstract: The random number generators (RNGs) are an indispensable tool in cryptography. Of various types of RNG method, those using radiations from nuclear decays (radioactive RNG) has a relatively long history but their security has never been discussed rigorously in the literature. In this paper we propose a new method of the radioactive RNG that admits a simple and rigorous proof of security. The securi… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

    Comments: 8 pages, 4 figures

    Journal ref: Commun Phys 5, 147 (2022)

  8. Leftover hashing from quantum error correction: Unifying the two approaches to the security proof of quantum key distribution

    Authors: Toyohiro Tsurumaru

    Abstract: We show that the Mayers-Shor-Preskill approach and Renner's approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA). PA itself is an important building block of cryptography, both classical and quantum. The standard theoretical tool used for its security proof is called… ▽ More

    Submitted 18 May, 2020; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: 20 pages, no figure. v2: Typos and minor technical errors corrected; presentation improved. v3: Comparison with the previous literature added, references added, and typos and minor technical errors corrected

    Journal ref: IEEE Transactions on Information Theory, Volume 66, Issue 6, 3465 - 3484 (2020)

  9. Multi-partite squash operation and its application to device-independent quantum key distribution

    Authors: Toyohiro Tsurumaru, Tsubasa Ichikawa

    Abstract: The squash operation, or the squashing model, is a useful mathematical tool for proving the security of quantum key distribution systems using practical (i.e., non-ideal) detectors. At the present, however, this method can only be applied to a limited class of detectors, such as the threshold detector of the Bennett-Brassard 1984 type. In this paper we generalize this method to include multi-parti… ▽ More

    Submitted 14 October, 2016; v1 submitted 17 February, 2015; originally announced February 2015.

    Comments: 28 pages, 1 figure; v2: minor correction, v3: errors in the previous security proof corrected, with a somewhat smaller key generation rate, v4: minor correction

    Journal ref: New J. Phys. 18 (2016) 103043

  10. arXiv:1311.5322  [pdf, ps, other

    quant-ph cs.CR cs.IT

    More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function

    Authors: Masahito Hayashi, Toyohiro Tsurumaru

    Abstract: We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$. The key idea is the concept of dual universal$_2$ hash function introduced recently. We also use a new method for constructing extractors by concatenat… ▽ More

    Submitted 18 August, 2015; v1 submitted 21 November, 2013; originally announced November 2013.

    Comments: 33 pages, no figure, 1 table; v3: revised arguments with new hash functions proposed additionally, v4: minor corrections and clarifications, some new references added, v5: minor corrections, and enhanced arguments related with applications

    Journal ref: IEEE Transactions on Information Theory, Volume 62, Issue 4, 2213 - 2232 (2016)

  11. Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    Authors: Masahito Hayashi, Toyohiro Tsurumaru

    Abstract: We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any… ▽ More

    Submitted 17 May, 2012; v1 submitted 4 July, 2011; originally announced July 2011.

    Comments: 40 pages, 4 figures, revised arguments on security, and detailed explanaions on how to use theoretical results

    Journal ref: New J. Phys. 14 (2012) 093014

  12. Field test of quantum key distribution in the Tokyo QKD Network

    Authors: M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura , et al. (18 additional authors not shown)

    Abstract: A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.

    Submitted 18 March, 2011; originally announced March 2011.

    Comments: 21 pages, 19 figures

    Journal ref: Optics Express Vol. 19, Iss. 11, pp. 10387-10409 (2011)

  13. Dual universality of hash functions and its applications to quantum cryptography

    Authors: Toyohiro Tsurumaru, Masahito Hayashi

    Abstract: In this paper, we introduce the concept of dual universality of hash functions and present its applications to quantum cryptography. We begin by establishing the one-to-one correspondence between a linear function family {\cal F} and a code family {\cal C}, and thereby defining \varepsilon-almost dual universal_2 hash functions, as a generalization of the conventional universal_2 hash functions. T… ▽ More

    Submitted 13 November, 2012; v1 submitted 30 December, 2010; originally announced January 2011.

    Comments: 18 pages, 2 figures; revised argument concerning the relation with the δ-biased family

    Journal ref: IEEE Transactions on Information Theory, Volume 59, Issue 7, 4700 - 4717 (2013)

  14. Squash Operator and Symmetry

    Authors: Toyohiro Tsurumaru

    Abstract: This paper begins with a simple proof of the existence of squash operators compatible with the Bennett-Brassard 1984 (BB84) protocol which suits single-mode as well as multi-mode threshold detectors. The proof shows that, when a given detector is symmetric under cyclic group C_4, and a certain observable associated with it has rank two as a matrix, then there always exists a corresponding squash… ▽ More

    Submitted 19 October, 2009; v1 submitted 13 October, 2009; originally announced October 2009.

    Comments: 4 pages, no figures; minor grammatical corrections

    Journal ref: Phys. Rev. A 81, 012328 (2010)

  15. Security proof for QKD systems with threshold detectors

    Authors: Toyohiro Tsurumaru, Kiyoshi Tamaki

    Abstract: In this paper, we rigorously prove the intuition that in security proofs for BB84 one may regard an incoming signal to Bob as a qubit state. From this result, it follows that all security proofs for BB84 based on a virtual qubit entanglement distillation protocol, which was originally proposed by Lo and Chau [H.-K. Lo and H. F. Chau, Science 283, 2050 (1999)], and Shor and Preskill [P. W. Shor a… ▽ More

    Submitted 11 September, 2008; v1 submitted 31 March, 2008; originally announced March 2008.

    Comments: 6 pages, 4 figures; references changed; revised argument for the security proof; typos corrected

    Journal ref: Phys. Rev. A 78, 032302 (2008)

  16. Exact minimum and maximum of yield with a finite number of decoy light intensities

    Authors: Toyohiro Tsurumaru, Alexandre Soujaeff, Shigeki Takeuchi

    Abstract: In this paper, for the decoy state method using a finite number of decoy light intensities, we present an improved upper and lower bounds for the asymptotic yield y_n for n-photon states. In particular if all the light intensities are less than or equal to one, they are not only a lower or upper bound, but in fact are the exact minimum or maximum.

    Submitted 28 October, 2007; v1 submitted 26 October, 2007; originally announced October 2007.

    Comments: 20 pages, 2 figures

    Journal ref: Phys. Rev. A 77, 022319 (2008)

  17. Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

    Authors: Toyohiro Tsurumaru

    Abstract: In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition o… ▽ More

    Submitted 25 December, 2006; originally announced December 2006.

    Comments: 6 pages, 2 figures

    Journal ref: Phys. Rev. A 75, 062319 (2007)

  18. Group Covariant Protocols for Quantum String Commitment

    Authors: Toyohiro Tsurumaru

    Abstract: We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next usi… ▽ More

    Submitted 16 October, 2006; v1 submitted 5 June, 2006; originally announced June 2006.

    Comments: 5 pages, no figure, typos corrected

    Journal ref: Phys. Rev. A, 74, 042307 (2006)

  19. Implementable Quantum Bit-String Commitment Protocol

    Authors: Toyohiro Tsurumaru

    Abstract: Quantum bit-string commitment[A.Kent, Phys.Rev.Lett., 90, 237901 (2003)] or QBSC is a variant of bit commitment (BC). In this paper, we propose a new QBSC protocol that can be implemented using currently available technology, and prove its security under the same security criteria as discussed by Kent. QBSC is a generalization of BC, but has slightly weaker requirements, and our proposed protoco… ▽ More

    Submitted 5 January, 2005; v1 submitted 22 July, 2004; originally announced July 2004.

    Comments: To appear in Phys. Rev. A., 9 pages, 2 figures

    Journal ref: Phys. Rev. A, 71, 012313 (2005)

  20. Instantons, Monopoles and the Flux Quantization in the Faddeev-Niemi Decomposition

    Authors: Toyohiro Tsurumaru, Izumi Tsutsui, Akira Fujii

    Abstract: We study how instantons arise in the low energy effective theory of the SU(2) Yang-Mills theory in the context of the non-linear sigma model recently propose by Faddeev and Niemi. We find a simple relation between the instanton number $ν$ and the charge m of the monopole that appears in the effective theory. It is given by $ν= m Φ/(2π)$, where $Φ$ is the quantized flux associated with a U(1) gau… ▽ More

    Submitted 23 May, 2000; v1 submitted 8 May, 2000; originally announced May 2000.

    Comments: Tex, 12 pages, 3 figures (eps), references added

    Report number: KEK Preprint 2000-18

    Journal ref: Nucl.Phys. B589 (2000) 659-668

  21. On Topological Terms in the O(3) Nonlinear Sigma Model

    Authors: Toyohiro Tsurumaru, Izumi Tsutsui

    Abstract: Topological terms in the O(3) nonlinear sigma model in (1+1) and (2+1) dimensions are re-examined based on the description of the SU(2)-valued field $g$. We first show that the topological soliton term in (1+1) dimensions arises from the unitary representations of the group characterizing the global structure of the symmetry inherent in the description, in a manner analogous to the appearance of… ▽ More

    Submitted 24 May, 1999; originally announced May 1999.

    Comments: 15 pages, 1 figure

    Report number: KEK 99-19

    Journal ref: Phys.Lett. B460 (1999) 94-102

  22. arXiv:cond-mat/9903389  [pdf, ps, other

    cond-mat.dis-nn cond-mat.str-el

    Localized and Extended States in One-Dimensional Disordered System: Random-Mass Dirac Fermions

    Authors: Koujin Takeda, Toyohiro Tsurumaru, Ikuo Ichinose, Masaomi Kimura

    Abstract: System of Dirac fermions with random-varying mass is studied in detail. We reformulate the system by transfer-matrix formalism. Eigenvalues and wave functions are obtained numerically for various configurations of random telegraphic mass m(x). Localized and extended states are identified. For quasi-periodic m(x), low-energy wave functions are also quasi-periodic and extended, though we are n… ▽ More

    Submitted 26 March, 1999; originally announced March 1999.

    Comments: 27 pages, including 8 EPS figures

    Report number: UT-Komaba 98-23, ICRR-Report-452-99-10

    Journal ref: Nucl. Phys. B556 (1999) 545