(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–12 of 12 results for author: Sasaki, Y

Searching in archive quant-ph. Search in all archives.
.
  1. Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm

    Authors: Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher

    Abstract: In symmetric cryptanalysis, the model of superposition queries has led to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But the practical implications of these attacks remain blurry. In contrast, the results obtained so far for a quantum adversary making classical queries only are less impressive. In this paper, we introduce… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

    Comments: ASIACRYPT 2019

  2. Boosting the secret key rate in a shared quantum and classical fibre communication system

    Authors: Davide Bacco, Beatrice Da Lio, Daniele Cozzolino, Francesco Da Ros, Xueshi Guo, Yunhong Ding, Yusuke Sasaki, Kazuhiko Aikawa, Shigehito Miki, Hirotaka Terai, Taro Yamashita, Jonas S. Neergaard-Nielsen, Michael Galili, Karsten Rottwitt, Ulrik L. Andersen, Toshio Morioka, Leif K. Oxenløwe

    Abstract: During the last 20 years, the advance of communication technologies has generated multiple exciting applications. However, classical cryptography, commonly adopted to secure current communication systems, can be jeopardized by the advent of quantum computers. Quantum key distribution (QKD) is a promising technology aiming to solve such a security problem. Unfortunately, current implementations of… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Journal ref: Communication Physics 2, 140 (2019)

  3. arXiv:1911.02822  [pdf, other

    quant-ph cs.CC cs.CR

    Quantum Algorithm for the Multicollision Problem

    Authors: Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa

    Abstract: The current paper presents a new quantum algorithm for finding multicollisions, often denoted by $\ell$-collisions, where an $\ell$-collision for a function is a set of $\ell$ distinct inputs that are mapped by the function to the same value. The tight bound of quantum query complexity for finding a $2$-collisions of a random function has been revealed to be $Θしーた(N^{1/3})$, where $N$ is the size of… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

    Comments: 23 pages, 2 figures and 2 tables; a significantly revised version of two conference papers (Asiacrypt 2017 [Cryptology ePrint Archive Report 2017/864] and PQCrypto 2019 [arXiv:1811.08097]) with additional time and space complexity analyses and discussions

  4. arXiv:1811.08097  [pdf, ps, other

    cs.CR cs.CC cs.DS quant-ph

    Improved Quantum Multicollision-Finding Algorithm

    Authors: Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa

    Abstract: The current paper improves the number of queries of the previous quantum multi-collision finding algorithms presented by Hosoyamada et al. at Asiacrypt 2017. Let an $l$-collision be a tuple of $l$ distinct inputs that result in the same output of a target function. In cryptology, it is important to study how many queries are required to find $l$-collisions for random functions of which domains are… ▽ More

    Submitted 28 January, 2019; v1 submitted 20 November, 2018; originally announced November 2018.

    Comments: To appear at PQCrypto 2019

  5. arXiv:1604.01947  [pdf

    physics.optics physics.atom-ph quant-ph

    Dual-frequency injection-locked continuous-wave near-infrared laser

    Authors: Trivikramarao Gavara, Takeru Ohashi, Yusuke Sasaki, Takuya Kawashima, Hiroaki Hamano, Ryo Yoshizaki, Yuki Fujimura, Kazumichi Yoshii, Chiaki Ohae, Masayuki Katsuragawa

    Abstract: We report a dual-frequency injection-locked continuous-wave near-infrared laser. The entire system consists of a Ti:sapphire ring laser as a power oscillator, two independent diode-lasers employed as seed lasers, and a master cavity providing a frequency reference. Stable dual-frequency injection-locked oscillation is achieved with a maximum output power of 2.8 W. As fundamental performance featur… ▽ More

    Submitted 7 April, 2016; originally announced April 2016.

    Comments: 8 pages, 4 figures

  6. Quantum algorithms for problems in number theory, algebraic geometry, and group theory

    Authors: Wim van Dam, Yoshitaka Sasaki

    Abstract: Quantum computers can execute algorithms that sometimes dramatically outperform classical computation. Undoubtedly the best-known example of this is Shor's discovery of an efficient quantum algorithm for factoring integers, whereas the same problem appears to be intractable on classical computers. Understanding what other computational problems can be solved significantly faster using quantum algo… ▽ More

    Submitted 26 June, 2012; originally announced June 2012.

    Comments: 20 pages, lecture notes for 2010 Summer School on Diversities in Quantum Computation/Information at Kinki University

  7. arXiv:1002.4567  [pdf, ps, other

    physics.atom-ph cond-mat.mtrl-sci hep-ex quant-ph

    Measurement of Positronium hyperfine splitting with quantum oscillation

    Authors: Y. Sasaki, A. Miyazaki, A. Ishida, T. Namba, S. Asai, T. Kobayashi, H. Saito, K. Tanaka, A. Yamamoto

    Abstract: Interference between different energy eigenstates in a quantum system results in an oscillation with a frequency which is proportional to the difference in energy between the states. Such an oscillation is observable in polarized positronium when it is placed in a magnetic field. In order to measure the hyperfine splitting of positronium, we perform the precise measurement of this oscillation usin… ▽ More

    Submitted 25 November, 2010; v1 submitted 24 February, 2010; originally announced February 2010.

    Comments: 4 figures accepted by Phys. Lett. B

    Report number: U.Tokyo ICEPP-Report 2010-01

    Journal ref: J.Phys.Conf.Ser.225:012045,2010; Phys.Lett.B697:121-126,2011

  8. arXiv:0908.1657  [pdf, ps, other

    quant-ph

    On zeros of exponential polynomials and quantum algorithms

    Authors: Yoshitaka Sasaki

    Abstract: We calculate the zeros of an exponential polynomial of some variables by a classical algorithm and quantum algorithms which are based on the method of van Dam and Shparlinski, they treated the case of two variables, and compare with the complexity of those cases. Further we consider the ratio (classical/quantum) of the complexity. Then we can observe the ratio is virtually 2 when the number of t… ▽ More

    Submitted 12 August, 2009; originally announced August 2009.

    Comments: 8 pages, LaTex

  9. arXiv:0908.1027  [pdf, ps, other

    quant-ph cs.CC

    On exponential polynomials and quantum computing

    Authors: Yasuo Ohno, Yoshitaka Sasaki, Chika Yamazaki

    Abstract: We calculate the zeros of an exponential polynomial of three variables by a classical algorithm and quantum algorithms which are based on the method of van Dam and Shparlinski, they treated the case of two variables, and compare with the time complexity of those cases. Further we compare the case of van Dam and Shparlinski with our case by considering the ratio (classical/quantum) of the time co… ▽ More

    Submitted 7 August, 2009; originally announced August 2009.

    Comments: 7pages, LaTeX

  10. A quantum protocol to win the graph colouring game on all Hadamard graphs

    Authors: David Avis, Jun Hasegawa, Yosuke Kikuchi, Yuuya Sasaki

    Abstract: This paper deals with graph colouring games, an example of pseudo-telepathy, in which two provers can convince a verifier that a graph $G$ is $c$-colourable where $c$ is less than the chromatic number of the graph. They win the game if they convince the verifier. It is known that the players cannot win if they share only classical information, but they can win in some cases by sharing entangleme… ▽ More

    Submitted 21 September, 2005; v1 submitted 7 September, 2005; originally announced September 2005.

    Comments: 5page

  11. Two-Party Bell Inequalities Derived from Combinatorics via Triangular Elimination

    Authors: David Avis, Hiroshi Imai, Tsuyoshi Ito, Yuuya Sasaki

    Abstract: We establish a relation between the two-party Bell inequalities for two-valued measurements and a high-dimensional convex polytope called the cut polytope in polyhedral combinatorics. Using this relation, we propose a method, triangular elimination, to derive tight Bell inequalities from facets of the cut polytope. This method gives two hundred million inequivalent tight Bell inequalities from c… ▽ More

    Submitted 3 September, 2005; v1 submitted 9 May, 2005; originally announced May 2005.

    Comments: Part of results in Section 2 appeared in quant-ph/0404014, but this paper gives new proofs using only elementary mathematics. The results in Section 3 was presented in EQIS'04, Kyoto, Sept. 2004. 20 pages with 2 figures. Submitted to Journal of Physics A. v2: introduction rewritten, typos corrected, some detail of proof of Th 2.1 added, relation to open problems mentioned in concluding remarks. v3: URL of the page containing list of Bell inequalities and program to produce it added, typos corrected

  12. arXiv:quant-ph/0404014  [pdf, ps, other

    quant-ph

    Deriving Tight Bell Inequalities for 2 Parties with Many 2-valued Observables from Facets of Cut Polytopes

    Authors: David Avis, Hiroshi Imai, Tsuyoshi Ito, Yuuya Sasaki

    Abstract: Relatively few families of Bell inequalities have previously been identified. Some examples are the trivial, CHSH, I_{mm22}, and CGLMP inequalities. This paper presents a large number of new families of tight Bell inequalities for the case of many observables. For example, 44,368,793 inequivalent tight Bell inequalities other than CHSH are obtained for the case of 2 parties each with 10 2-valued… ▽ More

    Submitted 18 April, 2004; v1 submitted 2 April, 2004; originally announced April 2004.

    Comments: 24 pages, LaTeX. Asymmetric setting of observables is added in the introduction, section 5.4 and section 7.2. Some references and typos are corrected. A description on the I_{3422}^2 inequality is corrected in section 5.4 and added to section 5.1