Masahito Hayashi
Orcid: 0000-0003-3104-1000
According to our database1,
Masahito Hayashi
authored at least 186 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2017, "For contributions to Shannon theory, information-theoretic security, and quantum information theory".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, July, 2024
Corrections to "Equivocations, Exponents, and Second-Order Coding Rates Under Various Rényi Information Measures".
IEEE Trans. Inf. Theory, April, 2024
Covert Communication With Gaussian Noise: From Random Access Channel to Point-to-Point Channel.
IEEE Trans. Commun., March, 2024
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage.
IEEE/ACM Trans. Netw., February, 2024
Universal tester for multiple independence testing and classical-quantum arbitrarily varying multiple access channel.
CoRR, 2024
Three-Receiver Quantum Broadcast Channels: Classical Communication with Quantum Non-unique Decoding.
CoRR, 2024
Reverse em-problem based on Bregman divergence and its application to classical and quantum information theory.
CoRR, 2024
2023
Comments on "Analytical Algorithm for Capacities of Classical and Classical-Quantum Channels".
IEEE Trans. Inf. Theory, November, 2023
Unified Approach to Secret Sharing and Symmetric Private Information Retrieval With Colluding Servers in Quantum Systems.
IEEE Trans. Inf. Theory, October, 2023
IEEE Trans. Inf. Theory, August, 2023
Tight Cramér-Rao type bounds for multiparameter quantum metrology through conic programming.
Quantum, August, 2023
Bregman Divergence Based Em Algorithm and its Application to Classical and Quantum Rate Distortion Theory.
IEEE Trans. Inf. Theory, June, 2023
Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification.
IEEE Trans. Inf. Theory, March, 2023
IEEE Trans. Inf. Theory, March, 2023
2022
Universal Classical-Quantum Superposition Coding and Universal Classical-Quantum Multiple Access Channel Coding.
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Theory, 2022
Quantum Inf. Process., 2022
Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure.
IEEE J. Sel. Areas Commun., 2022
On the Capacity of Quantum Private Information Retrieval From MDS-Coded and Colluding Servers.
IEEE J. Sel. Areas Commun., 2022
CoRR, 2022
Quantum-Inspired Secure Wireless Communication Protocol Under Spatial and Local Gaussian Noise Assumptions.
IEEE Access, 2022
Exponents in smoothing the max-relative entropy and of randomness extraction against quantum side information.
Proceedings of the IEEE International Symposium on Information Theory, 2022
Analytical calculation formulas for capacities of classical and classical-quantum channels.
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network With Free One-Way Public Communication.
IEEE Trans. Inf. Theory, 2021
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction.
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Commun., 2021
Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers.
IEEE J. Sel. Areas Inf. Theory, 2021
IEEE J. Sel. Areas Inf. Theory, 2021
IEEE J. Sel. Areas Inf. Theory, 2021
Quantum secure direct communication with private dense coding using general preshared quantum state.
CoRR, 2021
Computation-aided classical-quantum multiple access to boost network communication speeds.
CoRR, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Asymptotic Separation Between Adaptive and Non-adaptive Strategies in Quantum Channel Discrimination.
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Refined Density Evolution Analysis of LDPC Codes for Successive Interference Cancellation.
Proceedings of the IEEE Global Communications Conference, 2021
2020
IEEE Trans. Inf. Theory, 2020
Corrections to "Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes".
IEEE Trans. Inf. Theory, 2020
Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes.
IEEE Trans. Inf. Theory, 2020
IEEE Trans. Inf. Theory, 2020
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack.
IEEE Trans. Inf. Forensics Secur., 2020
Asymptotic Behavior of Spatial Coupling LDPC Coding for Compute-and-Forward Two-Way Relaying.
IEEE Trans. Commun., 2020
IEEE Trans. Commun., 2020
Entropy, 2020
CoRR, 2020
Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution.
CoRR, 2020
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction.
CoRR, 2020
Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms.
Proceedings of the IEEE International Symposium on Information Theory, 2020
2019
Second Order Analysis for Joint Source-Channel Coding With General Channel and Markovian Source.
IEEE Trans. Inf. Theory, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Optimal Mechanism for Randomized Responses under Universally Composable Security Measure.
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
One-Way and Two-Way Physical Layer Security Protocols for the Gaussian Satellite Channel.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions.
IEEE Trans. Inf. Theory, 2018
Analysis of Remaining Uncertainties and Exponents Under Various Conditional Rényi Entropies.
IEEE Trans. Inf. Theory, 2018
Corrections to "Random Number Conversion and LOCC Conversion via Restricted Storage".
IEEE Trans. Inf. Theory, 2018
Corrections to "Second-Order Asymptotics of Conversions of Distributions and Entangled States Based on Rayleigh-Normal Probability Distributions".
IEEE Trans. Inf. Theory, 2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations.
Proceedings of the 13th Conference on the Theory of Quantum Computation, 2018
Proceedings of the IEEE Information Theory Workshop, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
IEEE Trans. Inf. Theory, 2017
IEEE Trans. Inf. Theory, 2017
Second-Order Asymptotics of Conversions of Distributions and Entangled States Based on Rayleigh-Normal Probability Distributions.
IEEE Trans. Inf. Theory, 2017
Equivocations, Exponents, and Second-Order Coding Rates Under Various Rényi Information Measures.
IEEE Trans. Inf. Theory, 2017
Tight Asymptotic Bounds on Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State.
IEEE Trans. Inf. Theory, 2017
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority.
IACR Cryptol. ePrint Arch., 2017
Finite-Length Bounds for Joint Source-Channel Coding with Markovian Source and Additive Channel Noise to Achieve Large and Moderate Deviation Bounds.
CoRR, 2017
CoRR, 2017
Proceedings of the 2017 IEEE Information Theory Workshop, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
2016
Uniform Random Number Generation From Markov Chains: Non-Asymptotic and Asymptotic Analyses.
IEEE Trans. Inf. Theory, 2016
IEEE Trans. Inf. Theory, 2016
More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function.
IEEE Trans. Inf. Theory, 2016
IEEE Trans. Inf. Theory, 2016
Security Analysis of ɛ-Almost Dual Universal<sub>2</sub> Hash Functions: Smoothing of Min Entropy Versus Smoothing of Rényi Entropy of Order 2.
IEEE Trans. Inf. Theory, 2016
CoRR, 2016
Operational interpretation of Rényi conditional mutual information via composite hypothesis testing against Markov distributions.
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
IEEE Trans. Inf. Theory, 2015
IEEE Trans. Inf. Theory, 2015
Quantum Wiretap Channel With Non-Uniform Random Number and Its Exponent and Equivocation Rate of Leaked Information.
IEEE Trans. Inf. Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Correlation detection and an operational interpretation of the Rényi mutual information.
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
Large Deviation Analysis for Quantum Security via Smoothing of Rényi Entropy of Order 2.
IEEE Trans. Inf. Theory, 2014
Composite Hypothesis Testing and an Operational Interpretation of the Renyi Mutual Information.
CoRR, 2014
Proceedings of the 2014 Information Theory and Applications Workshop, 2014
Finite-length analysis on tail probability and simple hypothesis testing for Markov chain.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
A duality relation connecting different quantum generalizations of the conditional Rényi entropy.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Moderate deviations for joint source-channel coding of systems with Markovian memory.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014
2013
IEEE Trans. Inf. Theory, 2013
A Hierarchy of Information Quantities for Finite Block Length Analysis of Quantum Tasks.
IEEE Trans. Inf. Theory, 2013
Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications.
IEEE Trans. Inf. Theory, 2013
Second Order Asymptotics of Optimal Approximate Conversion for Probability Distributions and Entangled States and Its Application to LOCC Cloning.
CoRR, 2013
More Efficient Privacy Amplification with Non-Uniform Random Seeds via Dual Universal Hash Function.
CoRR, 2013
Proceedings of the International Symposium on Micro-NanoMechatronics and Human Science, 2013
Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 51st Annual Allerton Conference on Communication, 2013
2012
CoRR, 2012
Proceedings of the Theory of Quantum Computation, 2012
Quantum wiretap channel with non-uniform random number and its exponent of leaked information.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2011
Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification.
IEEE Trans. Inf. Theory, 2011
CoRR, 2011
Universally Attainable Error and Information Exponents for the Broadcast Channels with Confidential Messages
CoRR, 2011
Dual universality of hash functions and its applications to classical and quantum cryptography
CoRR, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Construction and Analysis of an Artificial Neuronal Network using a Neuron-collecting, Micro-patterning Method based on a Multi-electrode Array System.
Proceedings of the NCTA 2011, 2011
Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messages.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011
2010
IEEE Trans. Inf. Theory, 2010
Tight exponential evaluation for information theoretical secrecy based on L1 distance
CoRR, 2010
Strong security and separated code constructions for the broadcast channels with confidential messages
CoRR, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
2009
IEEE Trans. Inf. Theory, 2009
Discrimination of two channels by adaptive methods and its application to quantum system.
IEEE Trans. Inf. Theory, 2009
2008
IEEE Trans. Inf. Theory, 2008
Quantum Inf. Comput., 2008
2007
An Information-Spectrum Approach to Classical and Quantum Hypothesis Testing for Simple Hypotheses.
IEEE Trans. Inf. Theory, 2007
2006
IEEE Trans. Inf. Theory, 2006
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel.
IEEE Trans. Inf. Theory, 2006
Quantum Inf. Comput., 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures.
Quantum Inf. Comput., 2005
General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to wire-tap channel
CoRR, 2005
2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2003
IEEE Trans. Inf. Theory, 2003
2002
Quantum Inf. Comput., 2002