ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0904.0308
  4. Cited By
Exponential decreasing rate of leaked information in universal random
  privacy amplification
v1v2v3v4v5 (latest)

Exponential decreasing rate of leaked information in universal random privacy amplification

IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2009
2 April 2009
Masahito Hayashi
ArXiv (abs)PDFHTML

Papers citing "Exponential decreasing rate of leaked information in universal random privacy amplification"

40 / 40 papers shown
Rényi divergence-based uniformity guarantees for $k$-universal hash functions
Rényi divergence-based uniformity guarantees for kkk-universal hash functionsIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2024
Madhura Pathegama
Alexander Barg
169
1
0
21 Oct 2024
Security for adversarial wiretap channels
Security for adversarial wiretap channels
Esther Hänggi
Iyán Méndez Veiga
Ligong Wang
203
1
0
02 Apr 2024
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost
  Constraints
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost ConstraintsIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2023
Masahito Hayashi
Yanling Chen
119
2
0
21 Oct 2023
One-Time Universal Hashing Quantum Digital Signatures without Perfect
  Keys
One-Time Universal Hashing Quantum Digital Signatures without Perfect KeysPhysical Review Applied (Phys. Rev. Appl.), 2023
Bing-Hong Li
Yuan-Mei Xie
Xiao-Yu Cao
Chen-Long Li
Yao Fu
Hua‐Lei Yin
Zenghu Chen
373
28
0
03 Jan 2023
Strong Converse for Privacy Amplification against Quantum Side
  Information
Strong Converse for Privacy Amplification against Quantum Side InformationInternational Symposium on Information Theory (ISIT), 2022
Yunyi Shen
Li Gao
Hao-Chung Cheng
319
12
0
21 Feb 2022
Conditional Shannon, Réyni, and Tsallis entropies estimation and
  asymptotic limits: discrete case
Conditional Shannon, Réyni, and Tsallis entropies estimation and asymptotic limits: discrete case
Ba Amadou Diadie
Lo Gane Samb
118
0
0
16 Feb 2020
Physical Layer Security Protocol for Poisson Channels for Passive
  Man-in-the-middle Attack
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle AttackIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2019
Masahito Hayashi
Á. Vázquez-Castro
127
20
0
31 Dec 2019
Toward Undetectable Quantum Key Distribution over Bosonic Channels
Toward Undetectable Quantum Key Distribution over Bosonic ChannelsIEEE Journal on Selected Areas in Information Theory (JSAIT), 2019
Mehrdad Tahmasbi
Matthieu R. Bloch
224
11
0
28 Apr 2019
Entropies and their Asymptotic Theory in the discrete case
Entropies and their Asymptotic Theory in the discrete case
Amadou Diadié Ba
G. Lo
167
1
0
19 Mar 2019
Secure list decoding
Secure list decoding
Masahito Hayashi
275
1
0
09 Jan 2019
Semi-Finite Length Analysis for Information Theoretic Tasks
Semi-Finite Length Analysis for Information Theoretic Tasks
Masahito Hayashi
186
5
0
01 Nov 2018
Simulation of Random Variables under Rényi Divergence Measures of All
  Orders
Simulation of Random Variables under Rényi Divergence Measures of All Orders
Lei Yu
Vincent Y. F. Tan
332
15
0
31 May 2018
Asymptotic Coupling and Its Applications in Information Theory
Asymptotic Coupling and Its Applications in Information Theory
Lei Yu
Vincent Y. F. Tan
274
17
0
19 Dec 2017
Rényi Resolvability and Its Applications to the Wiretap Channel
Rényi Resolvability and Its Applications to the Wiretap Channel
Lei Yu
Vincent Y. F. Tan
347
47
0
04 Jul 2017
Information-theoretic Physical Layer Security for Satellite Channels
Information-theoretic Physical Layer Security for Satellite Channels
M. Vázquez-Castro
Masahito Hayashi
222
9
0
24 Oct 2016
Analysis of Remaining Uncertainties and Exponents under Various
  Conditional Rényi Entropies
Analysis of Remaining Uncertainties and Exponents under Various Conditional Rényi EntropiesIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2016
Vincent Y. F. Tan
Masahito Hayashi
153
16
0
31 May 2016
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Masahito Hayashi
263
9
0
10 May 2016
On an almost-universal hash function family with applications to
  authentication and secrecy codes
On an almost-universal hash function family with applications to authentication and secrecy codesIACR Cryptology ePrint Archive (IACR ePrint), 2015
Khodakhast Bibak
B. M. Kapron
Venkatesh Srinivasan
L. Tóth
253
18
0
08 Jul 2015
Equivocations, Exponents and Second-Order Coding Rates under Various
  Rényi Information Measures
Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information MeasuresIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2015
Masahito Hayashi
Vincent Y. F. Tan
334
36
0
10 Apr 2015
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and
  Asymptotic Analyses
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses
Masahito Hayashi
Shun Watanabe
368
38
0
15 Mar 2015
Information Spectrum Approach to Strong Converse Theorems for Degraded
  Wiretap Channels
Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap ChannelsAllerton Conference on Communication, Control, and Computing (Allerton), 2014
Vincent Y. F. Tan
Matthieu R. Bloch
158
15
0
26 Jun 2014
Secret Sharing Schemes Based on Min-Entropies
Secret Sharing Schemes Based on Min-Entropies
Mitsugu Iwamoto
Junji Shikata
184
7
0
23 Jan 2014
More Efficient Privacy Amplification with Less Random Seeds via Dual
  Universal Hash Function
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash FunctionIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
Masahito Hayashi
T. Tsurumaru
823
97
0
21 Nov 2013
Security analysis of epsilon-almost dual universal2 hash functions:
  smoothing of min entropy vs. smoothing of Rényi entropy of order 2
Security analysis of epsilon-almost dual universal2 hash functions: smoothing of min entropy vs. smoothing of Rényi entropy of order 2IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
Masahito Hayashi
474
33
0
06 Sep 2013
Reliability and Secrecy Functions of the Wiretap Channel under Cost
  Constraint
Reliability and Secrecy Functions of the Wiretap Channel under Cost ConstraintIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
T. Han
H. Endo
M. Sasaki
952
59
0
02 Jul 2013
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and
  Inf-Spectral Entropy
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy
Shun Watanabe
Masahito Hayashi
249
41
0
22 Nov 2012
Attacks on quantum key distribution protocols that employ non-ITS
  authentication
Attacks on quantum key distribution protocols that employ non-ITS authenticationQuantum Information Processing (QIP), 2012
C. Pacher
Aysajan Abidin
T. Lorünser
M. Peev
R. Ursin
A. Zeilinger
Jan-Åke Larsson
352
34
0
03 Sep 2012
Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity
  and Secrecy Outage
Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy OutageIEEE Journal on Selected Areas in Communications (JSAC), 2012
Tzu-Han Chou
S. Draper
A. Sayeed
152
22
0
18 Aug 2012
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
Secure Multiplex Coding with Dependent and Non-Uniform Multiple MessagesAllerton Conference on Communication, Control, and Computing (Allerton), 2012
Masahito Hayashi
R. Matsumoto
622
105
0
07 Feb 2012
Precise evaluation of leaked information with universal2 privacy
  amplification in the presence of quantum attacker
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attackerCommunications in Mathematical Physics (CMP), 2012
Masahito Hayashi
597
36
0
03 Feb 2012
Quantum wiretap channel with non-uniform random number and its exponent
  and equivocation rate of leaked information
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked informationIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2012
Masahito Hayashi
467
50
0
01 Feb 2012
Large deviation analysis for quantum security via smoothing of Renyi
  entropy of order 2
Large deviation analysis for quantum security via smoothing of Renyi entropy of order 2IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2012
Masahito Hayashi
764
48
0
01 Feb 2012
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform
  Messages
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform MessagesIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2011
R. Matsumoto
Masahito Hayashi
413
23
0
17 Nov 2011
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and
  Secrecy Exponents
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy ExponentsIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2011
Tzu-Han Chou
Vincent Y. F. Tan
S. Draper
404
14
0
21 Jul 2011
Universally Attainable Error and Information Exponents, and Equivocation
  Rate for the Broadcast Channels with Confidential Messages
Universally Attainable Error and Information Exponents, and Equivocation Rate for the Broadcast Channels with Confidential Messages
Masahito Hayashi
R. Matsumoto
402
14
0
21 Apr 2011
Secure Multiplex Network Coding
Secure Multiplex Network Coding
R. Matsumoto
Masahito Hayashi
498
26
0
15 Feb 2011
Secure Multiplex Coding with a Common Message
Secure Multiplex Coding with a Common Message
R. Matsumoto
Masahito Hayashi
355
7
0
20 Jan 2011
Tight exponential analysis of universally composable privacy
  amplification and its applications
Tight exponential analysis of universally composable privacy amplification and its applications
Masahito Hayashi
723
79
0
07 Oct 2010
Strong security and separated code constructions for the broadcast
  channels with confidential messages
Strong security and separated code constructions for the broadcast channels with confidential messages
R. Matsumoto
Masahito Hayashi
417
8
0
05 Oct 2010
Construction of wiretap codes from ordinary channel codes
Construction of wiretap codes from ordinary channel codes
Masahito Hayashi
R. Matsumoto
428
53
0
08 Jan 2010
1
Page 1 of 1