Skip to main content

Showing 1–5 of 5 results for author: Nojima, R

.
  1. Long-term secure distributed storage using quantum key distribution network with third-party verification

    Authors: Mikio Fujiwara, Ryo Nojima, Toyohiro Tsurumaru, Shiho Moriai, Masahiro Takeoka, Masahide Sasaki

    Abstract: The quantum key distribution network with Vernam's One Time Pad encryption and secret sharing are powerful security tools to realize an information theoretically secure distributed storage system. In our previous work, a single-password-authenticated secret sharing scheme based on the QKD network and Shamir's secret sharing was experimentally demonstrated; it confirmed ITS data transmission, stora… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: 12 pages, 5 figures; Accepted in IEEE trans. Quantum Technology

  2. The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers

    Authors: Yoshinori Aono, Sitong Liu, Tomoki Tanaka, Shumpei Uno, Rodney Van Meter, Naoyuki Shinohara, Ryo Nojima

    Abstract: The discrete logarithm problem (DLP) is the basis for several cryptographic primitives. Since Shor's work, it has been known that the DLP can be solved by combining a polynomial-size quantum circuit and a polynomial-time classical post-processing algorithm. Evaluating and predicting the instance size that quantum devices can solve is an emerging research topic. In this paper, we propose a quantita… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

    Journal ref: IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-21, 2022

  3. arXiv:2107.10407  [pdf, other

    cs.CR cs.DB

    Designing a Location Trace Anonymization Contest

    Authors: Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka

    Abstract: For a better understanding of anonymization methods for location traces, we have designed and held a location trace anonymization contest that deals with a long trace (400 events per user) and fine-grained locations (1024 regions). In our contest, each team anonymizes her original traces, and then the other teams perform privacy attacks against the anonymized traces. In other words, both defense a… ▽ More

    Submitted 5 September, 2022; v1 submitted 21 July, 2021; originally announced July 2021.

    Comments: Accepted at PoPETs (Proceedings on Privacy Enhancing Technologies) 2023

  4. On Induction for Twisted Representations of Conformal Nets

    Authors: Ryo Nojima

    Abstract: For a given finite index inclusion of conformal nets $\mathcal{B}\subset \mathcal{A}$ and a group $G < \mathrm{Aut}(\mathcal{A}, \mathcal{B})$, we consider the induction and the restriction procedures for $G$-twisted representations. We define two induction procedures for $G$-twisted representations, which generalize the $α^{\pm}$-induction for DHR endomorphisms. One is defined with the opposite b… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

  5. arXiv:1607.00468  [pdf

    quant-ph cs.CR

    Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

    Authors: Mikio Fujiwara, Atsushi Waseda, Ryo Nojima, Shiho Moriai, Wakaha Ogata, Masahide Sasaki

    Abstract: Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: 16 pages, 3 figures, and supplementary information, Scientific Reports srep28988 2016