International Symposium on Mathematics, Quantum Theory, and Cryptography : : Proceedings of MQC 2019.

Saved in:
Bibliographic Details
Superior document:Mathematics for Industry Series ; v.33
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer Singapore Pte. Limited,, 2020.
Ã2021.
Year of Publication:2020
Edition:1st ed.
Language:English
Series:Mathematics for Industry Series
Online Access:
Physical Description:1 online resource (275 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006381426
ctrlnum (MiAaPQ)5006381426
(Au-PeEL)EBL6381426
(OCoLC)1243546856
collection bib_alma
record_format marc
spelling Takagi, Tsuyoshi.
International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
1st ed.
Singapore : Springer Singapore Pte. Limited, 2020.
Ã2021.
1 online resource (275 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Mathematics for Industry Series ; v.33
Intro -- Foreword -- Preface -- Contents -- About the Editors -- &lt -- ExternalRef&gt -- &lt -- RefSource&gt -- swati.meherishi@springer.com&lt -- /RefSource&gt -- &lt -- RefTarget Address= -- Keynote -- Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- References -- Emerging Ultrastrong Coupling Between Light and Matter Observed in Circuit Quantum Electrodynamics -- References -- Summary -- Verified Numerical Computations and Related Applications -- A Review of Secret Key Distribution Based on Bounded Observability -- References -- Quantum Computing and Information Theory -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- 1 Introduction -- 2 Statistical Tests for Random Number Generators -- 3 NIST SP 800-22 -- 3.1 Frequency Test -- 3.2 Frequency Test Within a Block -- 3.3 Runs Test -- 3.4 The Longest Run of Ones Within a Block Test -- 3.5 Discrete Fourier Transform Test -- 3.6 Approximate Entropy Test -- 3.7 Cumulative Sums Test -- 4 Quantum Random Number Generation on the Cloud Quantum Computer -- 5 Conclusion -- References -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- 1 Introduction -- 2 Outline of Shor's Quantum Factoring Algorithm (Shor) -- 2.1 Quantum Computation -- 2.2 Shor's Quantum Factoring Algorithm -- 2.3 Circuit Construction and Resource Estimation for Shor's Quantum Factoring Algorithm -- 2.4 Survey of Quantum Experiments for Factoring -- 3 Quantum Circuits Without Using the Order Information -- 3.1 Quantum Factoring Experiment Shown in IBMspsChuang -- 3.2 Quantum Factoring Experiment Shown in joseph -- 3.3 Quantum Factoring Experiment Shown in realization -- 4 Quantum Circuits with Explicitly Using the Order information -- 4.1 Quantum Factoring Experiment of N=15 Shown in photonic.
4.2 Quantum Factoring Experiment of N=21 Shown in spsqubitrecycing -- 4.3 Oversimplified Shor's Algorithm (oversimplified) -- 5 Summary and Concluding Remarks -- References -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Our Framework for FHE -- 3.1 Group-Theoretic Realization of Functions -- 3.2 Lift of Realization of Functions -- 3.3 The Proposed Framework -- 4 Examples of Realizations of Functions in Groups -- 4.1 Deterministic Case: Known Result -- 4.2 Deterministic Case: Proposed Constructions -- 4.3 Preliminaries: On Random Sampling of Group Elements -- 4.4 Probabilistic Case: ``Commutator-Separable'' Groups -- 4.5 Probabilistic Case: Simple Groups -- 5 Towards Achieving Secure Lift of Realization -- 5.1 A Remark on the Choice of Random Variables -- 5.2 Insecurity of a Matrix-Based Naive Construction -- 5.3 Observation for Avoiding Linear Constraints -- 5.4 Another Trial Using Tietze Transformations -- References -- From the Bloch Sphere to Phase-Space Representations with the Gottesman-Kitaev-Preskill Encoding -- 1 Introduction -- 2 GKP Encoding of Qubit States -- 3 Phase-Space Wigner Representation of GKP Encoded States -- 4 Quantification of Negativity of the Wigner Function for GKP Encoded States -- 5 Conclusions -- References -- Quantum Interactions -- Number Theoretic Study in Quantum Interactions -- References -- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation -- 1 Introduction -- 2 Mathematical Setups -- 2.1 How to Conceal Data -- 2.2 How to Restore Data -- 3 Example of Functionals and Simulation -- 3.1 An Example of the Set of Functionals -- 3.2 Simulation of Concealing and Restoring Data on Physical Layer.
4 Application to Data on Physical Layer and Presentation Layer -- 4.1 Binary Data of Pictorial Image -- 4.2 Analog Data of Pictorial Image -- 5 Conclusion and Future Work -- References -- Quantum Optics with Giant Atoms-the First Five Years -- 1 Introduction -- 2 Theory for Giant Atoms -- 2.1 One Giant Atom -- 2.2 One Giant Atom with Time Delay -- 2.3 Multiple Giant Atoms -- 3 Experiments with Giant Atoms -- 3.1 Superconducting Qubits and Surface Acoustic Waves -- 3.2 Superconducting Qubits and Microwave Transmission Lines -- 3.3 Cold Atoms in Optical Lattices -- 4 Conclusion and Outlook -- References -- Topics in Mathematics -- Extended Divisibility Relations for Constraint Polynomials of the Asymmetric Quantum Rabi Model -- 1 Introduction -- 2 The Confluent Picture of the Asymmetric Quantum Rabi Model -- 3 Extended Divisibility Properties for Constraint and Related Polynomials -- 4 Open Problems -- 4.1 Number of Exceptional Solutions of the AQRM -- 4.2 Classification of Parameter Regimes -- References -- Generalized Group-Subgroup Pair Graphs -- 1 Introduction -- 1.1 Conventions -- 2 Preliminaries -- 3 Cayley Graphs and Group-Subgroup Pair Graphs -- 3.1 Cayley Graphs -- 3.2 Group-Subgroup Pair Graphs -- 4 Homogeneity -- 5 Generalized Group-Subgroup Pair Graph -- 5.1 Definition -- 5.2 Examples -- 6 Spectra of G(G,H,S) -- 6.1 Adjacency Matrix of G(G,H,S) -- 6.2 When H is abelian -- 6.3 Petersen Extension -- References -- Post-Quantum Cryptography -- A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge -- 1 Introduction -- 2 Mathematical Background -- 2.1 Lattices and Their Bases -- 2.2 Successive Minima, Hermite's Constants, and Gaussian Heuristic -- 2.3 Introduction to Lattice Problems -- 3 Solving SVP Algorithms -- 3.1 Exact-SVP Algorithms -- 3.2 Approximate-SVP Algorithms.
4 The SVP Challenge and Recent Strategies -- 4.1 The Random Sampling Strategy -- 4.2 The Sub-Sieving Strategy -- References -- Recent Developments in Multivariate Public Key Cryptosystems -- 1 Introduction -- 2 UOV, Rainbow, and Variants of HFE -- 2.1 Basic Constructions of Multivariate Public Key Cryptosystems -- 2.2 UOV -- 2.3 Rainbow -- 2.4 HFE -- 2.5 Variants of HFE -- 3 New Encryption Schemes -- 3.1 HFERP -- 3.2 ZHFE -- 3.3 EFC -- 3.4 ABC -- 4 Conclusion -- References -- Ramanujan Graphs for Post-Quantum Cryptography -- 1 Introduction -- 2 Ramanujan Graphs and Their Cryptographic Applications -- 2.1 Security on Cayley Hashes and Word Problems -- 2.2 Lifting Attacks -- 3 The Families of LPS-Type Graphs -- 3.1 Proof of the Ramanujan-Ness of Graphs XP,Q(p,q) when P=13 -- 4 Relationship Between LPS-Type Graphs and Pizer's Graphs -- 4.1 Similarities and Differences -- 5 Open Problems -- References -- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Key Techniques -- 1.4 Organization -- 2 Preliminaries -- 2.1 Group Key Exchange -- 2.2 SIDH and CSIDH Key Exchange -- 3 New Assumptions on Supersingular Invariants -- 3.1 New Assumptions on Supersingular j-Invariants -- 3.2 New Assumptions on Supersingular Montgomery Coefficients -- 4 Proposed Post-Quantum Group Key Exchange (GKE) -- 4.1 A Generic JV-Type Compiler for GKE from Two-Party KE (ch18JusVau96) -- 4.2 Constant-Round GKE from Static Standard Assumptions -- 4.3 Two-Round Product-BD (PBD) GKE from d-DSJP Assumption -- 4.4 Two-Round PBD GKE from d-DSMP Assumption -- References -- 19 Correction to: International Symposium on Mathematics, Quantum Theory, and Cryptography.
Correction to: T. Takagi et al. (eds.), International Symposium on Mathematics, Quantum Theory, and Cryptography, Mathematics for Industry 33, https://doi.org/10.1007/978-981-15-5191-8 -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Wakayama, Masato.
Tanaka, Keisuke.
Kunihiro, Noboru.
Kimoto, Kazufumi.
Ikematsu, Yasuhiko.
Print version: Takagi, Tsuyoshi International Symposium on Mathematics, Quantum Theory, and Cryptography Singapore : Springer Singapore Pte. Limited,c2020 9789811551901
ProQuest (Firm)
Mathematics for Industry Series
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6381426 Click to View
language English
format eBook
author Takagi, Tsuyoshi.
spellingShingle Takagi, Tsuyoshi.
International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
Mathematics for Industry Series ;
Intro -- Foreword -- Preface -- Contents -- About the Editors -- &lt -- ExternalRef&gt -- &lt -- RefSource&gt -- swati.meherishi@springer.com&lt -- /RefSource&gt -- &lt -- RefTarget Address= -- Keynote -- Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- References -- Emerging Ultrastrong Coupling Between Light and Matter Observed in Circuit Quantum Electrodynamics -- References -- Summary -- Verified Numerical Computations and Related Applications -- A Review of Secret Key Distribution Based on Bounded Observability -- References -- Quantum Computing and Information Theory -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- 1 Introduction -- 2 Statistical Tests for Random Number Generators -- 3 NIST SP 800-22 -- 3.1 Frequency Test -- 3.2 Frequency Test Within a Block -- 3.3 Runs Test -- 3.4 The Longest Run of Ones Within a Block Test -- 3.5 Discrete Fourier Transform Test -- 3.6 Approximate Entropy Test -- 3.7 Cumulative Sums Test -- 4 Quantum Random Number Generation on the Cloud Quantum Computer -- 5 Conclusion -- References -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- 1 Introduction -- 2 Outline of Shor's Quantum Factoring Algorithm (Shor) -- 2.1 Quantum Computation -- 2.2 Shor's Quantum Factoring Algorithm -- 2.3 Circuit Construction and Resource Estimation for Shor's Quantum Factoring Algorithm -- 2.4 Survey of Quantum Experiments for Factoring -- 3 Quantum Circuits Without Using the Order Information -- 3.1 Quantum Factoring Experiment Shown in IBMspsChuang -- 3.2 Quantum Factoring Experiment Shown in joseph -- 3.3 Quantum Factoring Experiment Shown in realization -- 4 Quantum Circuits with Explicitly Using the Order information -- 4.1 Quantum Factoring Experiment of N=15 Shown in photonic.
4.2 Quantum Factoring Experiment of N=21 Shown in spsqubitrecycing -- 4.3 Oversimplified Shor's Algorithm (oversimplified) -- 5 Summary and Concluding Remarks -- References -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Our Framework for FHE -- 3.1 Group-Theoretic Realization of Functions -- 3.2 Lift of Realization of Functions -- 3.3 The Proposed Framework -- 4 Examples of Realizations of Functions in Groups -- 4.1 Deterministic Case: Known Result -- 4.2 Deterministic Case: Proposed Constructions -- 4.3 Preliminaries: On Random Sampling of Group Elements -- 4.4 Probabilistic Case: ``Commutator-Separable'' Groups -- 4.5 Probabilistic Case: Simple Groups -- 5 Towards Achieving Secure Lift of Realization -- 5.1 A Remark on the Choice of Random Variables -- 5.2 Insecurity of a Matrix-Based Naive Construction -- 5.3 Observation for Avoiding Linear Constraints -- 5.4 Another Trial Using Tietze Transformations -- References -- From the Bloch Sphere to Phase-Space Representations with the Gottesman-Kitaev-Preskill Encoding -- 1 Introduction -- 2 GKP Encoding of Qubit States -- 3 Phase-Space Wigner Representation of GKP Encoded States -- 4 Quantification of Negativity of the Wigner Function for GKP Encoded States -- 5 Conclusions -- References -- Quantum Interactions -- Number Theoretic Study in Quantum Interactions -- References -- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation -- 1 Introduction -- 2 Mathematical Setups -- 2.1 How to Conceal Data -- 2.2 How to Restore Data -- 3 Example of Functionals and Simulation -- 3.1 An Example of the Set of Functionals -- 3.2 Simulation of Concealing and Restoring Data on Physical Layer.
4 Application to Data on Physical Layer and Presentation Layer -- 4.1 Binary Data of Pictorial Image -- 4.2 Analog Data of Pictorial Image -- 5 Conclusion and Future Work -- References -- Quantum Optics with Giant Atoms-the First Five Years -- 1 Introduction -- 2 Theory for Giant Atoms -- 2.1 One Giant Atom -- 2.2 One Giant Atom with Time Delay -- 2.3 Multiple Giant Atoms -- 3 Experiments with Giant Atoms -- 3.1 Superconducting Qubits and Surface Acoustic Waves -- 3.2 Superconducting Qubits and Microwave Transmission Lines -- 3.3 Cold Atoms in Optical Lattices -- 4 Conclusion and Outlook -- References -- Topics in Mathematics -- Extended Divisibility Relations for Constraint Polynomials of the Asymmetric Quantum Rabi Model -- 1 Introduction -- 2 The Confluent Picture of the Asymmetric Quantum Rabi Model -- 3 Extended Divisibility Properties for Constraint and Related Polynomials -- 4 Open Problems -- 4.1 Number of Exceptional Solutions of the AQRM -- 4.2 Classification of Parameter Regimes -- References -- Generalized Group-Subgroup Pair Graphs -- 1 Introduction -- 1.1 Conventions -- 2 Preliminaries -- 3 Cayley Graphs and Group-Subgroup Pair Graphs -- 3.1 Cayley Graphs -- 3.2 Group-Subgroup Pair Graphs -- 4 Homogeneity -- 5 Generalized Group-Subgroup Pair Graph -- 5.1 Definition -- 5.2 Examples -- 6 Spectra of G(G,H,S) -- 6.1 Adjacency Matrix of G(G,H,S) -- 6.2 When H is abelian -- 6.3 Petersen Extension -- References -- Post-Quantum Cryptography -- A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge -- 1 Introduction -- 2 Mathematical Background -- 2.1 Lattices and Their Bases -- 2.2 Successive Minima, Hermite's Constants, and Gaussian Heuristic -- 2.3 Introduction to Lattice Problems -- 3 Solving SVP Algorithms -- 3.1 Exact-SVP Algorithms -- 3.2 Approximate-SVP Algorithms.
4 The SVP Challenge and Recent Strategies -- 4.1 The Random Sampling Strategy -- 4.2 The Sub-Sieving Strategy -- References -- Recent Developments in Multivariate Public Key Cryptosystems -- 1 Introduction -- 2 UOV, Rainbow, and Variants of HFE -- 2.1 Basic Constructions of Multivariate Public Key Cryptosystems -- 2.2 UOV -- 2.3 Rainbow -- 2.4 HFE -- 2.5 Variants of HFE -- 3 New Encryption Schemes -- 3.1 HFERP -- 3.2 ZHFE -- 3.3 EFC -- 3.4 ABC -- 4 Conclusion -- References -- Ramanujan Graphs for Post-Quantum Cryptography -- 1 Introduction -- 2 Ramanujan Graphs and Their Cryptographic Applications -- 2.1 Security on Cayley Hashes and Word Problems -- 2.2 Lifting Attacks -- 3 The Families of LPS-Type Graphs -- 3.1 Proof of the Ramanujan-Ness of Graphs XP,Q(p,q) when P=13 -- 4 Relationship Between LPS-Type Graphs and Pizer's Graphs -- 4.1 Similarities and Differences -- 5 Open Problems -- References -- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Key Techniques -- 1.4 Organization -- 2 Preliminaries -- 2.1 Group Key Exchange -- 2.2 SIDH and CSIDH Key Exchange -- 3 New Assumptions on Supersingular Invariants -- 3.1 New Assumptions on Supersingular j-Invariants -- 3.2 New Assumptions on Supersingular Montgomery Coefficients -- 4 Proposed Post-Quantum Group Key Exchange (GKE) -- 4.1 A Generic JV-Type Compiler for GKE from Two-Party KE (ch18JusVau96) -- 4.2 Constant-Round GKE from Static Standard Assumptions -- 4.3 Two-Round Product-BD (PBD) GKE from d-DSJP Assumption -- 4.4 Two-Round PBD GKE from d-DSMP Assumption -- References -- 19 Correction to: International Symposium on Mathematics, Quantum Theory, and Cryptography.
Correction to: T. Takagi et al. (eds.), International Symposium on Mathematics, Quantum Theory, and Cryptography, Mathematics for Industry 33, https://doi.org/10.1007/978-981-15-5191-8 -- Index.
author_facet Takagi, Tsuyoshi.
Wakayama, Masato.
Tanaka, Keisuke.
Kunihiro, Noboru.
Kimoto, Kazufumi.
Ikematsu, Yasuhiko.
author_variant t t tt
author2 Wakayama, Masato.
Tanaka, Keisuke.
Kunihiro, Noboru.
Kimoto, Kazufumi.
Ikematsu, Yasuhiko.
author2_variant m w mw
k t kt
n k nk
k k kk
y i yi
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Takagi, Tsuyoshi.
title International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
title_sub Proceedings of MQC 2019.
title_full International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
title_fullStr International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
title_full_unstemmed International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
title_auth International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
title_new International Symposium on Mathematics, Quantum Theory, and Cryptography :
title_sort international symposium on mathematics, quantum theory, and cryptography : proceedings of mqc 2019.
series Mathematics for Industry Series ;
series2 Mathematics for Industry Series ;
publisher Springer Singapore Pte. Limited,
publishDate 2020
physical 1 online resource (275 pages)
edition 1st ed.
contents Intro -- Foreword -- Preface -- Contents -- About the Editors -- &lt -- ExternalRef&gt -- &lt -- RefSource&gt -- swati.meherishi@springer.com&lt -- /RefSource&gt -- &lt -- RefTarget Address= -- Keynote -- Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- References -- Emerging Ultrastrong Coupling Between Light and Matter Observed in Circuit Quantum Electrodynamics -- References -- Summary -- Verified Numerical Computations and Related Applications -- A Review of Secret Key Distribution Based on Bounded Observability -- References -- Quantum Computing and Information Theory -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- 1 Introduction -- 2 Statistical Tests for Random Number Generators -- 3 NIST SP 800-22 -- 3.1 Frequency Test -- 3.2 Frequency Test Within a Block -- 3.3 Runs Test -- 3.4 The Longest Run of Ones Within a Block Test -- 3.5 Discrete Fourier Transform Test -- 3.6 Approximate Entropy Test -- 3.7 Cumulative Sums Test -- 4 Quantum Random Number Generation on the Cloud Quantum Computer -- 5 Conclusion -- References -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- 1 Introduction -- 2 Outline of Shor's Quantum Factoring Algorithm (Shor) -- 2.1 Quantum Computation -- 2.2 Shor's Quantum Factoring Algorithm -- 2.3 Circuit Construction and Resource Estimation for Shor's Quantum Factoring Algorithm -- 2.4 Survey of Quantum Experiments for Factoring -- 3 Quantum Circuits Without Using the Order Information -- 3.1 Quantum Factoring Experiment Shown in IBMspsChuang -- 3.2 Quantum Factoring Experiment Shown in joseph -- 3.3 Quantum Factoring Experiment Shown in realization -- 4 Quantum Circuits with Explicitly Using the Order information -- 4.1 Quantum Factoring Experiment of N=15 Shown in photonic.
4.2 Quantum Factoring Experiment of N=21 Shown in spsqubitrecycing -- 4.3 Oversimplified Shor's Algorithm (oversimplified) -- 5 Summary and Concluding Remarks -- References -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Our Framework for FHE -- 3.1 Group-Theoretic Realization of Functions -- 3.2 Lift of Realization of Functions -- 3.3 The Proposed Framework -- 4 Examples of Realizations of Functions in Groups -- 4.1 Deterministic Case: Known Result -- 4.2 Deterministic Case: Proposed Constructions -- 4.3 Preliminaries: On Random Sampling of Group Elements -- 4.4 Probabilistic Case: ``Commutator-Separable'' Groups -- 4.5 Probabilistic Case: Simple Groups -- 5 Towards Achieving Secure Lift of Realization -- 5.1 A Remark on the Choice of Random Variables -- 5.2 Insecurity of a Matrix-Based Naive Construction -- 5.3 Observation for Avoiding Linear Constraints -- 5.4 Another Trial Using Tietze Transformations -- References -- From the Bloch Sphere to Phase-Space Representations with the Gottesman-Kitaev-Preskill Encoding -- 1 Introduction -- 2 GKP Encoding of Qubit States -- 3 Phase-Space Wigner Representation of GKP Encoded States -- 4 Quantification of Negativity of the Wigner Function for GKP Encoded States -- 5 Conclusions -- References -- Quantum Interactions -- Number Theoretic Study in Quantum Interactions -- References -- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation -- 1 Introduction -- 2 Mathematical Setups -- 2.1 How to Conceal Data -- 2.2 How to Restore Data -- 3 Example of Functionals and Simulation -- 3.1 An Example of the Set of Functionals -- 3.2 Simulation of Concealing and Restoring Data on Physical Layer.
4 Application to Data on Physical Layer and Presentation Layer -- 4.1 Binary Data of Pictorial Image -- 4.2 Analog Data of Pictorial Image -- 5 Conclusion and Future Work -- References -- Quantum Optics with Giant Atoms-the First Five Years -- 1 Introduction -- 2 Theory for Giant Atoms -- 2.1 One Giant Atom -- 2.2 One Giant Atom with Time Delay -- 2.3 Multiple Giant Atoms -- 3 Experiments with Giant Atoms -- 3.1 Superconducting Qubits and Surface Acoustic Waves -- 3.2 Superconducting Qubits and Microwave Transmission Lines -- 3.3 Cold Atoms in Optical Lattices -- 4 Conclusion and Outlook -- References -- Topics in Mathematics -- Extended Divisibility Relations for Constraint Polynomials of the Asymmetric Quantum Rabi Model -- 1 Introduction -- 2 The Confluent Picture of the Asymmetric Quantum Rabi Model -- 3 Extended Divisibility Properties for Constraint and Related Polynomials -- 4 Open Problems -- 4.1 Number of Exceptional Solutions of the AQRM -- 4.2 Classification of Parameter Regimes -- References -- Generalized Group-Subgroup Pair Graphs -- 1 Introduction -- 1.1 Conventions -- 2 Preliminaries -- 3 Cayley Graphs and Group-Subgroup Pair Graphs -- 3.1 Cayley Graphs -- 3.2 Group-Subgroup Pair Graphs -- 4 Homogeneity -- 5 Generalized Group-Subgroup Pair Graph -- 5.1 Definition -- 5.2 Examples -- 6 Spectra of G(G,H,S) -- 6.1 Adjacency Matrix of G(G,H,S) -- 6.2 When H is abelian -- 6.3 Petersen Extension -- References -- Post-Quantum Cryptography -- A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge -- 1 Introduction -- 2 Mathematical Background -- 2.1 Lattices and Their Bases -- 2.2 Successive Minima, Hermite's Constants, and Gaussian Heuristic -- 2.3 Introduction to Lattice Problems -- 3 Solving SVP Algorithms -- 3.1 Exact-SVP Algorithms -- 3.2 Approximate-SVP Algorithms.
4 The SVP Challenge and Recent Strategies -- 4.1 The Random Sampling Strategy -- 4.2 The Sub-Sieving Strategy -- References -- Recent Developments in Multivariate Public Key Cryptosystems -- 1 Introduction -- 2 UOV, Rainbow, and Variants of HFE -- 2.1 Basic Constructions of Multivariate Public Key Cryptosystems -- 2.2 UOV -- 2.3 Rainbow -- 2.4 HFE -- 2.5 Variants of HFE -- 3 New Encryption Schemes -- 3.1 HFERP -- 3.2 ZHFE -- 3.3 EFC -- 3.4 ABC -- 4 Conclusion -- References -- Ramanujan Graphs for Post-Quantum Cryptography -- 1 Introduction -- 2 Ramanujan Graphs and Their Cryptographic Applications -- 2.1 Security on Cayley Hashes and Word Problems -- 2.2 Lifting Attacks -- 3 The Families of LPS-Type Graphs -- 3.1 Proof of the Ramanujan-Ness of Graphs XP,Q(p,q) when P=13 -- 4 Relationship Between LPS-Type Graphs and Pizer's Graphs -- 4.1 Similarities and Differences -- 5 Open Problems -- References -- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Key Techniques -- 1.4 Organization -- 2 Preliminaries -- 2.1 Group Key Exchange -- 2.2 SIDH and CSIDH Key Exchange -- 3 New Assumptions on Supersingular Invariants -- 3.1 New Assumptions on Supersingular j-Invariants -- 3.2 New Assumptions on Supersingular Montgomery Coefficients -- 4 Proposed Post-Quantum Group Key Exchange (GKE) -- 4.1 A Generic JV-Type Compiler for GKE from Two-Party KE (ch18JusVau96) -- 4.2 Constant-Round GKE from Static Standard Assumptions -- 4.3 Two-Round Product-BD (PBD) GKE from d-DSJP Assumption -- 4.4 Two-Round PBD GKE from d-DSMP Assumption -- References -- 19 Correction to: International Symposium on Mathematics, Quantum Theory, and Cryptography.
Correction to: T. Takagi et al. (eds.), International Symposium on Mathematics, Quantum Theory, and Cryptography, Mathematics for Industry 33, https://doi.org/10.1007/978-981-15-5191-8 -- Index.
isbn 9789811551918
9789811551901
callnumber-first T - Technology
callnumber-subject TA - General and Civil Engineering
callnumber-label TA329-348
callnumber-sort TA 3329 3348
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6381426
illustrated Not Illustrated
oclc_num 1243546856
work_keys_str_mv AT takagitsuyoshi internationalsymposiumonmathematicsquantumtheoryandcryptographyproceedingsofmqc2019
AT wakayamamasato internationalsymposiumonmathematicsquantumtheoryandcryptographyproceedingsofmqc2019
AT tanakakeisuke internationalsymposiumonmathematicsquantumtheoryandcryptographyproceedingsofmqc2019
AT kunihironoboru internationalsymposiumonmathematicsquantumtheoryandcryptographyproceedingsofmqc2019
AT kimotokazufumi internationalsymposiumonmathematicsquantumtheoryandcryptographyproceedingsofmqc2019
AT ikematsuyasuhiko internationalsymposiumonmathematicsquantumtheoryandcryptographyproceedingsofmqc2019
status_str n
ids_txt_mv (MiAaPQ)5006381426
(Au-PeEL)EBL6381426
(OCoLC)1243546856
carrierType_str_mv cr
hierarchy_parent_title Mathematics for Industry Series ; v.33
is_hierarchy_title International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019.
container_title Mathematics for Industry Series ; v.33
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
marc_error Info : Unimarc and ISO-8859-1 translations identical, choosing ISO-8859-1. --- [ 856 : z ]
_version_ 1792331056953688064
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09376nam a22005053i 4500</leader><controlfield tag="001">5006381426</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073836.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2020 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811551918</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789811551901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006381426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6381426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1243546856</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TA329-348</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Takagi, Tsuyoshi.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">International Symposium on Mathematics, Quantum Theory, and Cryptography :</subfield><subfield code="b">Proceedings of MQC 2019.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore Pte. Limited,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">Ã2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (275 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Mathematics for Industry Series ;</subfield><subfield code="v">v.33</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Foreword -- Preface -- Contents -- About the Editors -- &amp;lt -- ExternalRef&amp;gt -- &amp;lt -- RefSource&amp;gt -- swati.meherishi@springer.com&amp;lt -- /RefSource&amp;gt -- &amp;lt -- RefTarget Address= -- Keynote -- Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- References -- Emerging Ultrastrong Coupling Between Light and Matter Observed in Circuit Quantum Electrodynamics -- References -- Summary -- Verified Numerical Computations and Related Applications -- A Review of Secret Key Distribution Based on Bounded Observability -- References -- Quantum Computing and Information Theory -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- 1 Introduction -- 2 Statistical Tests for Random Number Generators -- 3 NIST SP 800-22 -- 3.1 Frequency Test -- 3.2 Frequency Test Within a Block -- 3.3 Runs Test -- 3.4 The Longest Run of Ones Within a Block Test -- 3.5 Discrete Fourier Transform Test -- 3.6 Approximate Entropy Test -- 3.7 Cumulative Sums Test -- 4 Quantum Random Number Generation on the Cloud Quantum Computer -- 5 Conclusion -- References -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- 1 Introduction -- 2 Outline of Shor's Quantum Factoring Algorithm (Shor) -- 2.1 Quantum Computation -- 2.2 Shor's Quantum Factoring Algorithm -- 2.3 Circuit Construction and Resource Estimation for Shor's Quantum Factoring Algorithm -- 2.4 Survey of Quantum Experiments for Factoring -- 3 Quantum Circuits Without Using the Order Information -- 3.1 Quantum Factoring Experiment Shown in IBMspsChuang -- 3.2 Quantum Factoring Experiment Shown in joseph -- 3.3 Quantum Factoring Experiment Shown in realization -- 4 Quantum Circuits with Explicitly Using the Order information -- 4.1 Quantum Factoring Experiment of N=15 Shown in photonic.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Quantum Factoring Experiment of N=21 Shown in spsqubitrecycing -- 4.3 Oversimplified Shor's Algorithm (oversimplified) -- 5 Summary and Concluding Remarks -- References -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Our Framework for FHE -- 3.1 Group-Theoretic Realization of Functions -- 3.2 Lift of Realization of Functions -- 3.3 The Proposed Framework -- 4 Examples of Realizations of Functions in Groups -- 4.1 Deterministic Case: Known Result -- 4.2 Deterministic Case: Proposed Constructions -- 4.3 Preliminaries: On Random Sampling of Group Elements -- 4.4 Probabilistic Case: ``Commutator-Separable'' Groups -- 4.5 Probabilistic Case: Simple Groups -- 5 Towards Achieving Secure Lift of Realization -- 5.1 A Remark on the Choice of Random Variables -- 5.2 Insecurity of a Matrix-Based Naive Construction -- 5.3 Observation for Avoiding Linear Constraints -- 5.4 Another Trial Using Tietze Transformations -- References -- From the Bloch Sphere to Phase-Space Representations with the Gottesman-Kitaev-Preskill Encoding -- 1 Introduction -- 2 GKP Encoding of Qubit States -- 3 Phase-Space Wigner Representation of GKP Encoded States -- 4 Quantification of Negativity of the Wigner Function for GKP Encoded States -- 5 Conclusions -- References -- Quantum Interactions -- Number Theoretic Study in Quantum Interactions -- References -- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation -- 1 Introduction -- 2 Mathematical Setups -- 2.1 How to Conceal Data -- 2.2 How to Restore Data -- 3 Example of Functionals and Simulation -- 3.1 An Example of the Set of Functionals -- 3.2 Simulation of Concealing and Restoring Data on Physical Layer.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 Application to Data on Physical Layer and Presentation Layer -- 4.1 Binary Data of Pictorial Image -- 4.2 Analog Data of Pictorial Image -- 5 Conclusion and Future Work -- References -- Quantum Optics with Giant Atoms-the First Five Years -- 1 Introduction -- 2 Theory for Giant Atoms -- 2.1 One Giant Atom -- 2.2 One Giant Atom with Time Delay -- 2.3 Multiple Giant Atoms -- 3 Experiments with Giant Atoms -- 3.1 Superconducting Qubits and Surface Acoustic Waves -- 3.2 Superconducting Qubits and Microwave Transmission Lines -- 3.3 Cold Atoms in Optical Lattices -- 4 Conclusion and Outlook -- References -- Topics in Mathematics -- Extended Divisibility Relations for Constraint Polynomials of the Asymmetric Quantum Rabi Model -- 1 Introduction -- 2 The Confluent Picture of the Asymmetric Quantum Rabi Model -- 3 Extended Divisibility Properties for Constraint and Related Polynomials -- 4 Open Problems -- 4.1 Number of Exceptional Solutions of the AQRM -- 4.2 Classification of Parameter Regimes -- References -- Generalized Group-Subgroup Pair Graphs -- 1 Introduction -- 1.1 Conventions -- 2 Preliminaries -- 3 Cayley Graphs and Group-Subgroup Pair Graphs -- 3.1 Cayley Graphs -- 3.2 Group-Subgroup Pair Graphs -- 4 Homogeneity -- 5 Generalized Group-Subgroup Pair Graph -- 5.1 Definition -- 5.2 Examples -- 6 Spectra of G(G,H,S) -- 6.1 Adjacency Matrix of G(G,H,S) -- 6.2 When H is abelian -- 6.3 Petersen Extension -- References -- Post-Quantum Cryptography -- A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge -- 1 Introduction -- 2 Mathematical Background -- 2.1 Lattices and Their Bases -- 2.2 Successive Minima, Hermite's Constants, and Gaussian Heuristic -- 2.3 Introduction to Lattice Problems -- 3 Solving SVP Algorithms -- 3.1 Exact-SVP Algorithms -- 3.2 Approximate-SVP Algorithms.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 The SVP Challenge and Recent Strategies -- 4.1 The Random Sampling Strategy -- 4.2 The Sub-Sieving Strategy -- References -- Recent Developments in Multivariate Public Key Cryptosystems -- 1 Introduction -- 2 UOV, Rainbow, and Variants of HFE -- 2.1 Basic Constructions of Multivariate Public Key Cryptosystems -- 2.2 UOV -- 2.3 Rainbow -- 2.4 HFE -- 2.5 Variants of HFE -- 3 New Encryption Schemes -- 3.1 HFERP -- 3.2 ZHFE -- 3.3 EFC -- 3.4 ABC -- 4 Conclusion -- References -- Ramanujan Graphs for Post-Quantum Cryptography -- 1 Introduction -- 2 Ramanujan Graphs and Their Cryptographic Applications -- 2.1 Security on Cayley Hashes and Word Problems -- 2.2 Lifting Attacks -- 3 The Families of LPS-Type Graphs -- 3.1 Proof of the Ramanujan-Ness of Graphs XP,Q(p,q) when P=13 -- 4 Relationship Between LPS-Type Graphs and Pizer's Graphs -- 4.1 Similarities and Differences -- 5 Open Problems -- References -- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Key Techniques -- 1.4 Organization -- 2 Preliminaries -- 2.1 Group Key Exchange -- 2.2 SIDH and CSIDH Key Exchange -- 3 New Assumptions on Supersingular Invariants -- 3.1 New Assumptions on Supersingular j-Invariants -- 3.2 New Assumptions on Supersingular Montgomery Coefficients -- 4 Proposed Post-Quantum Group Key Exchange (GKE) -- 4.1 A Generic JV-Type Compiler for GKE from Two-Party KE (ch18JusVau96) -- 4.2 Constant-Round GKE from Static Standard Assumptions -- 4.3 Two-Round Product-BD (PBD) GKE from d-DSJP Assumption -- 4.4 Two-Round PBD GKE from d-DSMP Assumption -- References -- 19 Correction to: International Symposium on Mathematics, Quantum Theory, and Cryptography.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Correction to: T. Takagi et al. (eds.), International Symposium on Mathematics, Quantum Theory, and Cryptography, Mathematics for Industry 33, https://doi.org/10.1007/978-981-15-5191-8 -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wakayama, Masato.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tanaka, Keisuke.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kunihiro, Noboru.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kimoto, Kazufumi.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ikematsu, Yasuhiko.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Takagi, Tsuyoshi</subfield><subfield code="t">International Symposium on Mathematics, Quantum Theory, and Cryptography</subfield><subfield code="d">Singapore : Springer Singapore Pte. Limited,c2020</subfield><subfield code="z">9789811551901</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Mathematics for Industry Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6381426</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>