Information Theoretic Security

List of Papers

  1. W.Nakamura, H.Yamamoto, and T.Chen "A Cheating-Detectable (k, L, n) Ramp Secret Sharing Scheme," IEICE Trans. on Fundamentals, vol.E100-A, no.12, pp.2709-2719, Dec. 2017
  2. D.Kobayashi, H.Yamamoto, T.Ogawa, "Secure multiplex coding attaining channel capacity in wiretap channels," IEEE Trans. on Inform. Theory, vol.59, no.12, pp.8131-8143, Dec. 2013
  3. M. Iwamoto, H.Koga, H.Yamamoto, "Coding theorems for a (2,2)-threshold scheme with detectability of impersonation attacks," IEEE Trans. on Inform. Theory, vol.58, No.9, pp.6194-6206, Sept. 2012
  4. Y.Hayashi and H.Yamamoto, " Coding Theorems for the Shannon Cipher System With a Guessing Wiretapper and Correlated Source Outputs", IEEE Trans. on Inform. Theory, vol. 54, no. 6, pp. 2808-2817, June. 2008
  5. T.Ogawa, A.Sasaki, M.Iwamoto, H.Yamamoto, "Quantum Secret Sharing Schemes and Reversibility of Quantum Operations", Physical Review A, vol.72, no.3, pp.032318-1-7, Sept. 2005
  6. H.Koga and H.Yamamoto, "Coding theorems for secret-key authentication systems", IEICE Trans. on Fundamentals, vol.E83-A, no.8, pp.1691-1703, Aug. 2000
  7. H.Yamamoto, "Rate-distortion theory for the Shannon cipher system", IEEE Trans. on Inform. Theory, vol.43, no.3, pp.827-835, May 1997
  8. H.Yamamoto, "Coding theorems for Shannon's cipher system with correlated source outputs, and common information", IEEE Trans. on Infom. Theory, vol.40, no.1,pp.85-95, Jan. 1994
  9. H.Yamamoto, "Information theory in cryptology", IEICE Trans. on Fundamentals, vol.E74-A, no.9, pp.2456-2464, Sep. 1991 (invited paper)
  10. H.Yamamoto, "Coding theorem for secret sharing communication systems with two Gaussian wiretap channels", IEEE Trans. on Inform. Theory, vol.37, no.3, pp.634-638, Sep. 1991
  11. H.Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels", IEEE Trans. on Inform. Theory, vol.35, no.3, pp.572-578, May 1989
  12. H.Yamamoto, "A rate-distortion problem for a communication system with a secondary decoder to be hindered", IEEE Trans. on Inform. Theory, vol.34, no.4, pp.835-842, July 1988
  13. H.Yamamoto, "On secret sharing communication systems with two or three channels", IEEE Trans. on Inform. Theory, vol.IT-32, no.3, pp.387-393, May 1986
  14. H.Yamamoto, " "Secret sharing system using (k,L,n) threshold scheme (in Japanese)", Trans. of the IECE of Japan, vol.J68-A, no.9, pp.945-952, Sep. 1985, [English translation : Electronics and Communications in Japan, Part I, vol.69, no.9, pp.46-54, (Scripta Technica, Inc.), Sep. 1986]
  15. H.Yamamoto, "A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers", IEEE Trans. on Inform. Theory, vol.IT-29, no.6, pp.918-923, Nov. 1983