IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97-A(7) 1556-1567 2014年 [査読有り]
In this paper, we propose a new encoding method applicable to any linear codes over arbitrary finite field whose computational complexity is O(δ*n) where δ* and n denote the maximum column weight of a parity check matrix of a code and the code len...
2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA) 167-171 2014年 [査読有り]
The amplitude damping (AD) quantum channel is one of the models describing evolution of quantum states. Several constructions of quantum error correcting codes for the AD channel based on classical codes has been presented, and Shor et al. propose...
2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA) 158-162 2014年 [査読有り]
Entanglement-assisted quantum error-correcting (EAQEC) codes, a wider class of stabilizer codes, allow us to construct quantum error-correcting codes from arbitrary classical codes with the help of ebits, i.e. maximally entangled quantum states. H...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96-A(12) 2447-2451 2013年 [査読有り]
Spatially coupled (SC) low-density parity-check (LDPC) codes are defined by bipartite graphs that are obtained by assembling prototype graphs. The combination and connection of prototype graphs are designated by specifying some parameters, and Kud...
2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012) 16-20 2012年
In this paper, we propose a new encoding algorithm applicable to any linear codes over arbitrary finite field whose computational complexity is O(w(H)) where w(H) denotes the number of non-zero elements in a parity check matrix H of a code. The pr...
Spatially coupled (SC) low-density parity-check (LDPC) codes are denned by bipartite graphs that are obtained by assembling prototype graphs. The combination and connection of prototype graphs are designated by specifying some parameters, and Kude...
2018 The International Symposium on Information Theory and Its Applications 2018年10月28日 Engineering Sciences Society, IEICE
conventional secret sharing, password protected secret sharing (PPSS) was invented. Recently, Nakahara et al. improved Ogata's multiple-use PPSS (mPPSS), which protects multiple data by one password, by employing secure computation known as CSEC70...
Japan-Singapore Workshop on Coding and Information Theory 2018年3月4日 School of Physical & Mathematical Sciences, Nanyang Technological University
In this talk, a group theoretic representation suitable for the
rank-modulation (RM) scheme over the multi-cell ranking developed by
En Gad et al. is presented. By introducing an action of the group of
all permutation matrices on the set of all pe...