Kentaro Kato

Learn More
The University of Minnesota is committed to the policy that all persons shall have equal access to its programs, Executive Summary The National Center on Educational Outcomes (NCEO) has been tracking and analyzing state policies on assessment participation and accommodations since 1992. The purpose of the current analysis is to update information on these(More)
Previously the present protocol was referred as Yuen-Kim second version in our papers. In this paper, it is called Yuen protocol (Y-00) and we present an efficient implementation method of physical layer of Y-00 which can support a secure communication and a quantum key distribution (more generally key expansion) by IMDD(intensity modulation/direct(More)
  • Kentaro Kato
  • 2012
The necessary and sufficient conditions for the minimax strategy of a finite number of decisions in quantum signal detection are derived in the case that the average Bayes cost is used as a quality function. This is a simple extension of the result of Hirota and Ikehara [1]. Applying the necessary and sufficient conditions, a closed-form expression of the(More)
In 2000, an attractive new quantum cryptography was discovered by H.P.Yuen based on quantum communication theory. It is applicable to direct encryption, for example quantum stream cipher based on Yuen protocol(Y-00), with high speeds and for long distance by sophisticated optical devices which can work under the average photon number per signal light(More)