Learn More
By extending the notion of minimum rank distance, this paper introduces two new relative code parameters of a linear code C<sub>1</sub> of length n over a field extension F<sub>q</sub><sup>m</sup> and its subcode C<sub>2</sub> &#x2286; C<sub>1</sub>. One is called the relative dimension/intersection profile (RDIP), and the other is called the relative(More)
We generalize the random coding argument of stabilizer codes and derive a lower bound on the quantum capacity of an arbitrary discrete memoryless quantum channel. For the depolarizing channel, our lower bound coincides with that obtained by Bennett et al. We also slightly improve the quantum Gilbert–Varshamov bound for general stabilizer codes, and(More)
The secure multiplex coding (SMC) is a technique to remove rate loss in the coding for wiretap channels and broadcast channels with confidential messages caused by the inclusion of random bits into transmitted signals. SMC replaces the random bits by other meaningful secret messages, and a collection of secret messages serves as the random bits to hide the(More)
We show universally attainable exponents for the decoding error and the mutual information and universally attainable equivocation rates for the conditional entropy for the broadcast channels with confidential messages. The error exponents are the same as ones given by K&#x00F6;rner and Sgarro for the broadcast channels with degraded message sets.
The stabilizer code is the most general algebraic construction of quantum error-correcting codes proposed so far. A stabilizer code can be constructed from a self-orthogonal subspace of a symplectic space over a finite field. We propose a construction method of such a self-orthogonal space using an algebraic curve. By using the proposed method we construct(More)
SUMMARY This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using the relative dimension/length profile (RDLP) and the relative generalized Hamming weight (RGHW). We first describe the equivocation Δ m of the secret vector s = [s 1 ,...,s l ] given m shares in terms of the RDLP of linear codes. We also characterize(More)
We propose a method for computing the radical of an arbitrary ideal in the polynomial ring in n variables over a perfect field of characteristic p > 0. In our method Buchberger's algorithm is performed once in n variables and a Gröbner basis conversion algorithm is performed at most n log p d times in 2n variables, where d is the maximum of total degrees of(More)
SUMMARY We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Al-ice and Bob generate a common secret key from their(More)