We apply a quantum process calculus to an equivalence proof of quantum key distribution protocols. Whether in classical or quantum cryptography, it is recognized that security proofs tend to beâ€¦ (More)

We provide a new algorithm that translates a unitary matrix into a quantum circuit according to the G = KAK theorem in Lie group theory. With our algorithm, any matrix decomposition corresponding toâ€¦ (More)

It is recognized that security verification of cryptographic protocols tends to be difficult and in fact, some flaws on protocol designs or security proofs were found after they had been presented.â€¦ (More)

We investigate a class QNC(ADD) that is QNC with gates for addition of two binary numbers, where QNC is a class consisting of quantum operations computed by constant-depth quantum circuits. We showâ€¦ (More)

We present an approach to automate Shor-Preskill style unconditional security proof of QKDs. In Shor-Preskillâ€™s proof, the target QKD, BB84, is transformed into another QKD based on an entanglementâ€¦ (More)

This paper improves the main result in our paper "Quantum Fourier Transform over Symmetric Groups, Proceedings of the International Symposium on Symbolic and Algebraic Computation (ISSAC), pp.â€¦ (More)