{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:48:27Z","timestamp":1742996907635,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319720883"},{"type":"electronic","value":"9783319720890"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72089-0_10","type":"book-chapter","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T11:54:16Z","timestamp":1511351656000},"page":"166-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication"],"prefix":"10.1007","author":[{"given":"Go","family":"Kato","sequence":"first","affiliation":[]},{"given":"Masaki","family":"Owari","sequence":"additional","affiliation":[]},{"given":"Masahito","family":"Hayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,23]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Buhrman, H.R., Cleve, R., Wigderson, A.: Quantum vs. classical communication and computation. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pp. 63\u201368. ACM, New York (1999)","DOI":"10.1145\/276698.276713"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Raz, R.: Exponential separation of quantum and classical communication complexity. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, STOC 1999, pp. 358\u2013367. ACM, New York (1999)","DOI":"10.1145\/301250.301343"},{"key":"10_CR3","unstructured":"Cai, N., Yeung, R.: Secure network coding. In: Proceedings of 2002 IEEE International Symposium on Information Theory (ISIT), p. 323 (2002)"},{"issue":"1","key":"10_CR4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4310\/CIS.2006.v6.n1.a3","volume":"6","author":"N Cai","year":"2006","unstructured":"Cai, N., Yeung, R.W.: Network error correction, Part 2: lower bounds. Commun. Inf. and Syst. 6(1), 37\u201354 (2006)","journal-title":"Commun. Inf. and Syst."},{"key":"10_CR5","unstructured":"Bhattad, K., Member, S., Narayanan, K.R.: Weakly secure network coding. In: First Workshop on Network Coding, Theory, and Applications, Riva del Garda (2005)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Liu, R.L.R., Liang, Y.L.Y., Poor, H., Spasojevic, P.: Secure nested codes for type II wiretap channels. In: 2007 IEEE Information Theory Workshop, pp. 337\u2013342 (2007)","DOI":"10.1109\/ITW.2007.4313097"},{"key":"10_CR7","unstructured":"Rouayheb, S.Y.E., Soljanin, E.: On wiretap networks II. In: Proceedings of 2007 IEEE International Symposium on Information Theory (ISIT), pp. 551\u2013555 (2007)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Harada, K., Yamamoto, H.: Strongly secure linear network coding. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E91-A(10), 2720\u20132728 (2008)","DOI":"10.1093\/ietfec\/e91-a.10.2720"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.1109\/TIT.2008.921894","volume":"54","author":"THT Ho","year":"2008","unstructured":"Ho, T.H.T., Leong, B.L.B., Koetter, R., Medard, M., Effros, M., Karger, D.: Byzantine modification detection in multicast networks with random network coding. IEEE Trans. Inf. Theory 54(6), 2798\u20132803 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"10_CR10","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1109\/TIT.2008.921711","volume":"54","author":"S Jaggi","year":"2008","unstructured":"Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Medard, M., Effros, M.: Resilient network coding in the presence of byzantine adversaries. IEEE Trans. Inf. Theory 54(6), 2596\u20132603 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Nutman, L., Langberg, M.: Adversarial models and resilient schemes for network coding. In: Proceedings of 2008 IEEE International Symposium on Information Theory (ISIT), pp. 171\u2013175 (2008)","DOI":"10.1109\/ISIT.2008.4594970"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Yu, Z.Y.Z., Wei, Y.W.Y., Ramkumar, B., Guan, Y.G.Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications (2008)","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/JPROC.2010.2094592","volume":"99","author":"N Cai","year":"2011","unstructured":"Cai, N., Chan, T.: Theory of secure network coding. Proc. IEEE 99, 421\u2013437 (2011)","journal-title":"Proc. IEEE"},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TIT.2010.2090197","volume":"57","author":"N Cai","year":"2011","unstructured":"Cai, N., Yeung, R.W.: Secure network coding on a wiretap network. IEEE Trans. Inf. Theory 57(1), 424\u2013435 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Matsumoto, R., Hayashi, M.: Secure multiplex network coding. In: 2011 International Symposium on Networking Coding (2011). https:\/\/doi.org\/10.1109\/ISNETCOD.2011.5979076","DOI":"10.1109\/ISNETCOD.2011.5979076"},{"key":"10_CR16","unstructured":"Matsumoto, R., Hayashi, M.: Universal secure multiplex network coding with dependent and non-uniform messages. IEEE Trans. Inform. Theory; Arxiv preprint arXiv: 1111.4174 (2011) (Accepted)"},{"key":"10_CR17","unstructured":"Agarwal, G.K., Cardone, M., Fragouli, C.: On (secure) information flow for multiple-unicast sessions: analysis with butterfly network. arXiv: 1606.07561 (2016)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/978-3-540-70918-3_52","volume-title":"STACS 2007","author":"M Hayashi","year":"2007","unstructured":"Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum network coding. In: Thomas, W., Weil, P. (eds.) STACS 2007. LNCS, vol. 4393, pp. 610\u2013621. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70918-3_52"},{"issue":"4","key":"10_CR19","doi-asserted-by":"publisher","first-page":"40301","DOI":"10.1103\/PhysRevA.76.040301","volume":"76","author":"M Hayashi","year":"2007","unstructured":"Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76(4), 40301 (2007)","journal-title":"Phys. Rev. A"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-642-02927-1_52","volume-title":"Automata, Languages and Programming","author":"H Kobayashi","year":"2009","unstructured":"Kobayashi, H., Le Gall, F., Nishimura, H., R\u00f6tteler, M.: General scheme for perfect quantum network coding with free classical communication. In: Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.) ICALP 2009. LNCS, vol. 5555, pp. 622\u2013633. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02927-1_52"},{"issue":"7","key":"10_CR21","doi-asserted-by":"publisher","first-page":"3478","DOI":"10.1109\/TIT.2010.2048442","volume":"56","author":"D Leung","year":"2010","unstructured":"Leung, D., Oppenheim, J., Winter, A.: Quantum network communication; the butterfly and beyond. IEEE Trans. Inf. Theory 56(7), 3478\u20133490 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: Perfect quantum network communication protocol based on classical network coding. In: Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT), pp. 2686\u20132690 (2010)","DOI":"10.1109\/ISIT.2010.5513644"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: Constructing quantum network coding schemes from classical nonlinear protocols. In: Proceedings of 2011 IEEE International Symposium on Information Theory (ISIT), pp. 109\u2013113 (2011)","DOI":"10.1109\/ISIT.2011.6033701"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"060401","DOI":"10.1103\/PhysRevLett.101.060401","volume":"101","author":"G Chiribella","year":"2008","unstructured":"Chiribella, G., D\u2019Ariano, G.M., Perinotti, P.: Quantum circuit architecture. Phys. Rev. Lett. 101, 060401 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"022339","DOI":"10.1103\/PhysRevA.80.022339","volume":"80","author":"G Chiribella","year":"2009","unstructured":"Chiribella, G., D\u2019Ariano, G.M., Perinotti, P.: Theoretical framework for quantum networks. Phys. Rev. A 80, 022339 (2009)","journal-title":"Phys. Rev. A"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1038\/46503","volume":"402","author":"D Gottesman","year":"1999","unstructured":"Gottesman, D., Chuang, I.L.: Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature 402, 390\u2013393 (1999)","journal-title":"Nature"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70, 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"10_CR28","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1109\/TIT.2016.2539280","volume":"62","author":"F Cheng","year":"2016","unstructured":"Cheng, F., Tan, V.Y.F.: A numerical study on the wiretap network with a simple network topology. IEEE Trans. Inf. Theory 62(5), 2481\u20132492 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"10_CR29","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2130","key":"10_CR30","doi-asserted-by":"publisher","first-page":"1604","DOI":"10.1098\/rspa.2010.0445","volume":"467","author":"JM Renes","year":"2011","unstructured":"Renes, J.M.: Duality of privacy amplification against quantum adversaries and data compression with quantum side information. Proc. Roy. Soc. A 467(2130), 1604\u20131623 (2011)","journal-title":"Proc. Roy. Soc. A"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Hayashi, M.: Quantum Information Theory: Mathematical Foundation, Graduate Texts in Physics. Springer, Heidelberg (2017). Second Edition of Quantum Information, An Introduction. Springer (2017)","DOI":"10.1007\/978-3-662-49725-8"},{"key":"10_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44906-7","volume-title":"Group Representation for Quantum Theory","author":"M Hayashi","year":"2017","unstructured":"Hayashi, M.: Group Representation for Quantum Theory. Springer, Cham (2017)"},{"key":"10_CR33","unstructured":"Hayashi, M., Owari, M., Kato, G., Cai, N.: arXiv: 1703.00723 (2017). 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25\u201330 June (2017, Accepted)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Owari, M., Kato, G., Hayashi, M.: Single-shot secure quantum network coding on butterfly network with free public communication. Quantum Sci. Technol. Retrieved from arXiv:1705.01474 (2017, in Press)","DOI":"10.1088\/2058-9565\/aa8ac4"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72089-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:50:10Z","timestamp":1709826610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-72089-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319720883","9783319720890"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72089-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"23 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Theoretic Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icits2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icatse.org\/icitcs2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}