{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363388843976433792.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/tit.2006.871040"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx5/18/33885/01614083.pdf?arnumber=1614083"}},{"identifier":{"@type":"NAID","@value":"30019660901"}}],"dc:title":[{"@value":"General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1582543026046559360","@type":"Researcher","foaf:name":[{"@value":"M. Hayashi"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"00189448"}],"prism:publicationName":[{"@value":"IEEE Transactions on Information Theory"}],"dc:publisher":[{"@value":"Institute of Electrical and Electronics Engineers (IEEE)"}],"prism:publicationDate":"2006-04","prism:volume":"52","prism:number":"4","prism:startingPage":"1562","prism:endingPage":"1575"},"reviewed":"false","dc:rights":["https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html"],"url":[{"@id":"http://xplorestaging.ieee.org/ielx5/18/33885/01614083.pdf?arnumber=1614083"}],"createdAt":"2006-04-07","modifiedAt":"2025-03-22","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360004235302138496","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Broadcast channels with confidential messages by randomness constrained stochastic encoder"}]},{"@id":"https://cir.nii.ac.jp/crid/1360004235409640576","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Converse Coding Theorems for Identification via Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1360009142531201536","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Source Resolvability and Intrinsic Randomness: Two Random Number Generation Problems With Respect to a Subclass of <i>f</i>-Divergences"}]},{"@id":"https://cir.nii.ac.jp/crid/1360285710386418816","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Large Deviation Analysis for Quantum Security via Smoothing of Rényi Entropy of Order 2"}]},{"@id":"https://cir.nii.ac.jp/crid/1360285710386428160","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Cognitive Interference Channels With Confidential Messages Under Randomness Constraint"}]},{"@id":"https://cir.nii.ac.jp/crid/1360565168048497152","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Dual Universality of Hash Functions and Its Applications to Quantum Cryptography"}]},{"@id":"https://cir.nii.ac.jp/crid/1360567185270171904","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Error-Control Coding for Physical-Layer Secrecy"}]},{"@id":"https://cir.nii.ac.jp/crid/1360567185360460160","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Wiretap Channels With One-Time State Information: Strong Secrecy"}]},{"@id":"https://cir.nii.ac.jp/crid/1360567185360488704","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Physical Layer Security for RF Satellite Channels in the Finite-Length Regime"}]},{"@id":"https://cir.nii.ac.jp/crid/1360567185363169408","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Quantum Wiretap Channel With Non-Uniform Random Number and Its Exponent and Equivocation Rate of Leaked Information"}]},{"@id":"https://cir.nii.ac.jp/crid/1360567185363220864","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Equivocations, Exponents, and Second-Order Coding Rates Under Various Rényi Information Measures"}]},{"@id":"https://cir.nii.ac.jp/crid/1360568470359559552","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Communication for Generating Correlation: A Unifying Survey"}]},{"@id":"https://cir.nii.ac.jp/crid/1360568470359563008","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1360576118783233792","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Minimax Converse for Identification via Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1360846643025221248","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications"}]},{"@id":"https://cir.nii.ac.jp/crid/1360846643025288960","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Secure Multiplex Coding With Dependent and Non-Uniform Multiple Messages"}]},{"@id":"https://cir.nii.ac.jp/crid/1360848660339810688","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Secure Multiplex Coding Attaining Channel Capacity in Wiretap Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1360848660339857152","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"The Optimal Use of Rate-Limited Randomness in Broadcast Channels With Confidential Messages"}]},{"@id":"https://cir.nii.ac.jp/crid/1360865816795268096","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Variable-Length Resolvability for General Sources and Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1361131420297787520","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Two-Way Physical Layer Security Protocol for Gaussian Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1361412895289678720","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Wiretap Channels With Causal State Information: Strong Secrecy"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001205342878592","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"林正人教授の日本学術振興会賞・日本学士院学術奨励賞受賞を祝して"},{"@language":"en","@value":"Celebrating Receipt of JSPS Prize and Japan Academy Medal by Prof. Masahito Hayashi"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282679122832000","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Finite-block-length analysis in classical and quantum information theory"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282680320378112","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"情報理論における量子情報理論の役割"},{"@language":"en","@value":"Role of Quantum Information Theory in Information Theory"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282681288794368","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Error and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints"}]},{"@id":"https://cir.nii.ac.jp/crid/1390293633437538304","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Information Security Coding Based on Information Theory: Secure Coding with Non-Perfect Secrecy"},{"@language":"ja","@value":"情報理論に基づく秘密情報の符号化"}]},{"@id":"https://cir.nii.ac.jp/crid/1391694356248440832","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009407458532864","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"Secure multiplex coding with a common message"},{"@language":"ja-Kana","@value":"Secure multiplex coding with a common message"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009407768646656","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"Construction of wiretap codes from ordinary channel codes"},{"@language":"ja-Kana","@value":"Construction of wiretap codes from ordinary channel codes"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009409183609472","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"情報スペクトルによる二次オーダーの情報理論"},{"@language":"ja-Kana","@value":"ジョウホウ スペクトル ニ ヨル ニジ オーダー ノ ジョウホウ リロン"}]},{"@id":"https://cir.nii.ac.jp/crid/1520290882684724864","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"離散無記憶通信路を用いた多重ビットコミットメントに対する符号化定理"},{"@language":"ja-Kana","@value":"リサン ムキオク ツウシンロ オ モチイタ タジュウ ビットコミットメント ニ タイスル フゴウカ テイリ"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/tit.2006.871040"},{"@type":"CIA","@value":"30019660901"},{"@type":"CROSSREF","@value":"10.1587/essfr.10.1_4_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2019.2946364_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tcomm.2020.2973618_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2012.2219158_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2014.2382096_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tifs.2018.2868538_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/isit.2012.6284266_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/jproc.2015.2463678_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2014.2337884_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1587/transfun.2020eap1017_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1587/transfun.e99.a.2136_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2014.2360683_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2019.2950678_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1587/essfr.16.2_66_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2019.2925611_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2016.2636154_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2013.2278971_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2013.2282673_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2015.2464215_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2021.3120033_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tifs.2017.2746008_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1587/essfr.10.2_100_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2013.2250576_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2016.2530088_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.1109/tit.2020.3009208_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.3390/e25101466_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"},{"@type":"CROSSREF","@value":"10.2183/pjab.93.007_references_DOI_EeTqG661HksAXqSiay1qdZQtgmH"}]}