Jun Muramatsu
Nippon Telegraph and Telephone
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jun Muramatsu.
international symposium on information theory | 2003
Jun Muramatsu; Tomohiko Uyematsu; Tadashi Wadayama
Linear codes for a coding problem of correlated sources are considered. It is proved that we can construct codes by using low-density parity-check (LDPC) matrices with maximum-likelihood (or typical set) decoding. As applications of the above coding problem, a construction of codes is presented for multiple-access channel with correlated additive noises and a coding theorem of parity-check codes for general channels is proved.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2006
Jun Muramatsu
This paper deals with a secret key agreement problem from correlated random numbers. It is proved that there is a pair of linear matrices that yields a secret key agreement in the situation wherein a sender, a legitimate receiver, and an eavesdropper have access to correlated random numbers. A relation between the coding problem of correlated sources and a secret key agreement problem from correlated random numbers are also discussed.
Optics Express | 2007
Toru Yamamoto; Hoipang Yip; Atsushi Uchida; Shigeru Yoshimori; Kazuyuki Yoshimura; Jun Muramatsu; Shin-itiro Goto; Peter Davis
We experimentally and numerically observe synchronization of two semiconductor lasers commonly driven by a chaotic semiconductor laser subject to optical feedback. Under condition that the relaxation oscillation frequency is matched between the two response lasers, but mismatched between the drive and the two response lasers, we show that it is possible to observe strongly correlated synchronization between the two response lasers even when the correlation between the drive and response lasers is low. We also show that the cross correlation between the two responses is larger than that between drive and responses over a wide parameter region.
Optics Express | 2013
Hayato Koizumi; Shinichiro Morikatsu; Hiroki Aida; Takahiro Nozawa; Izumi Kakesu; Atsushi Uchida; Kazuyuki Yoshimura; Jun Muramatsu; Peter Davis
It has been proposed that a secure key distribution scheme using correlated random bit sequences can be implemented using common random-signal induced synchronization of semiconductor laser systems. In this scheme it is necessary to use laser systems consisting of multiple cascaded lasers to be secure against a powerful eavesdropper. In this paper, we report the results of an experimental study that demonstrate that the common random-signal induced synchronization is possible in cascaded semiconductor laser systems. We also show that the correlated random bit sequences generated in the synchronized cascaded laser systems can be used to create an information-theoretically secure key between two legitimate users.
IEEE Transactions on Information Theory | 2014
Jun Muramatsu
Stochastic encoders for channel coding and lossy source coding are introduced with a rate close to the fundamental limits, where the only restriction is that the channel input alphabet and the reproduction alphabet of the lossy source code are finite. Random numbers, which satisfy a condition specified by a function and its value, are used to construct stochastic encoders. The proof of the theorems is based on the hash property of an ensemble of functions, where the results are extended to general channels/sources and alternative formulas are introduced for channel capacity and the rate-distortion region. Since an ensemble of sparse matrices has a hash property, we can construct a code by using sparse matrices.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2008
Shigeki Miyake; Jun Muramatsu
Research into applying LDPC code theory, which is used for channel coding, to source coding has received a lot of attention in several research fields such as Distributed Source Coding. In this paper a source coding problem with a fidelity criterion is considered. Matsunaga et al. [6] constructed a lossy code under the conditions of a binary alphabet, a uniform distribution, and a Hamming measure of fidelity criterion. We extend their results and construct a lossy code under the extended conditions of a binary alphabet, a distribution that is not necessarily uniform, and a fidelity measure that is bounded and additive and show that the code can achieve the optimal rate, rate-distortion function.
international symposium on information theory | 2011
Jun Muramatsu; Shigeki Miyake
A strongly secure wiretap channel code is proposed. The construction is based on the strong hash property introduced in Proc. ISIT2010, pp. 575–579. Since an ensemble of sparse matrices satisfies the conditions for the strong hash property, the rate of the proposed code using sparse matrices can achieve the secrecy capacity.
international conference on information theoretic security | 2009
Jun Muramatsu; Kazuyuki Yoshimura; Peter G Davis
Under the condition that all users can observe a common object, each using an observation function independently chosen from the same limited set of observation functions, we show necessary and sufficient conditions for users to be able to generate secret keys by public discussion.
IEEE Transactions on Information Theory | 2012
Jun Muramatsu; Shigeki Miyake
The aim of this paper is to prove coding theorems for the wiretap channel and the secret key agreement based on the the notion of a hash property for an ensemble of functions. These theorems imply that codes using sparse matrices can achieve the optimal rate. Furthermore, fixed-rate universal coding theorems for a wiretap channel and a secret key agreement are also proved.
IEEE Transactions on Information Theory | 2010
Jun Muramatsu; Shigeki Miyake
The aim of this paper is to prove the fixed-rate universal coding theorems by using the notion of the hash property. These theorems are the fixed-rate lossless universal source coding theorem and the fixed-rate universal channel coding theorem. Since an ensemble of sparse matrices (with logarithmic column degree) satisfies the hash property requirement, it is proved that we can construct universal codes by using sparse matrices.