12,187 research outputs found
Universally Composable Quantum Multi-Party Computation
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for
secure composition of arbitrary protocols. We present a quantum version of the
UC model which enjoys the same compositionality guarantees. We prove that in
this model statistically secure oblivious transfer protocols can be constructed
from commitments. Furthermore, we show that every statistically classically UC
secure protocol is also statistically quantum UC secure. Such implications are
not known for other quantum security definitions. As a corollary, we get that
quantum UC secure protocols for general multi-party computation can be
constructed from commitments
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a
number of applications, in particular, as an essential building block for
two-party and multi-party computation. We construct a round-optimal (2 rounds)
universally composable (UC) protocol for oblivious transfer secure against
active adaptive adversaries from any OW-CPA secure public-key encryption scheme
with certain properties in the random oracle model (ROM). In terms of
computation, our protocol only requires the generation of a public/secret-key
pair, two encryption operations and one decryption operation, apart from a few
calls to the random oracle. In~terms of communication, our protocol only
requires the transfer of one public-key, two ciphertexts, and three binary
strings of roughly the same size as the message. Next, we show how to
instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE,
and CDH assumptions. Our instantiations based on the low noise LPN, McEliece,
and QC-MDPC assumptions are the first UC-secure OT protocols based on coding
assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3)
low communication and computational complexities. Previous results in this
setting only achieved static security and used costly cut-and-choose
techniques.Our instantiation based on CDH achieves adaptive security at the
small cost of communicating only two more group elements as compared to the
gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which
only achieves static security in the ROM
Recommended from our members
Leveraging Epidemiology to Improve Risk Assessment.
The field of environmental public health is at an important crossroad. Our current biomonitoring efforts document widespread exposure to a host of chemicals for which toxicity information is lacking. At the same time, advances in the fields of genomics, proteomics, metabolomics, genetics and epigenetics are yielding volumes of data at a rapid pace. Our ability to detect chemicals in biological and environmental media has far outpaced our ability to interpret their health relevance, and as a result, the environmental risk paradigm, in its current state, is antiquated and ill-equipped to make the best use of these new data. In light of new scientific developments and the pressing need to characterize the public health burdens of chemicals, it is imperative to reinvigorate the use of environmental epidemiology in chemical risk assessment. Two case studies of chemical assessments from the Environmental Protection Agency Integrated Risk Information System database are presented to illustrate opportunities where epidemiologic data could have been used in place of experimental animal data in dose-response assessment, or where different approaches, techniques, or studies could have been employed to better utilize existing epidemiologic evidence. Based on the case studies and what can be learned from recent scientific advances and improved approaches to utilizing human data for dose-response estimation, recommendations are provided for the disciplines of epidemiology and risk assessment for enhancing the role of epidemiologic data in hazard identification and dose-response assessment
Description of the proton and neutron radiative capture reactions in the Gamow shell model
We formulate the Gamow shell model (GSM) in coupled-channel (CC)
representation for the description of proton/neutron radiative capture
reactions and present the first application of this new formalism for the
calculation of cross-sections in mirror reactions 7Be(p,gamma)8B and
7Li(n,gamma)8Li. The GSM-CC formalism is applied to a translationally-invariant
Hamiltonian with an effective finite-range two-body interaction. Reactions
channels are built by GSM wave functions for the ground state 3/2- and the
first excited state 1/2- of 7Be/7Li and the proton/neutron wave function
expanded in different partial waves
Towards a shared ontology: a generic classification of cognitive processes in conceptual design
Towards addressing ontological issues in design cognition research, this paper presents the first generic classification of cognitive processes investigated in protocol studies on conceptual design cognition. The classification is based on a systematic review of 47 studies published over the past 30 years. Three viewpoints on the nature of design cognition are outlined (search, exploration and design activities), highlighting considerable differences in the concepts and terminology applied to describe cognition. To provide a more unified view of the cognitive processes fundamentally under study, we map specific descriptions of cognitive processes provided in protocol studies to more generic, established definitions in the cognitive psychology literature. This reveals a set of 6 categories of cognitive process that appear to be commonly studied and are therefore likely to be prevalent in conceptual design: (1) long-term memory; (2) semantic processing; (3) visual perception; (4) mental imagery processing; (5) creative output production and (6) executive functions. The categories and their constituent processes are formalised in the generic classification. The classification provides the basis for a generic, shared ontology of cognitive processes in design that is conceptually and terminologically consistent with the ontology of cognitive psychology and neuroscience. In addition, the work highlights 6 key avenues for future empirical research: (1) the role of episodic and semantic memory; (2) consistent definitions of semantic processes; (3) the role of sketching from alternative theoretical perspectives on perception and mental imagery; (4) the role of working memory; (5) the meaning and nature of synthesis and (6) unidentified cognitive processes implicated in conceptual design elsewhere in the literature
- …