27,133 research outputs found
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
Electronic information is increasingly often shared among entities without
complete mutual trust. To address related security and privacy issues, a few
cryptographic techniques have emerged that support privacy-preserving
information sharing and retrieval. One interesting open problem in this context
involves two parties that need to assess the similarity of their datasets, but
are reluctant to disclose their actual content. This paper presents an
efficient and provably-secure construction supporting the privacy-preserving
evaluation of sample set similarity, where similarity is measured as the
Jaccard index. We present two protocols: the first securely computes the
(Jaccard) similarity of two sets, and the second approximates it, using MinHash
techniques, with lower complexities. We show that our novel protocols are
attractive in many compelling applications, including document/multimedia
similarity, biometric authentication, and genetic tests. In the process, we
demonstrate that our constructions are appreciably more efficient than prior
work.Comment: A preliminary version of this paper was published in the Proceedings
of the 7th ESORICS International Workshop on Digital Privacy Management (DPM
2012). This is the full version, appearing in the Journal of Computer
Securit
Self-referenced continuous-variable quantum key distribution protocol
We introduce a new continuous-variable quantum key distribution (CV-QKD)
protocol, self-referenced CV-QKD, that eliminates the need for transmission of
a high-power local oscillator between the communicating parties. In this
protocol, each signal pulse is accompanied by a reference pulse (or a pair of
twin reference pulses), used to align Alice's and Bob's measurement bases. The
method of phase estimation and compensation based on the reference pulse
measurement can be viewed as a quantum analog of intradyne detection used in
classical coherent communication, which extracts the phase information from the
modulated signal. We present a proof-of-principle, fiber-based experimental
demonstration of the protocol and quantify the expected secret key rates by
expressing them in terms of experimental parameters. Our analysis of the secret
key rate fully takes into account the inherent uncertainty associated with the
quantum nature of the reference pulse(s) and quantifies the limit at which the
theoretical key rate approaches that of the respective conventional protocol
that requires local oscillator transmission. The self-referenced protocol
greatly simplifies the hardware required for CV-QKD, especially for potential
integrated photonics implementations of transmitters and receivers, with
minimum sacrifice of performance. As such, it provides a pathway towards
scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD
networks.Comment: 14 pages, 10 figures. Published versio
A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them. The drawback is that secure storage of secret keys is required. In this work, a low-cost solution is presented to obfuscate secret keys with Physically Unclonable Functions (PUFs), which exploit the hardware identity of the node. In addition, a lightweight fingerprint recognition solution is proposed, which can be implemented in low-cost sensor nodes. Since biometric data of individuals are sensitive, they are also obfuscated with PUFs. Both solutions allow authenticating the origin of the sensed data with a proposed dual-factor authentication protocol. One factor is the unique physical identity of the trusted sensor node that measures them. The other factor is the physical presence of the legitimate individual in charge of authorizing their transmission. Experimental results are included to prove how the proposed PUF-based solution can be implemented with the SRAMs of commercial Bluetooth Low Energy (BLE) chips which belong to the communication module of the sensor node. Implementation results show how the proposed fingerprint recognition based on the novel texture-based feature named QFingerMap16 (QFM) can be implemented fully inside a low-cost sensor node. Robustness, security and privacy issues at the proposed sensor nodes are discussed and analyzed with experimental results from PUFs and fingerprints taken from public and standard databases.Ministerio de Economía, Industria y Competitividad TEC2014-57971-R, TEC2017-83557-
On the performance of two protocols: SARG04 and BB84
We compare the performance of BB84 and SARG04, the later of which was
proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004).
Specifically, in this paper, we investigate SARG04 with two-way classical
communications and SARG04 with decoy states. In the first part of the paper, we
show that SARG04 with two-way communications can tolerate a higher bit error
rate (19.4% for a one-photon source and 6.56% for a two-photon source) than
SARG04 with one-way communications (10.95% for a one-photon source and 2.71%
for a two-photon source). Also, the upper bounds on the bit error rate for
SARG04 with two-way communications are computed in a closed form by considering
an individual attack based on a general measurement. In the second part of the
paper, we propose employing the idea of decoy states in SARG04 to obtain
unconditional security even when realistic devices are used. We compare the
performance of SARG04 with decoy states and BB84 with decoy states. We find
that the optimal mean-photon number for SARG04 is higher than that of BB84 when
the bit error rate is small. Also, we observe that SARG04 does not achieve a
longer secure distance and a higher key generation rate than BB84, assuming a
typical experimental parameter set.Comment: 48 pages, 10 figures, 1 column, changed Figs. 7 and
Quantum Anonymous Transmissions
We consider the problem of hiding sender and receiver of classical and
quantum bits (qubits), even if all physical transmissions can be monitored. We
present a quantum protocol for sending and receiving classical bits
anonymously, which is completely traceless: it successfully prevents later
reconstruction of the sender. We show that this is not possible classically. It
appears that entangled quantum states are uniquely suited for traceless
anonymous transmissions. We then extend this protocol to send and receive
qubits anonymously. In the process we introduce a new primitive called
anonymous entanglement, which may be useful in other contexts as well.Comment: 18 pages, LaTeX. Substantially updated version. To appear at
ASIACRYPT '0
Spread spectrum-based video watermarking algorithms for copyright protection
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can
now benefit from hardware and software which was considered state-of-the-art several years
ago. The advantages offered by the digital technologies are major but the same digital
technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly
possible and relatively easy, in spite of various forms of protection, but due to the analogue
environment, the subsequent copies had an inherent loss in quality. This was a natural way of
limiting the multiple copying of a video material. With digital technology, this barrier
disappears, being possible to make as many copies as desired, without any loss in quality
whatsoever. Digital watermarking is one of the best available tools for fighting this threat.
The aim of the present work was to develop a digital watermarking system compliant with the
recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark
can be inserted in either spatial domain or transform domain, this aspect was investigated and
led to the conclusion that wavelet transform is one of the best solutions available. Since
watermarking is not an easy task, especially considering the robustness under various attacks
several techniques were employed in order to increase the capacity/robustness of the system:
spread-spectrum and modulation techniques to cast the watermark, powerful error correction
to protect the mark, human visual models to insert a robust mark and to ensure its invisibility.
The combination of these methods led to a major improvement, but yet the system wasn't
robust to several important geometrical attacks. In order to achieve this last milestone, the
system uses two distinct watermarks: a spatial domain reference watermark and the main
watermark embedded in the wavelet domain. By using this reference watermark and techniques
specific to image registration, the system is able to determine the parameters of the attack and
revert it. Once the attack was reverted, the main watermark is recovered. The final result is a
high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen
Twisted Photons: New Quantum Perspectives in High Dimensions
Quantum information science and quantum information technology have seen a
virtual explosion world-wide. It is all based on the observation that
fundamental quantum phenomena on the individual particle or system-level lead
to completely novel ways of encoding, processing and transmitting information.
Quantum mechanics, a child of the first third of the 20th century, has found
numerous realizations and technical applications, much more than was thought at
the beginning. Decades later, it became possible to do experiments with
individual quantum particles and quantum systems. This was due to technological
progress, and for light in particular, the development of the laser. Hitherto,
nearly all experiments and also nearly all realizations in the fields have been
performed with qubits, which are two-level quantum systems. We suggest that
this limitation is again mainly a technological one, because it is very
difficult to create, manipulate and measure more complex quantum systems. Here,
we provide a specific overview of some recent developments with
higher-dimensional quantum systems. We mainly focus on Orbital Angular Momentum
(OAM) states of photons and possible applications in quantum information
protocols. Such states form discrete higher-dimensional quantum systems, also
called qudits. Specifically, we will first address the question what kind of
new fundamental properties exist and the quantum information applications which
are opened up by such novel systems. Then we give an overview of recent
developments in the field by discussing several notable experiments over the
past 2-3 years. Finally, we conclude with several important open questions
which will be interesting for investigations in the future.Comment: 15 pages, 7 figure
Quantum Optical Systems for the Implementation of Quantum Information Processing
We review the field of Quantum Optical Information from elementary
considerations through to quantum computation schemes. We illustrate our
discussion with descriptions of experimental demonstrations of key
communication and processing tasks from the last decade and also look forward
to the key results likely in the next decade. We examine both discrete (single
photon) type processing as well as those which employ continuous variable
manipulations. The mathematical formalism is kept to the minimum needed to
understand the key theoretical and experimental results
- …