1,204 research outputs found
Authentication from matrix conjugation
We propose an authentication scheme where forgery (a.k.a. impersonation)
seems infeasible without finding the prover's long-term private key. The latter
would follow from solving the conjugacy search problem in the platform
(noncommutative) semigroup, i.e., to recovering X from X^{-1}AX and A. The
platform semigroup that we suggest here is the semigroup of nxn matrices over
truncated multivariable polynomials over a ring.Comment: 6 page
Post-processing procedure for industrial quantum key distribution systems
We present algorithmic solutions aimed on post-processing for industrial
quantum key distribution systems with hardware sifting. The main steps of the
procedure are error correction, parameter estimation, and privacy
amplification. Authentication of a classical public communication channel is
also considered.Comment: 5 pages; presented at the 3rd International School and Conference
"Saint-Petersburg OPEN 2016" (Saint-Petersburg, March 28-30, 2016
Regular subgroups with large intersection
In this paper we study the relationships between the elementary abelian
regular subgroups and the Sylow -subgroups of their normalisers in the
symmetric group , in view of the interest that
they have recently raised for their applications in symmetric cryptography
A Talk on Quantum Cryptography, or How Alice Outwits Eve
Alice and Bob wish to communicate without the archvillainess Eve
eavesdropping on their conversation. Alice, decides to take two college
courses, one in cryptography, the other in quantum mechanics. During the
courses, she discovers she can use what she has just learned to devise a
cryptographic communication system that automatically detects whether or not
Eve is up to her villainous eavesdropping. Some of the topics discussed are
Heisenberg's Uncertainty Principle, the Vernam cipher, the BB84 and B92
cryptographic protocols. The talk ends with a discussion of some of Eve's
possible eavesdropping strategies, opaque eavesdropping, translucent
eavesdropping, and translucent eavesdropping with entanglement.Comment: 31 pages, 8 figures. Revised version of a paper published in "Coding
Theory, and Cryptography: From Geheimscheimschreiber and Enigma to Quantum
Theory," (edited by David Joyner), Springer-Verlag, 1999 (pp. 144-174). To be
published with the permission of Springer-Verlag in an AMS PSAPM Short Course
volume entitled "Quantum Computation.
DNA barcoding as a molecular tool to track down mislabeling and food piracy
DNA barcoding is a molecular technology that allows the identification of any biological species by amplifying, sequencing and querying the information from genic and/or intergenic standardized target regions belonging to the extranuclear genomes. Although these sequences represent a small fraction of the total DNA of a cell, both chloroplast and mitochondrial barcodes chosen for identifying plant and animal species, respectively, have shown sufficient nucleotide diversity to assess the taxonomic identity of the vast majority of organisms used in agriculture. Consequently, cpDNA and mtDNA barcoding protocols are being used more and more in the food industry and food supply chains for food labeling, not only to support food safety but also to uncover food piracy in freshly commercialized and technologically processed products. Since the extranuclear genomes are present in many copies within each cell, this technology is being more easily exploited to recover information even in degraded samples or transformed materials deriving from crop varieties and livestock species. The strong standardization that characterizes protocols used worldwide for DNA barcoding makes this technology particularly suitable for routine analyses required by agencies to safeguard food safety and quality. Here we conduct a critical review of the potentials of DNA barcoding for food labeling along with the main findings in the area of food piracy, with particular reference to agrifood and livestock foodstuffs
- …