1,204 research outputs found

    Authentication from matrix conjugation

    Full text link
    We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter would follow from solving the conjugacy search problem in the platform (noncommutative) semigroup, i.e., to recovering X from X^{-1}AX and A. The platform semigroup that we suggest here is the semigroup of nxn matrices over truncated multivariable polynomials over a ring.Comment: 6 page

    Post-processing procedure for industrial quantum key distribution systems

    Full text link
    We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of a classical public communication channel is also considered.Comment: 5 pages; presented at the 3rd International School and Conference "Saint-Petersburg OPEN 2016" (Saint-Petersburg, March 28-30, 2016

    Regular subgroups with large intersection

    Full text link
    In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow 22-subgroups of their normalisers in the symmetric group Sym(F2n)\mathrm{Sym}(\mathbb{F}_2^n), in view of the interest that they have recently raised for their applications in symmetric cryptography

    A Talk on Quantum Cryptography, or How Alice Outwits Eve

    Get PDF
    Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice, decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has just learned to devise a cryptographic communication system that automatically detects whether or not Eve is up to her villainous eavesdropping. Some of the topics discussed are Heisenberg's Uncertainty Principle, the Vernam cipher, the BB84 and B92 cryptographic protocols. The talk ends with a discussion of some of Eve's possible eavesdropping strategies, opaque eavesdropping, translucent eavesdropping, and translucent eavesdropping with entanglement.Comment: 31 pages, 8 figures. Revised version of a paper published in "Coding Theory, and Cryptography: From Geheimscheimschreiber and Enigma to Quantum Theory," (edited by David Joyner), Springer-Verlag, 1999 (pp. 144-174). To be published with the permission of Springer-Verlag in an AMS PSAPM Short Course volume entitled "Quantum Computation.

    DNA barcoding as a molecular tool to track down mislabeling and food piracy

    Get PDF
    DNA barcoding is a molecular technology that allows the identification of any biological species by amplifying, sequencing and querying the information from genic and/or intergenic standardized target regions belonging to the extranuclear genomes. Although these sequences represent a small fraction of the total DNA of a cell, both chloroplast and mitochondrial barcodes chosen for identifying plant and animal species, respectively, have shown sufficient nucleotide diversity to assess the taxonomic identity of the vast majority of organisms used in agriculture. Consequently, cpDNA and mtDNA barcoding protocols are being used more and more in the food industry and food supply chains for food labeling, not only to support food safety but also to uncover food piracy in freshly commercialized and technologically processed products. Since the extranuclear genomes are present in many copies within each cell, this technology is being more easily exploited to recover information even in degraded samples or transformed materials deriving from crop varieties and livestock species. The strong standardization that characterizes protocols used worldwide for DNA barcoding makes this technology particularly suitable for routine analyses required by agencies to safeguard food safety and quality. Here we conduct a critical review of the potentials of DNA barcoding for food labeling along with the main findings in the area of food piracy, with particular reference to agrifood and livestock foodstuffs
    • …
    corecore