6 research outputs found
Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum
properties of matter. Its aim is to develop primitives beyond the reach of
classical cryptography or to improve on existing classical implementations.
Although much of the work in this field is dedicated to quantum key
distribution (QKD), some important steps were made towards the study and
development of quantum oblivious transfer (QOT). It is possible to draw a
comparison between the application structure of both QKD and QOT primitives.
Just as QKD protocols allow quantum-safe communication, QOT protocols allow
quantum-safe computation. However, the conditions under which QOT is actually
quantum-safe have been subject to a great amount of scrutiny and study. In this
review article, we survey the work developed around the concept of oblivious
transfer in the area of theoretical quantum cryptography, with an emphasis on
some proposed protocols and their security requirements. We review the
impossibility results that daunt this primitive and discuss several quantum
security models under which it is possible to prove QOT security.Comment: 40 pages, 14 figure
Telecommunications Networks
This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing
Semi-Quantum Conference Key Agreement (SQCKA)
A need in the development of secure quantum communications is the scalable extension
of key distribution protocols. The greatest advantage of these protocols is the fact that its
security does not rely on mathematical assumptions and can achieve perfect secrecy. In
order to make these protocols scalable, has been developed the concept of Conference
Key Agreements, among multiple users.
In this thesis we propose a key distribution protocol among several users using a
semi-quantum approach. We assume that only one of the users is equipped with quantum
devices and generates quantum states, while the other users are classical, i.e., they are only
equipped with a device capable of measuring or reflecting the information. This approach has
the advantage of simplicity and reduced costs.
We prove our proposal is secure and we present some numerical results on the lower
bounds for the key rate. The security proof applies new techniques derived from some
already well established work.
From the practical point of view, we developed a toolkit called Qis|krypt⟩ that is able to
simulate not only our protocol but also some well-known quantum key distribution protocols.
The source-code is available on the following link:
- https://github.com/qiskrypt/qiskrypt/.Uma das necessidades no desenvolvimento de comunicações quânticas seguras é a extensão
escalável de protocolos de distribuição de chaves. A grande vantagem destes protocolos é o
facto da sua segurança não depender de suposições matemáticas e poder atingir segurança
perfeita. Para tornar estes protocolos escaláveis, desenvolveu-se o conceito de Acordo
de Chaves de Conferência, entre múltiplos utilizadores.
Nesta tese propomos um protocolo para distribuição de chaves entre vários utilizadores
usando uma abordagem semi-quântica. Assumimos que apenas um dos utilizadores está
equipado com dispositivos quânticos e é capaz de gerar estados quânticos, enquanto que
os outros utilizadores são clássicos, isto é, estão apenas equipados com dispositivos capazes
de efectuar uma medição ou refletir a informação. Esta abordagem tem a vantagem de ser
mais simples e de reduzir custos.
Provamos que a nossa proposta é segura e apresentamos alguns resultados numéricos
sobre limites inferiores para o rácio de geração de chaves. A prova de segurança aplica novas
técnicas derivadas de alguns resultados já bem estabelecidos.
Do ponto de vista prático, desenvolvemos uma ferramenta chamada Qis|krypt⟩ que é capaz
de simular não só o nosso protocolo como também outros protocolos distribuição de chaves
bem conhecidos. O código fonte encontra-se disponível no seguinte link:
- https://github.com/qiskrypt/qiskrypt/
Tematski zbornik radova međunarodnog značaja. Tom 3 / Međunarodni naučni skup “Dani Arčibalda Rajsa”, Beograd, 10-11. mart 2016.
In front of you is the Thematic Collection of Papers presented at the International Scientific Conference “Archibald Reiss Days”, which was organized by the Academy of Criminalistic and Police Studies in Belgrade, in co-operation with the Ministry of Interior and the Ministry of Education, Science and Technological Development of the Republic of Serbia, National Police University of China, Lviv State University of Internal Affairs, Volgograd Academy of the Russian Internal Affairs Ministry, Faculty of Security in Skopje, Faculty of Criminal Justice and Security in Ljubljana, Police Academy “Alexandru Ioan Cuza“ in Bucharest, Academy of Police Force in Bratislava and Police College in Banjaluka, and held at the Academy of Criminalistic and Police Studies, on 10 and 11 March 2016.
The International Scientific Conference “Archibald Reiss Days” is organized for the sixth time in a row, in memory of the founder and director of the first modern higher police school in Serbia, Rodolphe Archibald Reiss, PhD, after whom the Conference was named.
The Thematic Collection of Papers contains 165 papers written by eminent scholars in the field of law, security, criminalistics, police studies, forensics, informatics, as well as by members of national security system participating in education of the police, army and other security services from Belarus, Bosnia and Herzegovina, Bulgaria, China, Croatia, Greece, Hungary, Macedonia, Montenegro, Romania, Russian Federation, Serbia, Slovakia, Slovenia, Spain, Switzerland, Turkey, Ukraine and United Kingdom. Each paper has been double-blind peer reviewed by two reviewers, international experts competent for the field to which the paper is related, and the Thematic Conference Proceedings in whole has been reviewed by five competent international reviewers.
The papers published in the Thematic Collection of Papers contain the overview of contemporary trends in the development of police education system, development of the police and contemporary security, criminalistic and forensic concepts. Furthermore, they provide us with the analysis of the rule of law activities in crime suppression, situation and trends in the above-mentioned fields, as well as suggestions on how to systematically deal with these issues. The Collection of Papers represents a significant contribution to the existing fund of scientific and expert knowledge in the field of criminalistic, security, penal and legal theory and practice. Publication of this Collection contributes to improving of mutual cooperation betw