14 research outputs found

    Quantum mutual authentication scheme based on Bell state measurement

    Get PDF
    Authentication is one of the security services that ensures sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build a quantum channel between two unauthenticated to each other parties, first, a trusted authority is needed to establish a mutual authentication with each party. Using Bell measurement and entanglement swapping, we present a protocol that mutually authenticates the identity of the sender and the receiver, then constructs a quantum channel based on Bell basis. After, the sender and the receiver use the quantum channel to communicate using entanglement-assisted quantum communication protocols. Additionally, the protocol renews the shared secret key between the trusted authority and each user after each authentication process. The protocol provides the necessary authentication and key distribution to create a quantum channel between the sender and receiver

    Quantum walks-based simple authenticated quantum cryptography protocols for secure wireless sensor networks

    Get PDF
    Wireless sensor networks play a crucial role in various applications, ranging from environmental monitoring to industrial automation that require high levels of security. With the development of quantum technologies, many security mechanisms maybe hacked due to the promising capabilities of quantum computation. To address this challenge, quantum protocols have emerged as a promising solution for enhancing the security of wireless sensor communications. One of the common types of quantum protocols is quantum key distribution (QKD) protocols, which are investigated to allow two participants with fully quantum capabilities to share a random secret key, while semi-quantum key distribution (SQKD) protocols are designed to perform the same task using fewer quantum resources to make quantum communications more realizable and practical. Quantum walk plays an essential role in quantum computing, which is a universal quantum computational paradigm. In this work, we utilize the advantages of quantum walk to design three authenticated quantum cryptographic protocols to establish secure channels for data transmission between sensor nodes: the first one is authenticated quantum key distribution (AQKD), the second one is authenticated semi quantum key distribution (ASQKD) with one of the two participants having limited quantum capabilities, and the last one is authenticated semi-quantum key distribution but both legitimate users possess limited quantum resources. The advantages of the proposed protocols are that the partners can exchange several different keys with the same exchanged qubits, and the presented protocols depend on a one-way quantum communication channel. In contrast, all previously designed SQKD protocols rely on two-way quantum communication. Security analyses prove that the presented protocols are secure against various well known attacks and highly efficient. The utilization of the presented protocols in wireless sensor communications opens up new avenues for secure and trustworthy data transmission, enabling the deployment of resilient wireless sensor networks in critical applications. This work also paves the way for future exploration of quantum-based security protocols and their integration into wireless sensor networks for enhanced data protection

    The Machinic Imaginary: A Post-Phenomenological Examination of Computational Society

    Get PDF
    The central claim of this thesis is the postulation of a machinic dimension of the social imaginary—a more-than-human process of creative expression of the social world. With the development of machine learning and the sociality of interactive media, computational logics have a creative capacity to produce meaning of a radically machinic order. Through an analysis of computational functions and infrastructures ranging from artificial neural networks to large-scale machine ecologies, the institution of computational logics into the social imaginary is nothing less than a reordering of the conditions of social-historical creation. Responding to dominant technopolitical propositions concerning digital culture, this thesis proposes a critical development of Cornelius Castoriadis’ philosophy of the social imaginary. To do so, a post phenomenological framework is constructed by tracing a trajectory from Maurice Merleau-Ponty’s late ontological turn, through to the process-relational philosophies of Gilbert Simondon and Castoriadis. Introducing the concept of the machinic imaginary, the thesis maps the extent to which the dynamic, interactive paradigm of twenty-first century computation is changing how meaning is socially instituted in ways incomprehensible to human sense. As social imaginary significations are increasingly created and carried by machines, the articulation of the social diverges into human and non-human worlds. This inaccessibility of the machinic imaginary is a core problematic raised by this thesis, indicating a fragmentation of the social imaginary and a novel form of existential alienation. Any political theorisation of the contemporary social condition must therefore work within this alienation and engage with the transsubjective character of social-historical creation

    Cultural Techniques: Assembling Spaces, Texts & Collectives

    Get PDF
    Addressing cultural techniques from different disciplinary perspectives, this volume elaborates upon a concept originally developed in media studies. In a series of case studies, it reconstructs the basic operations of spatialization underlying more complex symbolic artefacts and articulations, which range from techniques of the body to landscapes, from paperwork to encyclopedias, from collections to collectives

    Cultural Techniques

    Get PDF
    Addressing cultural techniques from different disciplinary perspectives, this volume elaborates upon a concept originally developed in media studies. In a series of case studies, it reconstructs the basic operations of spatialization underlying more complex symbolic artefacts and articulations, which range from techniques of the body to landscapes, from paperwork to encyclopedias, from collections to collectives
    corecore