12,549 research outputs found
Personal Volunteer Computing
We propose personal volunteer computing, a novel paradigm to encourage
technical solutions that leverage personal devices, such as smartphones and
laptops, for personal applications that require significant computations, such
as animation rendering and image processing. The paradigm requires no
investment in additional hardware, relying instead on devices that are already
owned by users and their community, and favours simple tools that can be
implemented part-time by a single developer. We show that samples of personal
devices of today are competitive with a top-of-the-line laptop from two years
ago. We also propose new directions to extend the paradigm
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Next-generation big data analytics: state of the art, challenges, and future research topics
The term big data occurs more frequently now than ever before. A large number of fields and subjects, ranging from everyday life to traditional research fields (i.e., geography and transportation, biology and chemistry, medicine and rehabilitation), involve big data problems. The popularizing of various types of network has diversified types, issues, and solutions for big data more than ever before. In this paper, we review recent research in data types, storage models, privacy, data security, analysis methods, and applications related to network big data. Finally, we summarize the challenges and development of big data to predict current and future trends.This work was supported in part by the “Open3D: Collaborative Editing for 3D Virtual Worlds” [EPSRC (EP/M013685/1)], in part by the “Distributed Java Infrastructure for Real-Time Big-Data” (CAS14/00118), in part by eMadrid (S2013/ICE-2715), in
part by the HERMES-SMARTDRIVER (TIN2013-46801-C4-2-R), and in
part by the AUDACity (TIN2016-77158-C4-1-R). Paper no. TII-16-1
Recommended from our members
Notch signaling regulates metabolic heterogeneity in glioblastoma stem cells.
Glioblastoma (GBM) stem cells (GSCs) reside in both hypoxic and vascular microenvironments within tumors. The molecular mechanisms that allow GSCs to occupy such contrasting niches are not understood. We used patient-derived GBM cultures to identify GSC subtypes with differential activation of Notch signaling, which co-exist in tumors but occupy distinct niches and match their metabolism accordingly. Multipotent GSCs with Notch pathway activation reside in perivascular niches, and are unable to entrain anaerobic glycolysis during hypoxia. In contrast, most CD133-expressing GSCs do not depend on canonical Notch signaling, populate tumors regardless of local vascularity and selectively utilize anaerobic glycolysis to expand in hypoxia. Ectopic activation of Notch signaling in CD133-expressing GSCs is sufficient to suppress anaerobic glycolysis and resistance to hypoxia. These findings demonstrate a novel role for Notch signaling in regulating GSC metabolism and suggest intratumoral GSC heterogeneity ensures metabolic adaptations to support tumor growth in diverse tumor microenvironments
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
In August 2015 the cryptographic world was shaken by a sudden and surprising
announcement by the US National Security Agency NSA concerning plans to
transition to post-quantum algorithms. Since this announcement post-quantum
cryptography has become a topic of primary interest for several standardization
bodies. The transition from the currently deployed public-key algorithms to
post-quantum algorithms has been found to be challenging in many aspects. In
particular the problem of evaluating the quantum-bit security of such
post-quantum cryptosystems remains vastly open. Of course this question is of
primarily concern in the process of standardizing the post-quantum
cryptosystems. In this paper we consider the quantum security of the problem of
solving a system of {\it Boolean multivariate quadratic equations in
variables} (\MQb); a central problem in post-quantum cryptography. When ,
under a natural algebraic assumption, we present a Las-Vegas quantum algorithm
solving \MQb{} that requires the evaluation of, on average,
quantum gates. To our knowledge this is the fastest algorithm for solving
\MQb{}
- …