233,831 research outputs found
Oblivious transfer using quantum entanglement
Based on quantum entanglement, an all-or-nothing oblivious transfer protocol
is proposed and is proven to be secure. The distinct merit of the present
protocol lies in that it is not based on quantum bit commitment. More
intriguingly, this OT protocol does not belong to a class of protocols denied
by the Lo's no-go theorem of one-sided two-party secure computation, and thus
its security can be achieved.Comment: 9 pages, 1 figur
Embedded Trusted Monitoring and Management Modules for Smart Solar Panels
This paper investigates developing a prototype of smart solar panels. This architecture consists of a panel monitoring module and the central management unit. The monitoring module is to be embedded inside each PV panel making it secure to transfer the trusted data via Wi-Fi to the central Management unit (which can accommodate an array of PV panels in an installation). This module is required for data storage and provides the ability to upload secure data to the cloud. This platform presents the ability to securely manage large numbers of rooftop solar panels in a distributed ledger by implementing block chain algorithm. For achieving this purpose, Module 400 is envisaged to be turned into a Blockchain node as it provides the infrastructure to implement this technology
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
The Impossibility Of Secure Two-Party Classical Computation
We present attacks that show that unconditionally secure two-party classical
computation is impossible for many classes of function. Our analysis applies to
both quantum and relativistic protocols. We illustrate our results by showing
the impossibility of oblivious transfer.Comment: 10 page
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
- …