22,433 research outputs found
The Landscape of Optimal Card-based Protocols
In the area of card-based cryptography one devises small and easy to perform protocols for secure multiparty computation using a deck of physical playing cards with indistinguishable backs, which can be run if no trusted computer is available, or in classroom settings to illustrate privacy notions and secure computations.
Initiated by the “Five-Card Trick” of den Boer (EUROCRYPT 1989) for computing the AND of two players\u27 bits, and the work of Crépeau and Kilian (CRYPTO 1993) introducing committed format protocols which can be used as building blocks in larger computations, this is a field with a growing number of simple protocols. This paper devises two new AND protocols which are card-minimal w.r.t. specific requirements, and shows the card-minimality of the COPY protocol (necessary in arbitrary circuits, due to the physical nature of card-encoded bits) of Mizuki and Sone (FAW 2009) and the AND protocol of Abe et al. (APKC 2018). By this, we completely determine the landscape of card-minimal protocols with respect to runtime requirements (finite runtime or Las Vegas behavior with/without restarts) and practicality demands on the shuffling operations.
Moreover, we systematize and extend techniques for proving lower bounds on the number of cards, which we believe is of independent interest
AND Protocols Using Only Uniform Shuffles
Secure multi-party computation using a deck of playing cards has been a
subject of research since the "five-card trick" introduced by den Boer in 1989.
One of the main problems in card-based cryptography is to design
committed-format protocols to compute a Boolean AND operation subject to
different runtime and shuffle restrictions by using as few cards as possible.
In this paper, we introduce two AND protocols that use only uniform shuffles.
The first one requires four cards and is a restart-free Las Vegas protocol with
finite expected runtime. The second one requires five cards and always
terminates in finite time.Comment: This paper has appeared at CSR 201
Advancing prevention of sexually transmitted infections through point-of-care testing : target product profiles and landscape analysis
Objectives: Advancing the field of point-of-care testing (POCT) for STIs can rapidly and substantially improve STI control and prevention by providing targeted, essential STI services (case detection and screening). POCT enables definitive diagnosis and appropriate treatment in a single visit and home and community-based testing.
Methods: Since 2014, the WHO Department of Reproductive Health and Research, in collaboration with technical partners, has completed four landscape analyses of promising diagnostics for use at or near the point of patient care to detect syphilis, Neisseria gonorrhoeae, Chlamydia trachomatis, Trichomonas vaginalis and the human papillomavirus. The analyses comprised a literature review and interviews. Two International Technical Consultations on STI POCTs (2014 and 2015) resulted in the development of target product profiles (TPP). Experts in STI microbiology, laboratory diagnostics, clinical management, public health and epidemiology participated in the consultations with representation from all WHO regions.
Results: The landscape analysis identified diagnostic tests that are either available on the market, to be released in the near future or in the pipeline. The TPPs specify 28 analytical and operational characteristics of POCTs for use in different populations for surveillance, screening and case management. None of the tests that were identified in the landscape analysis met all of the targets of the TPPs.
Conclusion: More efforts of the global health community are needed to accelerate access to affordable quality-assured STI POCTs, particularly in low-and middle-income countries, by supporting the development of new diagnostic platforms as well as strengthening the validation and implementation of existing diagnostics according to internationally endorsed standards and the best available evidence
Engineered swift equilibration of a Brownian particle
A fundamental and intrinsic property of any device or natural system is its
relaxation time relax, which is the time it takes to return to equilibrium
after the sudden change of a control parameter [1]. Reducing relax , is
frequently necessary, and is often obtained by a complex feedback process. To
overcome the limitations of such an approach, alternative methods based on
driving have been recently demonstrated [2, 3], for isolated quantum and
classical systems [4--9]. Their extension to open systems in contact with a
thermostat is a stumbling block for applications. Here, we design a
protocol,named Engineered Swift Equilibration (ESE), that shortcuts
time-consuming relaxations, and we apply it to a Brownian particle trapped in
an optical potential whose properties can be controlled in time. We implement
the process experimentally, showing that it allows the system to reach
equilibrium times faster than the natural equilibration rate. We also estimate
the increase of the dissipated energy needed to get such a time reduction. The
method paves the way for applications in micro and nano devices, where the
reduction of operation time represents as substantial a challenge as
miniaturization [10]. The concepts of equilibrium and of transformations from
an equilibrium state to another, are cornerstones of thermodynamics. A textbook
illustration is provided by the expansion of a gas, starting at equilibrium and
expanding to reach a new equilibrium in a larger vessel. This operation can be
performed either very slowly by a piston, without dissipating energy into the
environment, or alternatively quickly, letting the piston freely move to reach
the new volume
Carbon Sequestration, Co-Benefits, and Conservation Programs
Land use changes to sequester carbon also provide モco-benefits,ヤ some of which (for example, water quality) have attracted at least as much attention as carbon storage. The non-separability of these co-benefits presents a challenge for policy design. If carbon markets are employed, then social efficiency will depend on how we take into account co-benefits, that is, externalities, in such markets. If carbon sequestration is incorporated into conservation programs, then the weight given to carbon sequestration relative to its co-benefits will partly shape these programs. Using the Conservation Reserve Program (CRP) as an example, we show that CRP has been sequestering carbon, which was not an intended objective of the program. We also demonstrate that more carbon would have been sequestered had CRP targeted this objective, although the モco-benefitsヤ would have increased or decreased.
Monitoring wild animal communities with arrays of motion sensitive camera traps
Studying animal movement and distribution is of critical importance to
addressing environmental challenges including invasive species, infectious
diseases, climate and land-use change. Motion sensitive camera traps offer a
visual sensor to record the presence of a broad range of species providing
location -specific information on movement and behavior. Modern digital camera
traps that record video present new analytical opportunities, but also new data
management challenges. This paper describes our experience with a terrestrial
animal monitoring system at Barro Colorado Island, Panama. Our camera network
captured the spatio-temporal dynamics of terrestrial bird and mammal activity
at the site - data relevant to immediate science questions, and long-term
conservation issues. We believe that the experience gained and lessons learned
during our year long deployment and testing of the camera traps as well as the
developed solutions are applicable to broader sensor network applications and
are valuable for the advancement of the sensor network research. We suggest
that the continued development of these hardware, software, and analytical
tools, in concert, offer an exciting sensor-network solution to monitoring of
animal populations which could realistically scale over larger areas and time
spans
The mobile commerce technologies: Generations, standards and protocols
Mobile Commerce has staged a remarkable come-back. Driven by the technological innovations in the field of telecommunications, it is showing signs of a healthy recovery. The collapse of the dot-com boom in 2001/2002 had dealt a severe blow not only to Electronic Commerce but also to Mobile Commerce, which was just about developing at that time. In addition to a general lack of customer demand for mobile, location-based, services, it suffered heavily under the technical deficiencies of end-devices, slow data transmission and unripe technological standards. These factors in turn had a negative impact on the customer acceptance of mobile services and whatever little demand was available, was rendered useless. Many of the environmental conditions have changed since then. Technology innovations have reduced many barriers to acceptance. Increasing globalization has led to more mobility and therefore to greater demand for mobile, ubiquitios services that can be consumed anytime, anywher. This paper examines different telecommunication technologies regarding their suitablilty and deficiencies. It provides an overview over the historical development of mobile technologies while pointing towards the expected future scenario. --Mobile Commerce,M-Commerce,UMTS,WLAN,3G
- …