22,433 research outputs found

    The Landscape of Optimal Card-based Protocols

    Get PDF
    In the area of card-based cryptography one devises small and easy to perform protocols for secure multiparty computation using a deck of physical playing cards with indistinguishable backs, which can be run if no trusted computer is available, or in classroom settings to illustrate privacy notions and secure computations. Initiated by the “Five-Card Trick” of den Boer (EUROCRYPT 1989) for computing the AND of two players\u27 bits, and the work of Crépeau and Kilian (CRYPTO 1993) introducing committed format protocols which can be used as building blocks in larger computations, this is a field with a growing number of simple protocols. This paper devises two new AND protocols which are card-minimal w.r.t. specific requirements, and shows the card-minimality of the COPY protocol (necessary in arbitrary circuits, due to the physical nature of card-encoded bits) of Mizuki and Sone (FAW 2009) and the AND protocol of Abe et al. (APKC 2018). By this, we completely determine the landscape of card-minimal protocols with respect to runtime requirements (finite runtime or Las Vegas behavior with/without restarts) and practicality demands on the shuffling operations. Moreover, we systematize and extend techniques for proving lower bounds on the number of cards, which we believe is of independent interest

    AND Protocols Using Only Uniform Shuffles

    Full text link
    Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards as possible. In this paper, we introduce two AND protocols that use only uniform shuffles. The first one requires four cards and is a restart-free Las Vegas protocol with finite expected runtime. The second one requires five cards and always terminates in finite time.Comment: This paper has appeared at CSR 201

    Advancing prevention of sexually transmitted infections through point-of-care testing : target product profiles and landscape analysis

    Get PDF
    Objectives: Advancing the field of point-of-care testing (POCT) for STIs can rapidly and substantially improve STI control and prevention by providing targeted, essential STI services (case detection and screening). POCT enables definitive diagnosis and appropriate treatment in a single visit and home and community-based testing. Methods: Since 2014, the WHO Department of Reproductive Health and Research, in collaboration with technical partners, has completed four landscape analyses of promising diagnostics for use at or near the point of patient care to detect syphilis, Neisseria gonorrhoeae, Chlamydia trachomatis, Trichomonas vaginalis and the human papillomavirus. The analyses comprised a literature review and interviews. Two International Technical Consultations on STI POCTs (2014 and 2015) resulted in the development of target product profiles (TPP). Experts in STI microbiology, laboratory diagnostics, clinical management, public health and epidemiology participated in the consultations with representation from all WHO regions. Results: The landscape analysis identified diagnostic tests that are either available on the market, to be released in the near future or in the pipeline. The TPPs specify 28 analytical and operational characteristics of POCTs for use in different populations for surveillance, screening and case management. None of the tests that were identified in the landscape analysis met all of the targets of the TPPs. Conclusion: More efforts of the global health community are needed to accelerate access to affordable quality-assured STI POCTs, particularly in low-and middle-income countries, by supporting the development of new diagnostic platforms as well as strengthening the validation and implementation of existing diagnostics according to internationally endorsed standards and the best available evidence

    Engineered swift equilibration of a Brownian particle

    Get PDF
    A fundamental and intrinsic property of any device or natural system is its relaxation time relax, which is the time it takes to return to equilibrium after the sudden change of a control parameter [1]. Reducing tautau relax , is frequently necessary, and is often obtained by a complex feedback process. To overcome the limitations of such an approach, alternative methods based on driving have been recently demonstrated [2, 3], for isolated quantum and classical systems [4--9]. Their extension to open systems in contact with a thermostat is a stumbling block for applications. Here, we design a protocol,named Engineered Swift Equilibration (ESE), that shortcuts time-consuming relaxations, and we apply it to a Brownian particle trapped in an optical potential whose properties can be controlled in time. We implement the process experimentally, showing that it allows the system to reach equilibrium times faster than the natural equilibration rate. We also estimate the increase of the dissipated energy needed to get such a time reduction. The method paves the way for applications in micro and nano devices, where the reduction of operation time represents as substantial a challenge as miniaturization [10]. The concepts of equilibrium and of transformations from an equilibrium state to another, are cornerstones of thermodynamics. A textbook illustration is provided by the expansion of a gas, starting at equilibrium and expanding to reach a new equilibrium in a larger vessel. This operation can be performed either very slowly by a piston, without dissipating energy into the environment, or alternatively quickly, letting the piston freely move to reach the new volume

    Carbon Sequestration, Co-Benefits, and Conservation Programs

    Get PDF
    Land use changes to sequester carbon also provide モco-benefits,ヤ some of which (for example, water quality) have attracted at least as much attention as carbon storage. The non-separability of these co-benefits presents a challenge for policy design. If carbon markets are employed, then social efficiency will depend on how we take into account co-benefits, that is, externalities, in such markets. If carbon sequestration is incorporated into conservation programs, then the weight given to carbon sequestration relative to its co-benefits will partly shape these programs. Using the Conservation Reserve Program (CRP) as an example, we show that CRP has been sequestering carbon, which was not an intended objective of the program. We also demonstrate that more carbon would have been sequestered had CRP targeted this objective, although the モco-benefitsヤ would have increased or decreased.

    Monitoring wild animal communities with arrays of motion sensitive camera traps

    Get PDF
    Studying animal movement and distribution is of critical importance to addressing environmental challenges including invasive species, infectious diseases, climate and land-use change. Motion sensitive camera traps offer a visual sensor to record the presence of a broad range of species providing location -specific information on movement and behavior. Modern digital camera traps that record video present new analytical opportunities, but also new data management challenges. This paper describes our experience with a terrestrial animal monitoring system at Barro Colorado Island, Panama. Our camera network captured the spatio-temporal dynamics of terrestrial bird and mammal activity at the site - data relevant to immediate science questions, and long-term conservation issues. We believe that the experience gained and lessons learned during our year long deployment and testing of the camera traps as well as the developed solutions are applicable to broader sensor network applications and are valuable for the advancement of the sensor network research. We suggest that the continued development of these hardware, software, and analytical tools, in concert, offer an exciting sensor-network solution to monitoring of animal populations which could realistically scale over larger areas and time spans

    The mobile commerce technologies: Generations, standards and protocols

    Get PDF
    Mobile Commerce has staged a remarkable come-back. Driven by the technological innovations in the field of telecommunications, it is showing signs of a healthy recovery. The collapse of the dot-com boom in 2001/2002 had dealt a severe blow not only to Electronic Commerce but also to Mobile Commerce, which was just about developing at that time. In addition to a general lack of customer demand for mobile, location-based, services, it suffered heavily under the technical deficiencies of end-devices, slow data transmission and unripe technological standards. These factors in turn had a negative impact on the customer acceptance of mobile services and whatever little demand was available, was rendered useless. Many of the environmental conditions have changed since then. Technology innovations have reduced many barriers to acceptance. Increasing globalization has led to more mobility and therefore to greater demand for mobile, ubiquitios services that can be consumed anytime, anywher. This paper examines different telecommunication technologies regarding their suitablilty and deficiencies. It provides an overview over the historical development of mobile technologies while pointing towards the expected future scenario. --Mobile Commerce,M-Commerce,UMTS,WLAN,3G
    • …
    corecore