1,748 research outputs found
A New Related Message Attack on RSA
Abstract. Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms x e mod N and (ax + b) e mod N for known constants a, b ∈ ZN, one can compute x in O(e log 2 e) ZN-operations with some positive error probability. We show that given e cryptograms ci ≡ (aix + bi) e mod N, i = 0, 1,...e − 1, for any known constants ai, bi ∈ ZN, one can deterministically compute x in O(e) ZN-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log 2 e) ZNoperations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) ZN-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novel.
Unconditionally verifiable blind computation
Blind Quantum Computing (BQC) allows a client to have a server carry out a
quantum computation for them such that the client's input, output and
computation remain private. A desirable property for any BQC protocol is
verification, whereby the client can verify with high probability whether the
server has followed the instructions of the protocol, or if there has been some
deviation resulting in a corrupted output state. A verifiable BQC protocol can
be viewed as an interactive proof system leading to consequences for complexity
theory. The authors, together with Broadbent, previously proposed a universal
and unconditionally secure BQC scheme where the client only needs to be able to
prepare single qubits in separable states randomly chosen from a finite set and
send them to the server, who has the balance of the required quantum
computational resources. In this paper we extend that protocol with new
functionality allowing blind computational basis measurements, which we use to
construct a new verifiable BQC protocol based on a new class of resource
states. We rigorously prove that the probability of failing to detect an
incorrect output is exponentially small in a security parameter, while resource
overhead remains polynomial in this parameter. The new resource state allows
entangling gates to be performed between arbitrary pairs of logical qubits with
only constant overhead. This is a significant improvement on the original
scheme, which required that all computations to be performed must first be put
into a nearest neighbour form, incurring linear overhead in the number of
qubits. Such an improvement has important consequences for efficiency and
fault-tolerance thresholds.Comment: 46 pages, 10 figures. Additional protocol added which allows
arbitrary circuits to be verified with polynomial securit
Generation of eigenstates using the phase-estimation algorithm
The phase estimation algorithm is so named because it allows the estimation
of the eigenvalues associated with an operator. However it has been proposed
that the algorithm can also be used to generate eigenstates. Here we extend
this proposal for small quantum systems, identifying the conditions under which
the phase estimation algorithm can successfully generate eigenstates. We then
propose an implementation scheme based on an ion trap quantum computer. This
scheme allows us to illustrate two simple examples, one in which the algorithm
effectively generates eigenstates, and one in which it does not.Comment: 5 pages, 3 Figures, RevTeX4 Introduction expanded, typos correcte
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge--verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe an approach called the Remote Assessment of Fault Tolerance (RAFT). The key technique in a RAFT is to measure the time taken for a server to respond to a read request for a collection of file blocks. The larger the number of hard drives across which a file is distributed, the faster the read-request response. Erasure codes also play an important role in our solution. We describe a theoretical framework for RAFTs and offer experimental evidence that RAFTs can work in practice in several settings of interest
Quantum Physics and Computers
Recent theoretical results confirm that quantum theory provides the
possibility of new ways of performing efficient calculations. The most striking
example is the factoring problem. It has recently been shown that computers
that exploit quantum features could factor large composite integers. This task
is believed to be out of reach of classical computers as soon as the number of
digits in the number to factor exceeds a certain limit. The additional power of
quantum computers comes from the possibility of employing a superposition of
states, of following many distinct computation paths and of producing a final
output that depends on the interference of all of them. This ``quantum
parallelism'' outstrips by far any parallelism that can be thought of in
classical computation and is responsible for the ``exponential'' speed-up of
computation.
This is a non-technical (or at least not too technical) introduction to the
field of quantum computation. It does not cover very recent topics, such as
error-correction.Comment: 27 pages, LaTeX, 8 PostScript figures embedded. A bug in one of the
postscript files has been fixed. Reprints available from the author. The
files are also available from
http://eve.physics.ox.ac.uk/Articles/QC.Articles.htm
Encrypted Shared Data Spaces
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples without having to know other agents’ keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given
Analysis of common attacks in LDPCC-based public-key cryptosystems
We analyze the security and reliability of a recently proposed class of
public-key cryptosystems against attacks by unauthorized parties who have
acquired partial knowledge of one or more of the private key components and/or
of the plaintext. Phase diagrams are presented, showing critical partial
knowledge levels required for unauthorized decryptionComment: 14 pages, 6 figure
Basic concepts in quantum computation
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and
function evaluations 3 Algorithms and their complexity 4 From interferometers
to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase
estimation 8 Periodicity and quantum factoring 9 Cryptography 10 Conditional
quantum dynamics 11 Decoherence and recoherence 12 Concluding remarksComment: 37 pages, lectures given at les Houches Summer School on "Coherent
Matter Waves", July-August 199
Picture-hanging puzzles
We show how to hang a picture by wrapping rope around n nails, making a polynomial number of twists, such that the picture falls whenever any k out of the n nails get removed, and the picture remains hanging when fewer than k nails get removed. This construction makes for some fun mathematical magic performances. More generally, we characterize the possible Boolean functions characterizing when the picture falls in terms of which nails get removed as all monotone Boolean functions. This construction requires an exponential number of twists in the worst case, but exponential complexity is almost always necessary for general functions.National Science Foundation (U.S.) (NSF grant CCF-1018388
Picture-Hanging Puzzles
We show how to hang a picture by wrapping rope around n nails, making a
polynomial number of twists, such that the picture falls whenever any k out of
the n nails get removed, and the picture remains hanging when fewer than k
nails get removed. This construction makes for some fun mathematical magic
performances. More generally, we characterize the possible Boolean functions
characterizing when the picture falls in terms of which nails get removed as
all monotone Boolean functions. This construction requires an exponential
number of twists in the worst case, but exponential complexity is almost always
necessary for general functions.Comment: 18 pages, 8 figures, 11 puzzles. Journal version of FUN 2012 pape
- …
