3,333 research outputs found
Boneh-Franklin Identity Based Encryption Revisited
Contains fulltext :
33216.pdf (preprint version ) (Open Access
Quantum private queries
We propose a cheat sensitive quantum protocol to perform a private search on
a classical database which is efficient in terms of communication complexity.
It allows a user to retrieve an item from the server in possession of the
database without revealing which item she retrieved: if the server tries to
obtain information on the query, the person querying the database can find it
out. Furthermore our protocol ensures perfect data privacy of the database,
i.e. the information that the user can retrieve in a single queries is bounded
and does not depend on the size of the database. With respect to the known
(quantum and classical) strategies for private information retrieval, our
protocol displays an exponential reduction both in communication complexity and
in running-time computational complexity.Comment: 4 pages, 1 figur
Socioeconomic indicators of health inequalities and female mortality: a nested cohort study within the United Kingdom Collaborative Trial of Ovarian Cancer Screening (UKCTOCS)
Evidence is mounting that area-level socioeconomic indicators are important tools for predicting health outcomes. However, few studies have examined these alongside individual-level education. This nested cohort study within the control arm of the United Kingdom Collaborative Trial of Ovarian Cancer Screening (UKCTOCS) assesses the association of mutually adjusted individual (education) and area-level (Index of Multiple Deprivation-IMD 2007) socioeconomic status indicators and all-cause female mortality
HardIDX: Practical and Secure Index with SGX
Software-based approaches for search over encrypted data are still either
challenged by lack of proper, low-leakage encryption or slow performance.
Existing hardware-based approaches do not scale well due to hardware
limitations and software designs that are not specifically tailored to the
hardware architecture, and are rarely well analyzed for their security (e.g.,
the impact of side channels). Additionally, existing hardware-based solutions
often have a large code footprint in the trusted environment susceptible to
software compromises. In this paper we present HardIDX: a hardware-based
approach, leveraging Intel's SGX, for search over encrypted data. It implements
only the security critical core, i.e., the search functionality, in the trusted
environment and resorts to untrusted software for the remainder. HardIDX is
deployable as a highly performant encrypted database index: it is logarithmic
in the size of the index and searches are performed within a few milliseconds
rather than seconds. We formally model and prove the security of our scheme
showing that its leakage is equivalent to the best known searchable encryption
schemes. Our implementation has a very small code and memory footprint yet
still scales to virtually unlimited search index sizes, i.e., size is limited
only by the general - non-secure - hardware resources
Unconditionally verifiable blind computation
Blind Quantum Computing (BQC) allows a client to have a server carry out a
quantum computation for them such that the client's input, output and
computation remain private. A desirable property for any BQC protocol is
verification, whereby the client can verify with high probability whether the
server has followed the instructions of the protocol, or if there has been some
deviation resulting in a corrupted output state. A verifiable BQC protocol can
be viewed as an interactive proof system leading to consequences for complexity
theory. The authors, together with Broadbent, previously proposed a universal
and unconditionally secure BQC scheme where the client only needs to be able to
prepare single qubits in separable states randomly chosen from a finite set and
send them to the server, who has the balance of the required quantum
computational resources. In this paper we extend that protocol with new
functionality allowing blind computational basis measurements, which we use to
construct a new verifiable BQC protocol based on a new class of resource
states. We rigorously prove that the probability of failing to detect an
incorrect output is exponentially small in a security parameter, while resource
overhead remains polynomial in this parameter. The new resource state allows
entangling gates to be performed between arbitrary pairs of logical qubits with
only constant overhead. This is a significant improvement on the original
scheme, which required that all computations to be performed must first be put
into a nearest neighbour form, incurring linear overhead in the number of
qubits. Such an improvement has important consequences for efficiency and
fault-tolerance thresholds.Comment: 46 pages, 10 figures. Additional protocol added which allows
arbitrary circuits to be verified with polynomial securit
A fast single server private information retrieval protocol with low communication cost
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be practical, a single server PIR protocol has to be both communicationally and computationally efficient. In this paper, we present a single server PIR protocol that has low communication cost and is much faster than existing protocols. A major building block of the PIR protocol in this paper is a tree-based compression scheme, which we call folding/unfolding. This compression scheme enables us to lower the communication complexity to O(loglogn). The other major building block is the BGV fully homomorphic encryption scheme. We show how we design the protocol to exploit the internal parallelism of the BGV scheme. This significantly reduces the server side computational overhead and makes our protocol much faster than the existing protocols. Our protocol can be further accelerated by utilising hardware parallelism. We have built a prototype of the protocol. We report on the performance of our protocol based on the prototype and compare it with the current most efficient protocols
An investigation of the existence of a surface water layer on aircraft radomes during simulated flight in heavy precipitation
An experiment to investigate the electromagnetic attenuation effects of an impacting water spray on an aircraft weather radome was conducted in Langley's 4 X 7 m. wind tunnel equipped with a water spray system. Results indicate no significant liquid water film formed at the stagnation point of the radome under the test conditions. However, a water sheath was observed standing away from the radome surface, which could possibly have significant attenuation properties of its own. Due to the lack of fidelity in modeling both the natural environment with the tunnel apparatus and the water sheath, it is recommended that further studies be undertaken to better define the water distribution in the vicinity of the radome and measure its effect on weather radar performance
Optical detection of the Pictor A jet and tidal tail : evidence against an IC/CMB jet
Date of Acceptance: 12/06/2015New images of the FR II radio galaxy Pictor A from the Hubble Space Telescope reveal a previously undiscovered tidal tail, as well as a number of jet knots coinciding with a known X-ray and radio jet. The tidal tail is approximately 5″ wide (3 kpc projected), starting 18″ (12 kpc) from the center of Pictor A, and extends more than 90″ (60 kpc). The knots are part of a jet observed to be about 4′ (160 kpc) long, extending to a bright hotspot. These images are the first optical detections of this jet, and by extracting knot flux densities through three filters, we set constraints on emission models. While the radio and optical flux densities are usually explained by synchrotron emission, there are several emission mechanisms that might be used to explain the X-ray flux densities. Our data rule out Doppler-boosted inverse Compton scattering as a source of the high-energy emission. Instead, we find that the observed emission can be well described by synchrotron emission from electrons with a low-energy index (p ∼ 2) that dominates the radio band, while a high-energy index (p ∼ 3) is needed for the X-ray band and the transition occurs in the optical/infrared band. This model is consistent with a continuous electron injection scenario.Peer reviewedFinal Accepted Versio
Improving Human Health by Increasing Access to Natural Areas: Linking Research to Action at Scale
Report of the 2014 Berkley Workshop
Held at the Wingspread Conference Center, Johnson Foundation, Racine, Wisconsin - June 201
- …