3,333 research outputs found

    Boneh-Franklin Identity Based Encryption Revisited

    Get PDF
    Contains fulltext : 33216.pdf (preprint version ) (Open Access

    Quantum private queries

    Full text link
    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the server in possession of the database without revealing which item she retrieved: if the server tries to obtain information on the query, the person querying the database can find it out. Furthermore our protocol ensures perfect data privacy of the database, i.e. the information that the user can retrieve in a single queries is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction both in communication complexity and in running-time computational complexity.Comment: 4 pages, 1 figur

    Socioeconomic indicators of health inequalities and female mortality: a nested cohort study within the United Kingdom Collaborative Trial of Ovarian Cancer Screening (UKCTOCS)

    Get PDF
    Evidence is mounting that area-level socioeconomic indicators are important tools for predicting health outcomes. However, few studies have examined these alongside individual-level education. This nested cohort study within the control arm of the United Kingdom Collaborative Trial of Ovarian Cancer Screening (UKCTOCS) assesses the association of mutually adjusted individual (education) and area-level (Index of Multiple Deprivation-IMD 2007) socioeconomic status indicators and all-cause female mortality

    HardIDX: Practical and Secure Index with SGX

    Get PDF
    Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that are not specifically tailored to the hardware architecture, and are rarely well analyzed for their security (e.g., the impact of side channels). Additionally, existing hardware-based solutions often have a large code footprint in the trusted environment susceptible to software compromises. In this paper we present HardIDX: a hardware-based approach, leveraging Intel's SGX, for search over encrypted data. It implements only the security critical core, i.e., the search functionality, in the trusted environment and resorts to untrusted software for the remainder. HardIDX is deployable as a highly performant encrypted database index: it is logarithmic in the size of the index and searches are performed within a few milliseconds rather than seconds. We formally model and prove the security of our scheme showing that its leakage is equivalent to the best known searchable encryption schemes. Our implementation has a very small code and memory footprint yet still scales to virtually unlimited search index sizes, i.e., size is limited only by the general - non-secure - hardware resources

    Unconditionally verifiable blind computation

    Get PDF
    Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol, or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. The authors, together with Broadbent, previously proposed a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with new functionality allowing blind computational basis measurements, which we use to construct a new verifiable BQC protocol based on a new class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. The new resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest neighbour form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.Comment: 46 pages, 10 figures. Additional protocol added which allows arbitrary circuits to be verified with polynomial securit

    A fast single server private information retrieval protocol with low communication cost

    Get PDF
    Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be practical, a single server PIR protocol has to be both communicationally and computationally efficient. In this paper, we present a single server PIR protocol that has low communication cost and is much faster than existing protocols. A major building block of the PIR protocol in this paper is a tree-based compression scheme, which we call folding/unfolding. This compression scheme enables us to lower the communication complexity to O(loglogn). The other major building block is the BGV fully homomorphic encryption scheme. We show how we design the protocol to exploit the internal parallelism of the BGV scheme. This significantly reduces the server side computational overhead and makes our protocol much faster than the existing protocols. Our protocol can be further accelerated by utilising hardware parallelism. We have built a prototype of the protocol. We report on the performance of our protocol based on the prototype and compare it with the current most efficient protocols

    An investigation of the existence of a surface water layer on aircraft radomes during simulated flight in heavy precipitation

    Get PDF
    An experiment to investigate the electromagnetic attenuation effects of an impacting water spray on an aircraft weather radome was conducted in Langley's 4 X 7 m. wind tunnel equipped with a water spray system. Results indicate no significant liquid water film formed at the stagnation point of the radome under the test conditions. However, a water sheath was observed standing away from the radome surface, which could possibly have significant attenuation properties of its own. Due to the lack of fidelity in modeling both the natural environment with the tunnel apparatus and the water sheath, it is recommended that further studies be undertaken to better define the water distribution in the vicinity of the radome and measure its effect on weather radar performance

    Optical detection of the Pictor A jet and tidal tail : evidence against an IC/CMB jet

    Get PDF
    Date of Acceptance: 12/06/2015New images of the FR II radio galaxy Pictor A from the Hubble Space Telescope reveal a previously undiscovered tidal tail, as well as a number of jet knots coinciding with a known X-ray and radio jet. The tidal tail is approximately 5″ wide (3 kpc projected), starting 18″ (12 kpc) from the center of Pictor A, and extends more than 90″ (60 kpc). The knots are part of a jet observed to be about 4′ (160 kpc) long, extending to a bright hotspot. These images are the first optical detections of this jet, and by extracting knot flux densities through three filters, we set constraints on emission models. While the radio and optical flux densities are usually explained by synchrotron emission, there are several emission mechanisms that might be used to explain the X-ray flux densities. Our data rule out Doppler-boosted inverse Compton scattering as a source of the high-energy emission. Instead, we find that the observed emission can be well described by synchrotron emission from electrons with a low-energy index (p ∼ 2) that dominates the radio band, while a high-energy index (p ∼ 3) is needed for the X-ray band and the transition occurs in the optical/infrared band. This model is consistent with a continuous electron injection scenario.Peer reviewedFinal Accepted Versio

    Improving Human Health by Increasing Access to Natural Areas: Linking Research to Action at Scale

    Get PDF
    Report of the 2014 Berkley Workshop Held at the Wingspread Conference Center, Johnson Foundation, Racine, Wisconsin - June 201
    corecore