146 research outputs found

    Quantum correlations and artificial intelligence

    Get PDF
    The possibility of using quantum correlations in the process of exchanging information between artificial intelligence systems has been considered. The benefits of using quantum correlations in such process include: high degree of information protection both on the physical level (electric and magnetic noise does not affect quantum correlations) and on the level of confidentiality preservation of information transmitted (any external interference results in data corruption without information disclosure); the possibility of full automation of information transmission process; the process is dissipation free (which follows from that the quantum correlations are performed between the quantum obj ects described by the same wave function); high speed of information transmission (higher than the speed of light). In this case the special relativity postulate concerning the speed of light is not violated, because it relates to inertial systems only; however, quantum correlation due to being dissipation free is an inertialess process (which follows from the well-known, experimentally-verified relationship between mass m and energy E: E = mc2, where с is the speed of light). Feasible approaches to using quantum correlations for information exchange between artificial intelligence systems have been reviewed in the paper, in particular two versions of information transmission between artificial intelligence systems have been considered: with external synchronization of information transmission time and autonomous synchronization performed by interacting artificial intelligence systems. The main difficulty in implementing information transmission by means of quantum correlations is the necessity of using the so-called entangled quantum objects, that is the quantum objects having some mutually-dependent characteristics of their wave functions

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    Influence of long-range dipolar interactions on the phase stability and hysteresis shapes of ferroelectric and antiferroelectric multilayers

    Get PDF
    Phase transition and field driven hysteresis evolution of a two-dimensional Ising grid consisting of ferroelectric-antiferroelectric multilayers that take into account the long range dipolar interactions were simulated by a Monte-Carlo method. Simulations were carried out for a 1+1 bilayer and a 5+5 superlattice. Phase stabilities of components comprising the structures with an electrostatic-like coupling term were also studied. An electrostatic-like coupling, in the absence of an applied field, can drive the ferroelectric layers towards 180º domains with very flat domain interfaces mainly due to the competition between this term and the dipole-dipole interaction. The antiferroelectric layers do not undergo an antiferroelectric-to-ferroelectric transition under the influence of an electrostatic-like coupling between layers as the ferroelectric layer splits into periodic domains at the expense of the domain wall energy. The long-range interactions become significant near the interfaces. For high periodicity structures with several interfaces, the interlayer long-range interactions substantially impact the configuration of the ferroelectric layers while the antiferroelectric layers remain quite stable unless these layers are near the Neel temperature. In systems investigated with several interfaces, the hysteresis loops do not exhibit a clear presence of antiferroelectricity that could be expected in the presence of anti-parallel dipoles, i. e., the switching takes place abruptly. Some recent experimental observations in ferroelectric-antiferroelectric multilayers are discussed where we conclude that the different electrical properties of bilayers and superlattices are not only due to strain effects alone but also long-range interactions. The latter manifests itself particularly in superlattices where layers are periodically exposed to each other at the interfaces

    SOCIALIZATION OF DIGITAL EDUCATION THROUGH THE ENHANCEMENT OF REMOTE TESTING

    Get PDF
    The article is based on the results of analysis of educational subjects for bachelors of the 1st, 2nd, and 3d years of education in the socio-adapted system of remote training for various management and economic specialization profiles. According to the conducted study, the course units have been determined for which remote training and controlled assessment are justified, the results of electronic testing of students have been summarized, the dynamics of the results has been revealed, the directions of enhancement of testing and testing material development technologies have been shown, the socio-adapted types of test questions have been highlighted, and examples of typical test questions have been provided, recommendations on the method of presentation of educational material have been formulated

    Security analysis of standard authentication and key agreement protocols utilising timestamps

    Get PDF
    We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this technique to two of the most popular models adopted in literature (Bellare-Rogaway and Canetti-Krawczyk). We analyse previous results obtained using these models in light of the proposed extensions, and demonstrate their application to a new class of protocols. In the timed CK model we concentrate on modular design and analysis of protocols, and propose a more efficient timed authenticator relying on timestamps. The structure of this new authenticator implies that an authentication mechanism standardised in ISO-9798 is secure. Finally, we use our timed extension to the BR model to establish the security of an efficient ISO protocol for key transport and unilateral entity authentication

    Order-Revealing Encryption and the Hardness of Private Learning

    Full text link
    An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning from efficient (ϵ,δ)(\epsilon, \delta)-differentially private PAC learning. That is, we construct a concept class that is efficiently PAC learnable, but for which every efficient learner fails to be differentially private. This answers a question of Kasiviswanathan et al. (FOCS '08, SIAM J. Comput. '11). To prove our result, we give a generic transformation from an order-revealing encryption scheme into one with strongly correct comparison, which enables the consistent comparison of ciphertexts that are not obtained as the valid encryption of any message. We believe this construction may be of independent interest.Comment: 28 page

    Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries

    Get PDF
    In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks allow an (honest but curious) adversary (such as the cloud provider) to find the order of the elements in the database and, in some cases, to even reconstruct the database itself. In this paper we present two mitigation techniques to make it harder for the adversary to reconstruct the database. The first technique makes it impossible for an adversary to reconstruct the values stored in the database with an error smaller than k/2k/2, for kk chosen by the client. By fine-tuning kk, the user can increase the adversary\u27s error at will. The second technique is targeted towards adversaries who have managed to learn the distribution of the queries issued. Such adversaries may be able to reconstruct most of the database after seeing a very small (i.e. poly-logarithmic) number of queries. To neutralize such adversaries, our technique turns the database to a circular buffer. All known techniques that exploit knowledge of distribution fail, and no technique can determine which record is first (or last) based on access pattern leakage

    Structural study of alpha-Bi2O3 under pressure

    Get PDF
    An experimental and theoretical study of the structural properties of monoclinic bismuth oxide (alpha-(BiO3)-O-2) under high pressures is here reported. Both synthetic and mineral bismite powder samples have been compressed up to 45 GPa and their equations of state have been determined with angle-dispersive x-ray diffraction measurements. Experimental results have been also compared with theoretical calculations which suggest the possibility of several phase transitions below 10 GPa. However, experiments reveal only a pressure-induced amorphization between 15 and 25 GPa, depending on sample quality and deviatoric stresses. The amorphous phase has been followed up to 45 GPa and its nature discussed.Financial support from the Spanish Consolider Ingenio 2010 Program (MALTA Project No. CSD2007-00045) is acknowledged. This work was also supported by Brazilian Conselho Nacional de Desenvolvimento Cientifico e Tecnologico (CNPq) under project 201050/2012-9, Spanish MICINN under projects MAT2010-21270-C04-01/03/04, Spanish MINECO under project CTQ2012-36253-C03-02, by Generalitat Valenciana through project GVA-ACOMP2013- 012 and from Vicerrectorado de Investigaci on dePereira, ALJ.; Errandonea, D.; Beltrán, A.; Gracia, L.; Gomis Hilario, O.; Sans, JA.; García-Domene, B.... (2013). Structural study of alpha-Bi2O3 under pressure. Journal of Physics: Condensed Matter. 25(47):475402-1-475402-12. https://doi.org/10.1088/0953-8984/25/47/475402S475402-1475402-12254

    Low-Temperature Polymorphic Phase Transition in a Crystalline Tripeptide L-Ala-L-Pro-Gly·H2O Revealed by Adiabatic Calorimetry

    Get PDF
    We demonstrate application of precise adiabatic vacuum calorimetry to observation of phase transition in the tripeptide l-alanyl-l-prolyl-glycine monohydrate (APG) from 6 to 320 K and report the standard thermodynamic properties of the tripeptide in the entire range. Thus, the heat capacity of APG was measured by adiabatic vacuum calorimetry in the above temperature range. The tripeptide exhibits a reversible first-order solid-to-solid phase transition characterized by strong thermal hysteresis. We report the standard thermodynamic characteristics of this transition and show that differential scanning calorimetry can reliably characterize the observed phase transition with <5 mg of the sample. Additionally, the standard entropy of formation from the elemental substances and the standard entropy of hypothetical reaction of synthesis from the amino acids at 298.15 K were calculated for the studied tripeptide.National Institute of Biomedical Imaging and Bioengineering (U.S.) (EB-003151)National Institute of Biomedical Imaging and Bioengineering (U.S.) (EB-001960)National Institute of Biomedical Imaging and Bioengineering (U.S.) (EB-002026
    corecore