772 research outputs found

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties, while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use-cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realisation of a quantum fully homomorphic encryption scheme. We further present a toy two-party secure computation task enabled by our scheme. Finally, as part of our implementation, we also demonstrate a post-selective two-qubit linear optical controlled-phase gate with a much higher post-selection success probability (1/2) when compared to alternate implementations, e.g. with post-selective controlled-ZZ or controlled-XX gates (1/9).Comment: 11 pages, 16 figures, 2 table

    A Field Test Study on under Water Vacuum Preloading Method

    Get PDF
    Vacuum preloading technique incorporating prefabricated vertical drains is one of the most widely used ground improvement methods in the world for improving the engineering properties of soft clays. Although many successful on-shore cases on application of the technique have been reported, the effectiveness of applying the technique under water has not yet been investigated. Moreover, many technical and operation factors, that are playing important roles in vacuum consolidation, are also not yet fully understood. To study the feasibility of under water vacuum preloading, a large-scale field test was conducted. A 50 m by 50 m geo-membrane was laid under water in an 80 m wide by 100 m long pond. The geo-membrane was custom made with drainage outlet pipes to release the trapped air bubbles during the placement under water. Prefabricated vertical drains were installed on an equilateral triangular grid at a spacing of 1.2 m to a depth of 7 m. Internal drainage pipes were provided in the sand cushion layers to provide a passage for the prefabricated vertical drains with the external vacuum pumps. Instruments such as piezometers, vacuum sensors, inclinometers, settlement plates and extensometers were installed to monitor the performance of the system. An automatic and remote wireless monitoring system was installed for data collection because of difficult access. Vane shear tests and cone penetration tests were conducted before and after vacuum preloading to determine the effectiveness of the operation. This paper documents the constructions of the field test and reports the major observations from the monitored readings. The operation has demonstrated that under water vacuum preloading is feasible and that with proper design and construction procedure, a very tight seal can be provided by the geo-membrane separating the water and the underlying prefabricated vertical drains through out the test. The monitored results demonstrate that the stiffness and strength of the soft clay can be improved effectively

    Transmission electron microscopical studies of the layered structure of the ternary semiconductor CuIn<sub>5</sub>Se<sub>8</sub>

    Get PDF
    The structure of the off-stoichiometric In-rich ternary phase CuIn5Se8 was studied by means of electron diffraction and high-resolution electron microscopy. The compound shows a layered structure with a 7-layer stacking sequence of closed-packed planes, which contains both cubic and hexagonal stacking of Se atoms. The studied CuIn5Se8 bulk crystal is known as the b-phase of this compound

    Stronger limits on hypothetical Yukawa interactions in the 40--8000 nm range

    Get PDF
    We report the results of new differential force measurements between a test mass and rotating source masses of gold and silicon to search for forces beyond Newtonian gravity at short separations. The technique employed subtracts the otherwise dominant Casimir force at the outset and, when combined with a lock-in amplification technique, leads to a significant improvement (up to a factor 10310^{3}) over existing limits on the strength (relative to gravity) of a putative force in the 40--8000 nm interaction range.Comment: New version, 5 pages, 5 figures. Accepted in Physical Review Letter

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme

    Line defects in epitaxial silicon films grown at 560 C

    Get PDF
    We present an investigation of line defects in epitaxially grown silicon layers using Secco defect etching and transmission electron microscopy TEM . 1 m thick layers were deposited onto Si 100 wafers at a substrate temperature of 560 C using electron cyclotron resonance chemical vapour deposition ECRCVD . Defect etching reveals a variety of etch pits related to extended defects. A detailed analysis of the orientations and shapes of etch pits related to line defects is carried out. Using this information it is then possible to assign different types of etch pits to line defects observed by TEM. The investigations show, that one type of defect are extended dislocations parallel to lt;112 gt;, while the direction of two other types are lt;110 gt; as well as lt;314 gt;, a direction uncommon for line defects in silico

    Synthesis, biological evaluation and QSAR studies of diarylpentanoid analogues as potential nitric oxide inhibitors

    Get PDF
    A series of forty-five 1,5-diphenylpenta-2,4-dien-1-one analogues were synthesized and evaluated for their nitric oxide (NO) inhibition activity in IFN-γ/LPS-activated RAW 264.7 cells. Compounds 3h, 7a, 7d and 7e exhibited comparable or significantly higher activity than the standard, curcumin (IC50 = 14.69 ± 0.24 μM). Compound 7d, a 5-methylthiophenyl-bearing analogue, displayed the most promising NO-inhibitory activity with an IC50 value of 10.24 ± 0.62 μM. The 2D and 3D QSAR analyses performed revealed that a para-hydroxyl group on ring B and an α,β-unsaturated ketone moiety on the linker are crucial for a remarkable anti-inflammatory activity. Based on ADMET and TOPKAT analyses, compounds 3h, 7a and 7d are predicted to be nonmutagenic and to exhibit high blood–brain barrier (BBB) penetration, which indicates that they are potentially effective drug candidates for treating central nervous system (CNS) related disorders
    corecore