2,470 research outputs found
Quantum protocols for anonymous voting and surveying
We describe quantum protocols for voting and surveying. A key feature of our
schemes is the use of entangled states to ensure that the votes are anonymous
and to allow the votes to be tallied. The entanglement is distributed over
separated sites; the physical inaccessibility of any one site is sufficient to
guarantee the anonymity of the votes. The security of these protocols with
respect to various kinds of attack is discussed. We also discuss classical
schemes and show that our quantum voting protocol represents a N-fold reduction
in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio
Absorption spectra of Fe L-lines in Seyfert 1 galaxies
Absorption L-lines of iron ions are observed, in absorption, in spectra of
Seyfert 1 galaxies by the new generation of X-ray satellites: Chandra (NASA)
and XMM-Newton (ESA). Lines associated to Fe23+ to Fe17+ are well resolved.
Whereas, those corresponding to Fe16+ to Fe6+ are unresolved. Forbidden
transitions of the Fe16+ to Fe6+ ions were previously observed, for the same
objects, in the visible and infra-red regions, showing that the plasma had a
low density. To interpret X-ray, visible and infra-red data, astrophysical
models assume an extended absorbing medium of very low density surrounding an
intense X-ray source. We have calculated atomic data (wavelengths, radiative
and autoionization rates) for n=2 to n'=3-4 transitions and used them to
construct refined synthetic spectra of the unresolved part of the L-line
spectra.Comment: 17 pages, 5 figures, Journal of Quantitative Spectroscopy and
Radiative Transfer, in pres
Resolved 24.5 micron emission from massive young stellar objects
Massive young stellar objects (MYSO) are surrounded by massive dusty
envelopes. Our aim is to establish their density structure on scales of ~1000
AU, i.e. a factor 10 increase in angular resolution compared to similar studies
performed in the (sub)mm. We have obtained diffraction-limited (0.6") 24.5
micron images of 14 well-known massive star formation regions with
Subaru/COMICS. The images reveal the presence of discrete MYSO sources which
are resolved on arcsecond scales. For many sources, radiative transfer models
are capable of satisfactorily reproducing the observations. They are described
by density powerlaw distributions (n(r) ~ r^(-p)) with p = 1.0 +/-0.25. Such
distributions are shallower than those found on larger scales probed with
single-dish (sub)mm studies. Other sources have density laws that are
shallower/steeper than p = 1.0 and there is evidence that these MYSOs are
viewed near edge-on or near face-on, respectively. The images also reveal a
diffuse component tracing somewhat larger scale structures, particularly
visible in the regions S140, AFGL 2136, IRAS 20126+4104, Mon R2, and Cep A. We
thus find a flattening of the MYSO envelope density law going from ~10 000 AU
down to scales of ~1000 AU. We propose that this may be evidence of rotational
support of the envelope (abridged).Comment: 21 pages, accepted for A&
Polar Field Reversal Observations with Hinode
We have been monitoring yearly variation in the Sun's polar magnetic fields
with the Solar Optical Telescope aboard {\it Hinode} to record their evolution
and expected reversal near the solar maximum. All magnetic patches in the
magnetic flux maps are automatically identified to obtain the number density
and magnetic flux density as a function of th total magnetic flux per patch.
The detected magnetic flux per patch ranges over four orders of magnitude
( -- Mx). The higher end of the magnetic flux in the polar
regions is about one order of magnitude larger than that of the quiet Sun, and
nearly that of pores. Almost all large patches ( Mx) have the
same polarity, while smaller patches have a fair balance of both polarities.
The polarity of the polar region as a whole is consequently determined only by
the large magnetic concentrations. A clear decrease in the net flux of the
polar region is detected in the slow rising phase of the current solar cycle.
The decrease is more rapid in the north polar region than in the south. The
decrease in the net flux is caused by a decrease in the number and size of the
large flux concentrations as well as the appearance of patches with opposite
polarity at lower latitudes. In contrast, we do not see temporal change in the
magnetic flux associated with the smaller patches ( Mx) and that of
the horizontal magnetic fields during the years 2008--2012.Comment: 21 pages, 7 figures. Accepted for publication in Ap
Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols
Code voting was introduced by Chaum as a solution for using a possibly
infected-by-malware device to cast a vote in an electronic voting application.
Chaum's work on code voting assumed voting codes are physically delivered to
voters using the mail system, implicitly requiring to trust the mail system.
This is not necessarily a valid assumption to make - especially if the mail
system cannot be trusted. When conspiring with the recipient of the cast
ballots, privacy is broken.
It is clear to the public that when it comes to privacy, computers and
"secure" communication over the Internet cannot fully be trusted. This
emphasizes the importance of using: (1) Unconditional security for secure
network communication. (2) Reduce reliance on untrusted computers.
In this paper we explore how to remove the mail system trust assumption in
code voting. We use PSMT protocols (SCN 2012) where with the help of visual
aids, humans can carry out addition correctly with a 99\% degree of
accuracy. We introduce an unconditionally secure MIX based on the combinatorics
of set systems.
Given that end users of our proposed voting scheme construction are humans we
\emph{cannot use} classical Secure Multi Party Computation protocols.
Our solutions are for both single and multi-seat elections achieving:
\begin{enumerate}[i)]
\item An anonymous and perfectly secure communication network secure against
a -bounded passive adversary used to deliver voting,
\item The end step of the protocol can be handled by a human to evade the
threat of malware. \end{enumerate} We do not focus on active adversaries
- …