Search results for "cryptography"

showing 10 items of 657 documents

Quantum lower bound for inverting a permutation with advice

2014

Given a random permutation $f: [N] \to [N]$ as a black box and $y \in [N]$, we want to output $x = f^{-1}(y)$. Supplementary to our input, we are given classical advice in the form of a pre-computed data structure; this advice can depend on the permutation but \emph{not} on the input $y$. Classically, there is a data structure of size $\tilde{O}(S)$ and an algorithm that with the help of the data structure, given $f(x)$, can invert $f$ in time $\tilde{O}(T)$, for every choice of parameters $S$, $T$, such that $S\cdot T \ge N$. We prove a quantum lower bound of $T^2\cdot S \ge \tilde{\Omega}(\epsilon N)$ for quantum algorithms that invert a random permutation $f$ on an $\epsilon$ fraction of…

FOS: Computer and information sciencesNuclear and High Energy PhysicsComputer Science - Cryptography and SecurityGeneral Physics and AstronomyFOS: Physical sciencesOne-way functionComputational Complexity (cs.CC)Upper and lower boundsTheoretical Computer ScienceCyclic permutationCombinatoricsPermutationMathematical PhysicsMathematicsDiscrete mathematicsQuantum PhysicsBit-reversal permutationStatistical and Nonlinear PhysicsRandom permutationComputer Science - Computational ComplexityComputational Theory and MathematicsQuantum algorithmQuantum Physics (quant-ph)Advice (complexity)Cryptography and Security (cs.CR)MathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Security of public key cryptosystems based on Chebyshev Polynomials

2004

Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries …

FOS: Computer and information sciencesPlaintext-aware encryptionTheoretical computer scienceComputer Science - Cryptography and SecurityCramer–Shoup cryptosystemData_CODINGANDINFORMATIONTHEORYDeterministic encryptionHybrid cryptosystemCryptosystemElectrical and Electronic EngineeringSemantic securityThreshold cryptosystemCryptography and Security (cs.CR)Goldwasser–Micali cryptosystemMathematics
researchProduct

Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding

2014

Quantum zero-knowledge proofs and quantum proofs of knowledge are inherently difficult to analyze because their security analysis uses rewinding. Certain cases of quantum rewinding are handled by the results by Watrous (SIAM J Comput, 2009) and Unruh (Eurocrypt 2012), yet in general the problem remains elusive. We show that this is not only due to a lack of proof techniques: relative to an oracle, we show that classically secure proofs and proofs of knowledge are insecure in the quantum setting. More specifically, sigma-protocols, the Fiat-Shamir construction, and Fischlin's proof system are quantum insecure under assumptions that are sufficient for classical security. Additionally, we show…

FOS: Computer and information sciencesQuantum PhysicsQuantum networkComputer Science - Cryptography and SecurityTheoretical computer scienceFOS: Physical sciencesQuantum capacityQuantum cryptographyQuantum error correctionQuantum algorithmQuantum informationQuantum Physics (quant-ph)Cryptography and Security (cs.CR)Quantum computerQuantum complexity theoryMathematicsComputer Science::Cryptography and Security
researchProduct

Blockchain-Based Proof of Location

2016

Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.

FOS: Computer and information sciencesScheme (programming language)Computer Science - Cryptography and SecurityBlockchainbusiness.industryComputer science020206 networking & telecommunicationsCryptographyContext (language use)02 engineering and technologyComputer securitycomputer.software_genreUser privacyTrustworthinessComputer Science - Distributed Parallel and Cluster Computing020204 information systemsServerC.2.40202 electrical engineering electronic engineering information engineeringPeer to peer computingDistributed Parallel and Cluster Computing (cs.DC)businessCryptography and Security (cs.CR)computercomputer.programming_language2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
researchProduct

Large-scale compression of genomic sequence databases with the Burrows-Wheeler transform

2012

Motivation The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for compression and indexing of text data, but the cost of computing the BWT of very large string collections has prevented these techniques from being widely applied to the large sets of sequences often encountered as the outcome of DNA sequencing experiments. In previous work, we presented a novel algorithm that allows the BWT of human genome scale data to be computed on very moderate hardware, thus enabling us to investigate the BWT as a tool for the compression of such datasets. Results We first used simulated reads to explore the relationship between the level of compression and the error rate, the leng…

FOS: Computer and information sciencesStatistics and ProbabilityBurrows–Wheeler transformComputer scienceData_CODINGANDINFORMATIONTHEORYBurrows-Wheeler transformcomputer.software_genreBiochemistryBurrows-Wheeler transform; Data Compression; Next-generation sequencingComputer Science - Data Structures and AlgorithmsEscherichia coliCode (cryptography)HumansOverhead (computing)Data Structures and Algorithms (cs.DS)Computer SimulationQuantitative Biology - GenomicsMolecular BiologyGenomics (q-bio.GN)Genome HumanString (computer science)Search engine indexingSortingGenomicsSequence Analysis DNAConstruct (python library)Data CompressionComputer Science ApplicationsComputational MathematicsComputational Theory and MathematicsFOS: Biological sciencesNext-generation sequencingData miningDatabases Nucleic AcidcomputerAlgorithmsData compression
researchProduct

Ethically Aligned Design: An empirical evaluation of the RESOLVEDD-strategy in Software and Systems development context

2019

Use of artificial intelligence (AI) in human contexts calls for ethical considerations for the design and development of AI-based systems. However, little knowledge currently exists on how to provide useful and tangible tools that could help software developers and designers implement ethical considerations into practice. In this paper, we empirically evaluate a method that enables ethically aligned design in a decision-making process. Though this method, titled the RESOLVEDD-strategy, originates from the field of business ethics, it is being applied in other fields as well. We tested the RESOLVEDD-strategy in a multiple case study of five student projects where the use of ethical tools was…

FOS: Computer and information sciencesSystem developmentComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryComputer scienceProcess (engineering)050901 criminology05 social sciences020207 software engineeringContext (language use)02 engineering and technologyField (computer science)Computer Science - Computers and SocietySoftwareComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringKey (cryptography)Engineering ethics0509 other social sciencesBusiness ethicsbusinessDesign methods
researchProduct

Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations

2017

Designing a pseudorandom number generator (PRNG) is a difficult and complex task. Many recent works have considered chaotic functions as the basis of built PRNGs: the quality of the output would indeed be an obvious consequence of some chaos properties. However, there is no direct reasoning that goes from chaotic functions to uniform distribution of the output. Moreover, embedding such kind of functions into a PRNG does not necessarily allow to get a chaotic output, which could be required for simulating some chaotic behaviors. In a previous work, some of the authors have proposed the idea of walking into a $\mathsf{N}$-cube where a balanced Hamiltonian cycle has been removed as the basis o…

FOS: Computer and information sciencesUniform distribution (continuous)Computer Science - Cryptography and SecurityComputer scienceHamiltonian CycleChaoticPseudorandom Numbers GeneratorFOS: Physical sciences02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesUpper and lower bounds[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computingsymbols.namesake[INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringApplied mathematics[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]0101 mathematicsEngineering (miscellaneous)Pseudorandom number generatorChaotic IterationsBasis (linear algebra)Applied Mathematics020208 electrical & electronic engineering010102 general mathematicsRandom walkNonlinear Sciences - Chaotic DynamicsHamiltonian path[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationNonlinear Sciences::Chaotic Dynamics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Modeling and SimulationRandom Walk[NLIN.NLIN-CD]Nonlinear Sciences [physics]/Chaotic Dynamics [nlin.CD]symbolsPseudo random number generator[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Chaotic Dynamics (nlin.CD)[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Cryptography and Security (cs.CR)
researchProduct

Implementing AI Ethics in Practice: An Empirical Evaluation of the RESOLVEDD Strategy

2020

As Artificial Intelligence (AI) systems exert a growing influence on society, real-life incidents begin to underline the importance of AI Ethics. Though calls for more ethical AI systems have been voiced by scholars and the general public alike, few empirical studies on the topic exist. Similarly, few tools and methods designed for implementing AI ethics into practice currently exist. To provide empirical data into this on-going discussion, we empirically evaluate an existing method from the field of business ethics, the RESOLVEDD strategy, in the context of ethical system development. We evaluated RESOLVEDD by means of a multiple case study of five student projects where its use was given …

FOS: Computer and information sciencesjärjestelmäsuunnitteluUnderlineComputingMilieux_THECOMPUTINGPROFESSIONethical toolContext (language use)Ai ethicstekoälykäytäntöartificial intelligenceethicsField (computer science)developer commitmentComputer Science - Computers and SocietyEmpirical researchdesign methodsComputers and Society (cs.CY)Key (cryptography)RESOLVEDDEngineering ethicsBusiness ethicsetiikkaDesign methodsPsychology
researchProduct

A standard conceptual framework for the study of subjective time.

2019

Research on the mental representation of time ('subjective time') has provided broad insights into the nature of time perception and temporal processing. As the field comprises different scientific disciplines, such as psychology, philosophy, and neuroscience, studies differ with regard to the basic terms and concepts used. For this reason, research on subjective time lacks a coherent conceptual system. We argue that research in the field of subjective time should aim at establishing such a system, i.e., a more standardized terminology, in order to strengthen its theoretical basis and to support an efficient communication of results. Based on key empirical findings and concepts that are com…

Field (Bourdieu)05 social sciencesExperimental and Cognitive PsychologyTime perception050105 experimental psychology03 medical and health sciences0302 clinical medicineArts and Humanities (miscellaneous)Conceptual frameworkDuration (philosophy)Order (exchange)Time PerceptionDevelopmental and Educational PsychologyConceptual systemKey (cryptography)Mental representationHumans0501 psychology and cognitive sciencesPsychology030217 neurology & neurosurgeryCognitive psychologyConsciousness and cognition
researchProduct

Direct Compensation and Risk Management: A Key Study from the Insurance Sector

2019

This paper examines the business model of an Italian company (TIS) that manage the claims for non-life insurance companies with innovative solutions. When a policy-holder make a claim for a loss or damage, the insurer may decide either to repair, rebuild or replace the property or to offer a cash settlement. To provide these services, many insurance companies have started developing strategic relationships directly with building firms, repairers, specialist suppliers and project managers, in order to find reliable contractors that will repair or replace the policy holder’s property quickly, with high quality and at a low cost. Opposite to other EU Countries, in Italy many insurance companie…

FinanceRisk Managementbusiness.industryCompensation (psychology)media_common.quotation_subjectinsurance sector.Direct CompensationComputingMilieux_LEGALASPECTSOFCOMPUTINGRisk Management Direct Compensation InsuranceBusiness modelcase studyInsuranceSettore SECS-P/07 - Economia AziendaleOrder (exchange)CashKey (cryptography)Quality (business)Settlement (trust)BusinessRisk managementmedia_common
researchProduct