Read by QxMD icon Read


Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
Making Elliptic Curve Cryptography (ECC) available for the Internet of Things (IoT) and related technologies is a recent topic of interest. Modern IoT applications transfer sensitive information which needs to be protected. This is a difficult task due to the processing power and memory availability constraints of the physical devices. ECC mainly relies on scalar multiplication ( kP )-which is an operation-intensive procedure. The broad majority of kP proposals in the literature focus on performance improvements and often overlook the energy footprint of the solution...
February 10, 2019: Sensors
Na Yang, Qiankun Gao, Yishi Shi
In this paper, we propose a visual-cryptographic image hiding method based on visual cryptography (VC) and volume grating optics. The secret image is converted to the encrypted visual keys (VKs) according to the normal VC algorithm. Then the VKs are further embellished to the QR-code-like appearance and hidden as the holographic optical elements (HOEs), which are fabricated by the holographic exposure of photopolymer. In the decryption process, the fabricated HOE-VKs are illuminated with the laser beam. The reconstructed VKs are overlaid to extract the hidden information directly in the optical facility, without additional computation...
November 26, 2018: Optics Express
Henry Semenenko, Philip Sibson, Mark G Thompson, Chris Erven
Advances in quantum computing are a rapidly growing threat towards modern cryptography. Quantum key distribution (QKD) provides long-term security without assuming the computational power of an adversary. However, inconsistencies between theory and experiment have raised questions in terms of real-world security, while large and power-hungry commercial systems have slowed wide-scale adoption. Measurement-device-independent QKD (MDI-QKD) provides a method of sharing secret keys that removes all possible detector side-channel attacks which drastically improves security claims...
January 15, 2019: Optics Letters
Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin
A smart grid, considered the next-generation type of power grid, combines a traditional power grid with information and communication technologies to effectively facilitate power generation and ensure transmission security and reliability in real-time. Only authorized consumers should be able to access the smart grid because the information gathered by smart meters includes users' private information. However, smart grid security is still a challenge. Motivated by this challenge, in this paper, we propose a heterogeneous signcryption (HSC) scheme for secure communication between smart meters and the utility...
2018: PloS One
Marco Avesani, Davide G Marangon, Giuseppe Vallone, Paolo Villoresi
Random numbers are commonly used in many different fields, ranging from simulations in fundamental science to security applications. In some critical cases, as Bell's tests and cryptography, the random numbers are required to be both private and to be provided at an ultra-fast rate. However, practical generators are usually considered trusted, but their security can be compromised in case of imperfections or malicious external actions. In this work we introduce an efficient protocol which guarantees security and speed in the generation...
December 18, 2018: Nature Communications
Marie-Christine Roehsner, Joshua A Kettlewell, Tiago B Batalhão, Joseph F Fitzsimons, Philip Walther
One-time programs, computer programs which self-destruct after being run only once, are a powerful building block in cryptography and would allow for new forms of secure software distribution. However, ideal one-time programs have been proved to be unachievable using either classical or quantum resources. Here we relax the definition of one-time programs to allow some probability of error in the output and show that quantum mechanics offers security advantages over purely classical resources. We introduce a scheme for encoding probabilistic one-time programs as quantum states with prescribed measurement settings, explore their security, and experimentally demonstrate various one-time programs using measurements on single-photon states...
December 6, 2018: Nature Communications
Hadiseh Nasari, Matthieu Dupré, Boubacar Kanté
Random media introduce large degrees of freedom in device design and can thus address challenges in manipulating optical waves. Wave shaping with metasurfaces has mainly utilized periodic or quasi-periodic grids, and the potential of random arrangement of particles for devices has only come under investigation recently. The main difficulty in pursuing random metasurfaces is the identification of the degrees of freedom that optimize their efficiencies and functions. They can also encode information using the statistics of particle distribution...
December 1, 2018: Optics Letters
Yan Yu, Nan Zhao
Broadcast and multi-cast communications are two important applications in quantum information science. Such applications guarantee the implementation of quantum information theory. In this paper, we propose two general schemes for the quantum broadcast and multi-cast communications to ensure that the central party (sender) can broadcast arbitrary single-qubit state to multiple receivers synchronously. Moreover, it is guaranteed that the information among the multiple receivers is different to satisfy the requirement in multi-cast communications...
October 29, 2018: Optics Express
Matan Mazor, Noam Mazor, Roy Mukamel
Often researchers wish to mark an objective line between study plans that were specified before data acquisition and decisions that were made following data exploration. Contrary to common perception, registering study plans to an online platform prior to data collection does not by itself provide such an objective distinction, even when the registration is time-stamped. Here we adapt a method from the field of cryptography to allow encoding of study plans and predictions within random aspects of the data acquisition process...
November 21, 2018: European Journal of Neuroscience
Majid Khan, Hafiz Muhammad Waseem
Quantum information processing made a tremendous and remarkable impact on number of classical mechanic's problems. The impact does not only stop at classical mechanics but also the cyber security paradigm. Quantum information and cryptography are two classes of quantum information processing which use the idea of qubits instead of bits as in classical information security. The idea of fast computations with multiple complexity level is becoming more realistic in the age of quantum information due to quantum parallelism where a single quantum computer does allow to compute hundreds of classical computers with less efforts and more accuracy...
2018: PloS One
Zeqi Chen, Jiahai Chen, Meng Chen, Shu-Di Bao
With the increasing demand forinformation interaction and data transmission in medical and healthcare Internet of Things applications, effective and secure transmissions of data become particularly important. To address this problem, this paper focuses on a novel method of secure compressed sensing, which can be readily applied to physiological signals and other kinds of health signals. The method is able to efficiently reduce the sampling data and at the same time secure them without an extra significant computational cost, where a key is bound to the compressed sensing process with a symmetric cryptography design...
July 2018: Conference Proceedings: Annual International Conference of the IEEE Engineering in Medicine and Biology Society
Manuel Suárez-Albela, Paula Fraga-Lamas, Tiago M Fernández-Caramés
The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher layers from part of their computational and data processing requirements. In the specific case of fog computing systems, they reduce greatly the requirements of cloud-centric systems by processing in fog gateways part of the data generated by end devices, thus providing services that were previously offered by a remote cloud. Thanks to recent advances in System-on-Chip (SoC) energy efficiency, it is currently possible to create IoT end devices with enough computational power to process the data generated by their sensors and actuators while providing complex services, which in recent years derived into the development of the mist computing paradigm...
November 10, 2018: Sensors
Weiping Peng, Danhua Cheng, Cheng Song
The security strength of the traditional one-time-pad encryption system depends on the randomness of the secret key. However, It can hardly to generatea truerandom key by using the existing technologies and methods, and it is also difficult to issue and store the random keywhich is at least as long as the plaintext. Therefore, we pay more attention to the logical operation used in the encryption and decryption but not to how to generate the random key. The calculator, a three-dimensional DNA self-assembly pyramid structure, is designed to construct four common logical operations (AND, OR, NOT, XOR) by programming DNA interactions...
2018: PloS One
Liping Zhang, He Luo, Lanchao Zhao, Yixin Zhang
Recently, remote points-of-care as a novel medical model has emerged and received considerable attention due to its convenient medical services such as efficient real-time monitoring and prompt information feedback. Although the points-of-care has more attractive advantages compared with traditional health care systems, some important issues still require a serious consideration such as privacy protection and the security of the transmitted biomedical signals. In this study, we propose a novel authentication and key agreement mechanism that ensures privacy preservation and provides biomedical signals protection during the communication process by negotiating a shared key to encrypt/decrypt sensitive information...
November 3, 2018: Journal of Medical Systems
Pujuan Ma, Lei Gao, Pavel Ginzburg, Roman E Noskov
Bistability is widely exploited to demonstrate all-optical signal processing and light-based computing. The standard paradigm of switching between two steady states corresponding to "0" and "1" bits is based on the rule that a transition occurs when the signal pulse intensity overcomes the bistability threshold, and otherwise, the system remains in the initial state. Here, we break with this concept by revealing the phenomenon of indefinite switching in which the eventual steady state of a resonant bistable system is transformed into a nontrivial function of signal pulse parameters for moderately intense signal pulses...
2018: Light, Science & Applications
Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
BACKGROUND: Security concerns have been raised since big data became a prominent tool in data analysis. For instance, many machine learning algorithms aim to generate prediction models using training data which contain sensitive information about individuals. Cryptography community is considering secure computation as a solution for privacy protection. In particular, practical requirements have triggered research on the efficiency of cryptographic primitives. METHODS: This paper presents a method to train a logistic regression model without information leakage...
October 11, 2018: BMC Medical Genomics
Bin Yan, Yong Xiang, Guang Hua
In visual cryptography (VC) for grayscale image, size reduction leads to bad perceptual quality to the reconstructed secret image. To improve the quality, the current efforts are limited to the design of VC algorithm for binary image, and measuring the quality with metrics that are not directly related to how the human visual system (HVS) perceives halftone images. We propose an analysis-by-synthesis (AbS) framework to integrate the halftoning process and the VC encoding: the secret pixel/block is reconstructed from the shares in the encoder and the error between the reconstructed secret and the original secret images is fed back and compensated concurrently by the error diffusion process...
October 8, 2018: IEEE Transactions on Image Processing: a Publication of the IEEE Signal Processing Society
P Frigerio Parenza, D Amaya, Ó Martínez-Matos, P Vaveliuk
Nonsymmetric curved beams having a symmetric caustic skeleton are presented. They arise from a finite jump in the symmetric spectral phase that breaks the symmetry of the beam intensity without altering its associated caustic curve. These nonsymmetric beams can be represented as a superposition of two caustic beams whose wave fields have well-defined even and odd symmetries with weight coefficients dependent on the phase jump. In this approach, the phase jump acts as a measure of the beam asymmetry degree that can be easily controlled in experiments...
September 1, 2018: Optics Letters
Alicia Sit, Robert Fickler, Fatimah Alsaiari, Frédéric Bouchard, Hugo Larocque, Patrick Gregg, Lu Yan, Robert W Boyd, Siddharth Ramachandran, Ebrahim Karimi
Optical fiber links and networks are integral components within and between cities' communication infrastructures. Implementing quantum cryptographic protocols on either existing or new fiber links will provide information-theoretical security to fiber data transmissions. However, there is a need for ways to increase the channel bandwidth. Using the transverse spatial degree of freedom is one way to transmit more information and increase tolerable error thresholds by extending the common qubit protocols to high-dimensional quantum key distribution (QKD) schemes...
September 1, 2018: Optics Letters
Marcone Pereira de Almeida, Rafael Timóteo de Sousa Júnior, Luis Javier García Villalba, Tai-Hoon Kim
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention. Our scheme does not rely on an expensive public-key infrastructure and makes use of light cryptography machinery that is suitable in the context of the Internet of Things (IoT)...
August 26, 2018: Sensors
Fetch more papers »
Fetching more papers... Fetching...
Read by QxMD. Sign in or create an account to discover new knowledge that matter to you.
Remove bar
Read by QxMD icon Read

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"