984 resultados para Quantum Key Distribution
Resumo:
Securing group communication in wireless sensor networks has recently been extensively investigated. Many works have addressed this issue, and they have considered the grouping concept differently. In this paper, we consider a group as being a set of nodes sensing the same data type, and we alternatively propose an efficient secure group communication scheme guaranteeing secure group management and secure group key distribution. The proposed scheme (RiSeG) is based on a logical ring architecture, which permits to alleviate the group controller’s task in updating the group key. The proposed scheme also provides backward and forward secrecy, addresses the node compromise attack, and gives a solution to detect and eliminate the compromised nodes. The security analysis and performance evaluation show that the proposed scheme is secure, highly efficient, and lightweight. A comparison with the logical key hierarchy is preformed to prove the rekeying process efficiency of RiSeG. Finally, we present the implementation details of RiSeG on top of TelosB sensor nodes to demonstrate its feasibility.
Resumo:
As empresas estão participando de um mercado cada vez mais competitivo. Esta disputa acirrada das empresas pelos clientes tem propiciado canais alternativos de distribuição dos produtos aos diferentes segmentos de mercado. Os canais de distribuição estão adquirindo uma importância cada vez maior aos olhos dos fabricantes e dos clientes, principalmente na questão de serviços. De acordo com Ballou (2001, p.44), “o serviço ao cliente, inclui disponibilidade de estoques, rapidez na entrega, rapidez e acuracidade no preenchimento de pedidos”. A esses serviços pode ser somada uma gama variada de outros serviços a serem prestados pelos participantes do canal de distribuição ou pelos fabricantes. A empresa Ravel Produtos Cosméticos e Dermatológicos será a principal usuária dos resultados obtidos com este estudo, pois é fabricante de produtos cosméticos e tem seu foco de atuação principal na cidade de Porto Alegre. O objetivo deste trabalho foi analisar o canal de distribuição para produtos cosméticos destinados a consumidores de alta renda no mercado de Porto Alegre, procurando identificar os aspectos de serviços demandados, produtos utilizados e mix de produtos comercializados pelo canal de distribuição: salões de beleza. O estudo foi realizado através de pesquisa qualitativa, com entrevistas individuais junto aos proprietários dos salões, ou junto às pessoas que decidem o mix de produtos a ser utilizado ou comercializado pelos salões. O mix de produtos comercializados pelos salões de beleza em Porto Alegre conforme a pesquisa realizada, é o seguinte: xampus, cremes, máscaras, hidratantes, fluidos e géis. Entre as respostas das entrevistas, foram encontrados os seguintes serviços demandados pelos salões de beleza: amostras de produtos, entregas rápidas, frete cif, suporte técnico do fabricante, prazos elásticos de pagamento e exclusividade como canal de distribuição para as linhas que comercializa.
Resumo:
Dynamic conferencing refers to a scenario wherein any subset of users in a universe of users form a conference for sharing confidential information among themselves. The key distribution (KD) problem in dynamic conferencing is to compute a shared secret key for such a dynamically formed conference. In literature, the KD schemes for dynamic conferencing either are computationally unscalable or require communication among users, which is undesirable. The extended symmetric polynomial based dynamic conferencing scheme (ESPDCS) is one such KD scheme which has a high computational complexity that is universe size dependent. In this paper we present an enhancement to the ESPDCS scheme to develop a KD scheme called universe-independent SPDCS (UI-SPDCS) such that its complexity is independent of the universe size. However, the UI-SPDCS scheme does not scale with the conference size. We propose a relatively scalable KD scheme termed as DH-SPDCS that uses the UI-SPDCS scheme and the tree-based group Diffie- Hellman (TGDH) key exchange protocol. The proposed DH-SPDCS scheme provides a configurable trade-off between computation and communication complexity of the scheme.
Resumo:
Reticulados têm sido aplicados de diferentes maneiras em criptografia. Inicialmente utilizados para a destruição de criptossistemas, eles foram posteriormente aplicados na construção de novos esquemas, incluindo criptossistemas assimétricos, esquemas de assinatura cega e os primeiros métodos para encriptação completamente homomórfica. Contudo, seu desempenho ainda é proibitivamente lenta em muitos casos. Neste trabalho, expandimos técnicas originalmente desenvolvidas para encriptação homomórfica, tornando-as mais genéricas e aplicando-as no esquema GGH-YK-M, um esquema de encriptação de chave pública, e no esquema LMSV, a única construção homomórfica que não sucumbiu a ataques de recuperação de chaves IND-CCA1 até o momento. Em nossos testes, reduzimos o tamanho das chaves do GGH-YK-M em uma ordem de complexidade, especificamente, de O(n2 lg n) para O(n lg n), onde n é um parâmetro público do esquema. A nova técnica também atinge processamento mais rápido em todas as operações envolvidas em um criptossistema assimétrico, isto é, geração de chaves, encriptação e decriptação. A melhora mais significativa é na geração de chaves, que se torna mais de 3 ordens de magnitude mais rápida que resultados anteriores, enquanto a encriptação se torna por volta de 2 ordens de magnitude mais rápida. Para decriptação, nossa implementação é dez vezes mais rápida que a literatura. Também mostramos que é possível aumentar a segurança do esquema LMSV contra os ataques quânticos de recuperação de chaves recentemente publicados pela agência britânica GCHQ. Isso é feito através da adoção de reticulados não-ciclotômicos baseados em anéis polinomiais irredutíveis quase-circulantes. Em nossa implementação, o desempenho da encriptação é virtualmente idêntico, e a decriptação torna-se ligeiramente inferior, um pequeno preço a se pagar pelo aumento de segurança. A geração de chaves, porém, é muito mais lenta, devido à necessidade de se utilizar um método mais genérico e caro. A existência de métodos dedicados altamente eficientes para a geração de chaves nesta variante mais segura do LMSV permanece como um problema em aberto.
Resumo:
Abstract There has been a great deal of interest in the area of cyber security in recent years. But what is cyber security exactly? And should society really care about it? We look at some of the challenges of being an academic working in the area of cyber security and explain why cyber security is, to put it rather simply, hard! Speaker Biography Keith Martin Prof. Keith Martin is Professor of Information Security at Royal Holloway, University of London. He received his BSc (Hons) in Mathematics from the University of Glasgow in 1988 and a PhD from Royal Holloway in 1991. Between 1992 and 1996 he held a Research Fellowship at the University of Adelaide, investigating mathematical modelling of cryptographic key distribution problems. In 1996 he joined the COSIC research group of the Katholieke Universiteit Leuven in Belgium, working on security for third generation mobile communications. Keith rejoined Royal Holloway in January 2000, became a Professor in Information Security in 2007 and was Director of the Information Security Group between 2010 and 2015. Keith's research interests range across cyber security, but with a focus on cryptographic applications. He is the author of 'Everyday Cryptography' published by Oxford University Press.
Resumo:
The skin is a large and accessible area of the body, offering the possibility to be used as an alternative route for drug delivery. In the last few years strong progress has been made on the developing of nanoparticulate systems for specific applications. The interaction of such small particles with human skin and their possible penetration attracted some interest from toxicological as well as from drug delivery perspectives. As size is assumed to play a key role, the aim of the present work was to investigate the penetration profile of very small model particles (similar to 4 nm) into excised human skin under conditions chosen to mimic the in vivo situation. Possible application procedures such as massaging the formulation (5 to 10 minutes) were analyzed by non-invasive multiphoton- and confocal laser scanning microscopy (MPM, CLSM). Furthermore, the application on damaged skin was taken into account by deliberately removing parts of the stratum corneum. Although it was clearly observed that the mechanical actions affected the distribution pattern of the QDs on the skin surface, there was no evidence of penetration into the skin in all cases tested. QDs could be found in deeper layers only after massaging of damaged skin for 10 min. Taking these data into account, obtained on the gold standard human skin, the potential applications of nanoparticulate systems to act as carrier delivering drugs into intact skin might be limited and are only of interest for partly damaged skin.
Resumo:
We consider the statistical properties of the local density of states of a one-dimensional Dirac equation in the presence of various types of disorder with Gaussian white-noise distribution. It is shown how either the replica trick or supersymmetry can be used to calculate exactly all the moments of the local density of states.' Careful attention is paid to how the results change if the local density of states is averaged over atomic length scales. For both the replica trick and supersymmetry the problem is reduced to finding the ground state of a zero-dimensional Hamiltonian which is written solely in terms of a pair of coupled spins which are elements of u(1, 1). This ground state is explicitly found for the particular case of the Dirac equation corresponding to an infinite metallic quantum wire with a single conduction channel. The calculated moments of the local density of states agree with those found previously by Al'tshuler and Prigodin [Sov. Phys. JETP 68 (1989) 198] using a technique based on recursion relations for Feynman diagrams. (C) 2001 Elsevier Science B.V. All rights reserved.
Cavity QED analog of the harmonic-oscillator probability distribution function and quantum collapses
Resumo:
We establish a connection between the simple harmonic oscillator and a two-level atom interacting with resonant, quantized cavity and strong driving fields, which suggests an experiment to measure the harmonic-oscillator's probability distribution function. To achieve this, we calculate the Autler-Townes spectrum by coupling the system to a third level. We find that there are two different regions of the atomic dynamics depending on the ratio of the: Rabi frequency Omega (c) of the cavity field to that of the Rabi frequency Omega of the driving field. For Omega (c)
Resumo:
World Congress of Malacology, Ponta Delgada, July 22-28, 2013.
Resumo:
IntroductionThe objective of this study was to analyze the spatial behavior of the occurrence of trachoma cases detected in the City of Bauru, State of São Paulo, Brazil, in 2006 in order to use the information collected to set priority areas for optimization of health resources.Methodsthe trachoma cases identified in 2006 were georeferenced. The data evaluated were: schools where the trachoma cases studied, data from the 2000 Census, census tract, type of housing, water supply conditions, distribution of income and levels of education of household heads. In the Google Earth® software and TerraView® were made descriptive spatial analysis and estimates of the Kernel. Each area was studied by interpolation of the density surfaces exposing events to facilitate to recognize the clusters.ResultsOf the 66 cases detected, only one (1.5%) was not a resident of the city's outskirts. A positive association was detected of trachoma cases and the percentage of heads of household with income below three minimum wages and schooling under eight years of education.ConclusionsThe recognition of the spatial distribution of trachoma cases coincided with the areas of greatest social inequality in Bauru City. The micro-areas identified are those that should be prioritized in the rationalization of health resources. There is the possibility of using the trachoma cases detected as an indicator of performance of micro priority health programs.
Resumo:
White grubs (Coleoptera, Melolonthidae) in the "Planalto Region", Rio Grande do Sul state, Brazil: Key for identification, species richness and distribution. The objective of this study was to survey the occurrence and geographic distribution of white grub species (Coleoptera, Melolonthidae) in cultivated and non-cultivated fields of the "Planalto Region", Rio Grande do Sul state, Brazil and develop a key at genus-level. Twenty-eight species from 15 genera and three subfamilies were recorded: Dynastinae, Melolonthinae and Rutelinae. The species or genera recorded for the first time in the state are: Cyclocephala metrica, C. tucumana, Isonychus albicinctus, Liogenys bidenticeps, L. fusca, L. obesa and L. sinuaticeps, Paranomala violacea, as well as unidentified species of Amononyx, Dicrania, Leucothyreus, Macrodactylus, Plectris and Rhizogeniates. Among the species recorded, 23 were associated with winter crops. Only Cyclocephala metrica, Dyscinetus rugifrons, two species of Leucothyreus and one species of the tribe Sericini were not present in cultivated crop fields. Cyclocephala flavipennis and Diloboderus abderus occurred in most of the municipalities sampled, often associated with Plectris sp., C. modesta and C. putrida. The highest richness of melolonthids was concentrated in the northeast of the Planalto region.
Resumo:
We present a comprehensive study of the low-temperature magnetic relaxation in random magnets. The first part of the paper contains theoretical analysis of the expected features of the relaxation, based upon current theories of quantum tunneling of magnetization. Models of tunneling, dissipation, the crossover from the thermal to the quantum regime, and the effect of barrier distribution on the relaxation rate are discussed. It is argued that relaxation-type experiments are ideally suited for the observation of magnetic tunneling, since they automatically provide the condition of very low barriers. The second part of the paper contains experimental results on transition-metal¿rare-earth amorphous magnets. Structural and magnetic characterization of materials is presented. The temperature and field dependence of the magnetic relaxation is studied. Our key observation is a nonthermal character of the relaxation below a few kelvin. The observed features are in agreement with theoretical suggestions on quantum tunneling of magnetization.
Resumo:
La théorie de l'information quantique étudie les limites fondamentales qu'imposent les lois de la physique sur les tâches de traitement de données comme la compression et la transmission de données sur un canal bruité. Cette thèse présente des techniques générales permettant de résoudre plusieurs problèmes fondamentaux de la théorie de l'information quantique dans un seul et même cadre. Le théorème central de cette thèse énonce l'existence d'un protocole permettant de transmettre des données quantiques que le receveur connaît déjà partiellement à l'aide d'une seule utilisation d'un canal quantique bruité. Ce théorème a de plus comme corollaires immédiats plusieurs théorèmes centraux de la théorie de l'information quantique. Les chapitres suivants utilisent ce théorème pour prouver l'existence de nouveaux protocoles pour deux autres types de canaux quantiques, soit les canaux de diffusion quantiques et les canaux quantiques avec information supplémentaire fournie au transmetteur. Ces protocoles traitent aussi de la transmission de données quantiques partiellement connues du receveur à l'aide d'une seule utilisation du canal, et ont comme corollaires des versions asymptotiques avec et sans intrication auxiliaire. Les versions asymptotiques avec intrication auxiliaire peuvent, dans les deux cas, être considérées comme des versions quantiques des meilleurs théorèmes de codage connus pour les versions classiques de ces problèmes. Le dernier chapitre traite d'un phénomène purement quantique appelé verrouillage: il est possible d'encoder un message classique dans un état quantique de sorte qu'en lui enlevant un sous-système de taille logarithmique par rapport à sa taille totale, on puisse s'assurer qu'aucune mesure ne puisse avoir de corrélation significative avec le message. Le message se trouve donc «verrouillé» par une clé de taille logarithmique. Cette thèse présente le premier protocole de verrouillage dont le critère de succès est que la distance trace entre la distribution jointe du message et du résultat de la mesure et le produit de leur marginales soit suffisamment petite.
Resumo:
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a common secret key over a public authenticated channel, and an eavesdropper who intercepts all their messages in order to learn the secret. We consider query complexity in which we count only the number of evaluations (queries) of a given black-box function, and classical communication channels. Ralph Merkle provided the first unclassified scheme for secure communications over insecure channels. When legitimate parties are willing to ask O(N) queries for some parameter N, any classical eavesdropper needs Omega(N^2) queries before being able to learn their secret, which is is optimal. However, a quantum eavesdropper can break this scheme in O(N) queries. Furthermore, it was conjectured that any scheme, in which legitimate parties are classical, could be broken in O(N) quantum queries. In this thesis, we introduce protocols à la Merkle that fall into two categories. When legitimate parties are restricted to use classical computers, we offer the first secure classical scheme. It requires Omega(N^{13/12}) queries of a quantum eavesdropper to learn the secret. We give another protocol having security of Omega(N^{7/6}) queries. Furthermore, for any k>= 2, we introduce a classical protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1/2+k/{k+1}}) queries, approaching Theta(N^{3/2}) when k increases. When legitimate parties are provided with quantum computers, we present two quantum protocols improving on the best known scheme before this work. Furthermore, for any k>= 2, we give a quantum protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1+{k}/{k+1}})} queries, approaching Theta(N^{2}) when k increases.
Resumo:
Introduction: The objective of this study was to analyze the spatial behavior of the occurrence of trachoma cases detected in the City of Bauru, State of São Paulo, Brazil, in 2006 in order to use the information collected to set priority areas for optimization of health resources. Methods: the trachoma cases identified in 2006 were georeferenced. The data evaluated were: schools where the trachoma cases studied, data from the 2000 Census, census tract, type of housing, water supply conditions, distribution of income and levels of education of household heads. In the Google Earth® software and TerraView® were made descriptive spatial analysis and estimates of the Kernel. Each area was studied by interpolation of the density surfaces exposing events to facilitate to recognize the clusters. Results: of the 66 cases detected, only one (1.5%) was not a resident of the city's outskirts. A positive association was detected of trachoma cases and the percentage of heads of household with income below three minimum wages and schooling under eight years of education. Conclusions: The recognition of the spatial distribution of trachoma cases coincided with the areas of greatest social inequality in Bauru City. The micro-areas identified are those that should be prioritized in the rationalization of health resources. There is the possibility of using the trachoma cases detected as an indicator of performance of micro priority health programs.