1,188 research outputs found
Using quantum oblivious transfer to cheat sensitive quantum bit commitment
It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independently by Aharonov et al. [STOC, 2000] and Hardy and Kent [Phys. Rev. Lett. 92 (2004)] is investigated. In this variant, the parties require some nonzero probability of detecting a cheating, i.e. if Bob, who commits a bit b to Alice, changes his mind during the revealing phase then Alice detects the cheating with a positive probability (we call this property binding); and if Alice gains information about the committed bit before the revealing phase then Bob discovers this with positive probability (sealing). In our paper we give quantum bit commitment scheme that is simultaneously binding and sealing and we show that if a cheating gives epsilon advantage to a malicious Alice then Bob can detect the cheating with a probability Omega(epsilon^2). If Bob cheats then Alice's probability of detecting the cheating is greater than some fixed constant lambda>0. This improves the probabilities of cheating detections shown by Hardy and Kent and the scheme by Aharonov et al. who presented a protocol that is either binding or sealing, but not simultaneously both. To construct a cheat sensitive quantum bit commitment scheme we use a protocol for a weak quantum one-out-of-two oblivious transfer
Practical private database queries based on a quantum key distribution protocol
Private queries allow a user Alice to learn an element of a database held by
a provider Bob without revealing which element she was interested in, while
limiting her information about the other elements. We propose to implement
private queries based on a quantum key distribution protocol, with changes only
in the classical post-processing of the key. This approach makes our scheme
both easy to implement and loss-tolerant. While unconditionally secure private
queries are known to be impossible, we argue that an interesting degree of
security can be achieved, relying on fundamental physical principles instead of
unverifiable security assumptions in order to protect both user and database.
We think that there is scope for such practical private queries to become
another remarkable application of quantum information in the footsteps of
quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims,
expanded security discussio
Muddled Boundaries of Digital Shrines
International audienceBased on an online ethnography study of 274 YouTube videos posted during the Virginia Tech or the Newtown massacres, this article discusses how users resort to participatory media during such mediatized events to create a digital spontaneous shrine. The assemblage of this sanctuary on a website hosting billions of user-generated contents is made possible by means of folksonomy and website architecture, and a two-fold social dynamic based on participatory commitment and the institutionalization of a collective entity. Unlike “physical” spontaneous shrines erected in public spaces, these digital shrines connect the bereaved with provocative or outrageous contributions, notably tributes from school shooting fans using participatory media to commemorate the killer’s memory. This side effect, generated by the technical properties of the platform, compromises the tranquility of the memorial and muddles the boundaries and the contents of such sanctuaries
Investigations of singlet and triplet diffusion in thermally activated delayed-fluorescence emitters: Implications for hyperfluorescence
BEEHAVE - Analysing the significance of increased brood termination rates on the colony strength in honey bees
Relationship between the soluble glutathione-dependent delta 5-3-ketosteroid isomerase and the glutathione S-transferases of the liver.
- …
