Since 2016,the National Institute of Standards and Technology(NIST)has been performing a competition to standardize post-quantum cryptography(PQC).Although Falcon has been selected in the competition as one of the sta...
详细信息
Since 2016,the National Institute of Standards and Technology(NIST)has been performing a competition to standardize post-quantum cryptography(PQC).Although Falcon has been selected in the competition as one of the standard PQC algorithms because of its advantages in short key and signature sizes,its performance overhead is larger than that of other lattice-based *** study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units(GPUs)for server-side *** GPU porting significantly degrades performance because the Falcon reference codes require recursive functions in its sampling ***,an iterative sampling approach for efficient parallel processing is *** this study,the Falcon software applied a fine-grained execution model and reported the optimal number of threads in a thread ***,the polynomial multiplication performance was optimized by parallelizing the number-theoretic transform(NTT)-based polynomial multiplication and the fast Fourier transform(FFT)-based ***,dummy-based parallel execution methods have been introduced to handle the thread divergence *** presented Falcon software on RTX 3090 NVIDA GPU based on the proposed methods with Falcon-512 and Falcon-1024 parameters outperform at 35.14,28.84,and 34.64 times and 33.31,27.45,and 34.40 times,respectively,better than the central processing unit(CPU)reference implementation using Advanced Vector Extensions 2(AVX2)instructions on a Ryzen 95900X running at 3.7 GHz in key generation,signing,and verification,***,the proposed Falcon software can be used in servers managing multiple concurrent clients for efficient certificate verification and be used as an outsourced key generation and signature generation server for Signature as a Service(SaS).
The generall efficiency of a computational system, be it simple or complex, presentation of the data plays a crucial role in getting the most out of it. Classical information theory, quantum mechanics, and computer sc...
详细信息
The cloud services requiring communication, computing and caching (3C) resources are supported by datacenter networks (DCNs). The service security is threatened due to the development of quantum computers. quantum key...
详细信息
ISBN:
(纸本)9783903176546
The cloud services requiring communication, computing and caching (3C) resources are supported by datacenter networks (DCNs). The service security is threatened due to the development of quantum computers. quantum key distribution (QKD) technology promises to share secret keys as cipher resources between remote users with information-theoretic security. The quantum cloud is illustrated which is realized by the QKD-secured cloud datacenter network. In the quantum cloud, the communication, computing, caching and cipher (4C) resources are provided for data transmission, processing, storing and encryption. To solve the newly emerged 4C resource coordination problem, a 4C-oriented control architecture is designed and the heuristic algorithms for securing service function chains are innovatively proposed. The simulation results show that the proposed algorithms can achieve the great service success ratio performance compared with the baseline.
quantum secure communication technology, grounded in the principles of quantum mechanics, has revolutionized traditional cryptographic methods, which predominantly rely on mathematical algorithms and logical transform...
详细信息
ISBN:
(纸本)9781510688834
quantum secure communication technology, grounded in the principles of quantum mechanics, has revolutionized traditional cryptographic methods, which predominantly rely on mathematical algorithms and logical transformations. quantum key distribution (QKD) facilitates the secure sharing of symmetric keys between legitimate parties, ensuring the integrity and confidentiality of information in communication channels. Among various QKD schemes, continuous variable quantum key distribution (CV-QKD) has emerged as a viable alternative to the more established discrete variable quantum key distribution (DV-QKD). CV-QKD boasts several advantages, including straightforward deployment, reduced operational costs, and stable signal quality, positioning it as a significant component of the quantum communication *** noise stream cipher (QNSC) represents a technique that employs redundant data streams to encrypt plaintext. Notably, QNSC shares structural similarities with the optical path used in quantum key distribution, allowing for compatibility with existing QKD infrastructure. Furthermore, the keys generated through quantum key distribution ensure absolute security, enabling them to substitute the data streams produced by pseudo-random sequences traditionally used in classical encryption schemes. This substitution enhances the overall security framework of the quantum noise stream encryption *** quantum access network (QAN) extends quantum key distribution capabilities from point-to-point connections to point-to-multipoint configurations, thereby becoming an essential component of contemporary network architectures. By interlinking multiple end users with a network backbone, quantum access networks can seamlessly integrate with quantum key distribution protocols. This integration offers a cost-effective and scalable solution for user access to the *** experimental verifications have demonstrated the viability of downstream access networks,
Once powerful enough quantum computers become feasible, many of the regularly used cryptosystems will be completely useless. Thus, designing quantum-safe cryptosystems to replace current algorithms is more crucial tha...
详细信息
ISBN:
(纸本)9798350303209
Once powerful enough quantum computers become feasible, many of the regularly used cryptosystems will be completely useless. Thus, designing quantum-safe cryptosystems to replace current algorithms is more crucial than ever. This paper presents the hardware implementation of one of the fundamental building blocks of all post-quantum cryptographic (PQC) algorithms, which are PQC-primitives, having NIST-PQC-finalists CRYSTALS-Kyber algorithm as a target. This work analyzes Keccak sponge function and the four SHA-3 algorithms used in CRYSTALS-Kyber, realizing the correct processing and handling of input information and integrating the four standards into one implementation for Kyber-III level of security. The synthesis results are provided for 65-nm technology, while Artix-7 XC7A75-3 is chosen as the implementation platform. The efficiency and the performance of the proposed architecture are compared in terms of area, frequency, clock cycles, and efficiency with the state-of-the-art.
quantum image steganography has attracted considerable attention in recent years. The majority of existing algorithms do not simultaneously have excellent imperceptibility, high embedding capacity, and good security. ...
详细信息
quantum image steganography has attracted considerable attention in recent years. The majority of existing algorithms do not simultaneously have excellent imperceptibility, high embedding capacity, and good security. Therefore, a novel quantum color image steganography scheme is researched based on turtle shell and least significant bit (LSB) replacement. Human vision system (HVS) model and check codes are introduced into the proposed scheme to improve visual quality and security. According to the theory that HVS has different sensitivities to various colors, two channels are randomly selected with different probabilities to hide secret information from the red (R), green (G), and blue (B) channels of each color carrier pixel. Grayscale values of the two chosen channels correspond to a point in the turtle shell-based reference matrix. Depending on whether the point is at the boundary of the reference matrix or not, the LSB substitution method or turtle shell algorithm is utilized to embed the secret information. Dedicated quantum circuits are presented to better describe the procedure of the novel scheme. Experimental results show that the proposed algorithm is feasible and has superior performance in imperceptibility, embedding capacity, and security.
quantuminformationprocessing (QIP) can provide exponential speed-up of various computational algorithms physically proven data security. Many realizations of QIP employ photons as qubits in applications such as cryp...
详细信息
information transmission through light has attained significant advancements in the fields of both optical fiber communication (OFC) and optical wireless communication (OWC) systems. These advancements have been exami...
详细信息
ISBN:
(纸本)9783031770777
information transmission through light has attained significant advancements in the fields of both optical fiber communication (OFC) and optical wireless communication (OWC) systems. These advancements have been examined by numerous researchers by employing pioneering modulation schemes, adaptive optics, advanced signal processingalgorithms, advancement in materials, and employing sophisticated network architectures for wide variety of applications such as: military;defense;healthcare;satellite;internet of things;and telecommunications. However, the primary factors which affecting the OFC systems are signal attenuation, dispersion, reliability, robustness, and security even though there exists a predominant development. In addition, atmospheric attenuation (due to absorption and scattering), turbulences, climate conditions (fog, rain, snow, dense fog etc,.), alignment and tracking, interference, range constraints, and security are the major challenges in OWC systems in spite of having advanced approaches from past few decades. Hence, these challenges are need to be addressed in order to achieve reliable and high-speed data transmission. This could be possible with the integration of OFC and OWC with emerging quantum communication technologies (quantum key distribution, quantum entanglement, quantum repeaters, quantum sensing, and quantum secured OWC links). Therefore, this work presents the recent advancements in the fields of OFC and OWC systems with the state-of-art-of techniques and approaches. The primary research challenges related to security, speed, range, capacity and adaptability of both OWC and OFC are outlined. In addition, the possible integration of these systems with quantum communication technologies and the recent progression have been outlined. Finally, the possibility of future research direction towards the quantum OFC, quantum OWC have been discussed for ensuring and revealing the full potential of quantum enhanced optical communication systems.
Multiple sclerosis (MS) is a condition that affects the brain or central nervous system, which can result in issues with the optic nerve, brain, and spinal cord. Multiple sclerosis is thought to affect 2.8 million peo...
详细信息
Deep neural networks have seen tremendous success over the last years. Since the training is performed on digital hardware, in this paper, we analyze what actually can be computed on current hardware platforms modeled...
详细信息
Deep neural networks have seen tremendous success over the last years. Since the training is performed on digital hardware, in this paper, we analyze what actually can be computed on current hardware platforms modeled as Turing machines, which would lead to inherent restrictions of deep learning. For this, we focus on the class of inverse problems, which, in particular, encompasses any task to reconstruct data from measurements. We prove that finite-dimensional inverse problems are not Banach-Mazur computable for small relaxation parameters. Even more, our results introduce a lower bound on the accuracy that can be obtained algorithmically.
暂无评论