Insecurity of quantum secure computations
نویسندگان
چکیده
منابع مشابه
Insecurity of Quantum Secure Computations
It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation. If this were the case, quantum smart-cards could prevent fake teller machines from learning the PIN (Personal Identification Number) from the customers’ input. Although such optimism has been challenged by the recent surprising disco...
متن کاملSecure Multi-Agent Computations
We propose a security model for open multi-agent systems. Given a user-defined task T , we generate a group of mobile agents which realise a common functionality that solves T . Those agents cooperate with each other and build an autonomous community. Using a scheme for secure distributed computations, this community is able to perform secure computations without requiring interaction with a tr...
متن کاملSecure Deduplication of General Computations
The world’s fast-growing data has become highly concentrated on enterprise or cloud storage servers. Data deduplication reduces redundancy in this data, saving storage and simplifying management. While existing systems can deduplicate computations on this data by memoizing and reusing computation results, they are insecure, not general, or slow. This paper presents UNIC, a system that securely ...
متن کاملSecure Outsourcing of Some Computations
The rapid growth of the Internet facilitates the outsourcing of certain computations, in the following sense: A customer who needs these computations done on some data but lacks the computational resources (or programming expertise) to do so, can use an external agent to perform these computations. This currently arises in many practical situations, including the nancial services and petroleum ...
متن کاملSecure outsourcing of scientific computations
We investigate the outsourcing of numerical and scienti c computations using the following framework: A customer who needs computations done but lacks the computational resources (computing power, appropriate software, or programming expertise) to do these locally, would like to use an external agent to perform these computations. This currently arises in many practical situations, including th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 1997
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.56.1154