Arama Sonuçları

Listeleniyor 1 - 5 / 5
  • Yayın
    A hybrid approach to private record matching
    (IEEE Computer Soc, 2012-10) İnan, Ali; Kantarcıoğlu, Murat; Ghinita, Gabriel; Bertino, Elisa
    Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the data sets contain private information, the problem becomes even more difficult. Existing solutions to this problem generally follow two approaches: sanitization techniques and cryptographic techniques. We propose a hybrid technique that combines these two approaches and enables users to trade off between privacy, accuracy, and cost. Our main contribution is the use of a blocking phase that operates over sanitized data to filter out in a privacy-preserving manner pairs of records that do not satisfy the matching condition. We also provide a formal definition of privacy and prove that the participants of our protocols learn nothing other than their share of the result and what can be inferred from their share of the result, their input and sanitized views of the input data sets (which are considered public information). Our method incurs considerably lower costs than cryptographic techniques and yields significantly more accurate matching results compared to sanitization techniques, even when privacy requirements are high.
  • Yayın
    Cryptanalysis of Fridrich's chaotic image encryption
    (World Scientific Publishing, 2010-05) Solak, Ercan; Çokal, Cahit; Yıldız, Olcay Taner; Bıyıkoğlu, Türker
    We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret permutation that is used to shuffle the pixels of a round input. We demonstrate the effectiveness of our attack with examples and simulation results. We also show that our proposed attack can be generalized to other well-known chaotic image encryption algorithms.
  • Yayın
    Generating multi-atom entangled W states via light-matter interface based fusion mechanism
    (Nature Publishing Group, 2015-11-09) Özaydın, Fatih; Zang, Xue-Ping; Yang, Ming; Song, Wei; Cao, Zhuo-Liang
    W state is a key resource in quantum communication. Fusion technology has been proven to be a good candidate for preparing a large-size W state from two or more small-size W states in linear optical system. It is of great importance to study how to fuse W states via light-matter interface. Here we show that it is possible to prepare large-size W-state networks using a fusion mechanism in cavity QED system. The detuned interaction between three atoms and a vacuum cavity mode constitute the main fusion mechanism, based on which two or three small-size atomic W states can be fused into a larger-size W state. If no excitation is detected from those three atoms, the remaining atoms are still in the product of two or three new W states, which can be re-fused. The complicated Fredkin gate used in the previous fusion schemes is avoided here. W states of size 2 can be fused as well. The feasibility analysis shows that our fusion processes maybe implementable with the current technology. Our results demonstrate how the light-matter interaction based fusion mechanism can be realized, and may become the starting point for the fusion of multipartite entanglement in cavity QED system.
  • Yayın
    Quarantine region scheme to mitigate spam attacks in wireless sensor networks
    (IEEE, 2006-08) Coşkun, Vedat; Çayırcı, Erdal; Levi, Albert; Sancak, Serdar
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.
  • Yayın
    Deterministic generation of large scale atomic W states
    (Optical Soc Amer, 2016-05-30) Zang, Xue-Ping; Yang, Ming; Özaydın, Fatih; Song, Wei; Cao, Zhuo-Liang
    We present a deterministic scheme for generating large-scale atomic W states in a cavity QED system via a simple expansion mechanism, which is realized only by a detuned interaction between two identical atoms and a vacuum cavity mode. With the presented scheme, a W-type Bell pair can be created and an n-atom W state can be expanded to a 2n-atom W state with a unit probability of success in principle. No multi-atom gates, quantum memories or quantum non-demolition measurements are required, greatly simplifying the experimental realization of the scheme. The feasibility analysis shows that our expansion scheme can be implemented with state-of-the-art technologies. Our scheme enables advances not only in quantum information and communication but also in quantum thermodynamics, where atomic W states plays a crucial role.