Page 4,372«..1020..4,3714,3724,3734,374..4,3804,390..»

Plastc Card Is Cancelled: The Dangers Of Crowd Funding Tech – Forbes


Forbes
Plastc Card Is Cancelled: The Dangers Of Crowd Funding Tech
Forbes
It looked like sci-fi. One card to rule them all. Plastc was a smart credit card that looked like something out of a movie. Bluetooth connectivity, wireless charging, a built-in touchscreen, and more. The idea was you could upload all your various ...

Continued here:
Plastc Card Is Cancelled: The Dangers Of Crowd Funding Tech - Forbes

Read More..

Bitcoin Hits New All-Time High | Fortune.com – Fortune

A year ago, one Bitcoin could be had for about $450. On Thursday, the cryptocurrency peaked at just over $1,340, as measured by the Coindesk price index , before retrenching slightly to $1318 by this morning. Thats still a return of nearly 200%.

Bitcoin has seen a remarkably steady rise since early 2016, fueled by global regulatory normalization , broad interest in the technology from enterprises and banks , and rising transaction volumes. Cryptocurrency analysts, according to Coindesk, think the trend will continue , citing among other factors that most Bitcoin investors are long-term bulls who will take profits conservatively.

Get Data Sheet , Fortune s technology newsletter.

But the very transaction volume that is Bitcoins key fundamental also presents a serious medium-term threat, as the system has struggled to keep up. Transaction speeds have become impractical for merchant payments, and fees have risen, making the system less competitive with conventional payment systems such as credit cards. Struggles over how to fix the problem have raised the spectre of a network split though that could, at least theoretically, give holders additional value in a manner akin to a stock split.

Bitcoin had a notable previous peak of around $979 way back in November of 2013 (Coindesks number seems conservative here Coinmarketcap records a 2013 peak of $1149). That push was fueled by a wave of mainstream media attention, but prices slumped through 2015 on the realization that the techs promise would take some time to fulfill, dipping as low as $204 that August.

See the original post here:
Bitcoin Hits New All-Time High | Fortune.com - Fortune

Read More..

What is Parity Bitcoin? The Merkle – The Merkle

There are quite some intriguing developments to be found in the world of bitcoin and cryptocurrencies. Parity Technologies has released their Bitcoin technology stacks, which also features a new implementation of the Bitcoin protocol. This client is focused on performance and reliability. Now is a good time to take a closer look at that what the Parity Bitcoin client is all about.

It is not surprising to find out a lot of people have no idea what the big deal is regarding this project. Parity Technologies is a business venture comprising of a large number of developers who created Ethereum and its commercial implementation. This team has also taken a keen interest in bringing improvements to the Bitcoin protocol, as it suffers from issues regarding performance and reliability, in their opinion.

What the Parity Bitcoin client does is address these problems and do so in an open manner. The source code of the project can be found on GitHub, which allows anyone in the world to build on top of this existing codebase moving forward. The entire project has been built from scratch, with a strong focus on proper software development. Moreover, it is fully compliant with the legacy Bitcoin implementation.

It is also worth mentioning the project is written in the Rust coding language, which is both fast and secure at the time same. In fact, the ZCash team has been using Rust as well in recent months. This new coding language offers speed improvements at any code and seems capable of allowing developers to introduce a lot of new features in the future.

Moreover, quite a few parties have been supportive of the development of the Parity Bitcoin client. F2Pool, Bitmain, and Bixin are some of the initial sponsors of this venture. Parity Technologies is a VC-funded enterprise, and their Parity Ethereum client has received a lot of praise since its release. Moreover, the Ethereum client can be integrated directly into a browser, and the same now applies to its Bitcoin counterpart.

While the Parity Bitcoin client is mainly designed as the new go-to solution for developers, it is also a good addition to the list of alternative protocol implementations. We have highlighted several of those implementations in the past, including the likes of Bcoin, btcd, and others. A growing diversity of bitcoin protocol implementations can only be seen as a positive development.

Moreover, the Parity bitcoin implementation can bring us one step closer to a successful integration of Schnorr signatures for bitcoin users. As we talked about earlier, Schnorr signatures provide additional features to bitcoin users all over the world. Parity Bitcoin can serve as a test bet ecosystem to test the viability of such an implementation before it becomes part of the main Bitcoin protocol.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Here is the original post:
What is Parity Bitcoin? The Merkle - The Merkle

Read More..

Arizona Bitcoin Trader with Long Rap Sheet to Remain in Custody – CryptoCoinsNews

Bitcoin, guns, ammo, drugs, a long rap sheetand anarchy. Not a good mix, as one recent criminal case out of Arizona has proven.

A multi-agency federal task force raided local bitcoin trader, and anarchist blogger, Morpheus Titanias apartment last week.

Court documents, available online in electronic court filings and first reported by CoinDesk, demonstrate that US Magistrate Michelle Burns ordered Costanzo to remain in custody until his trial after a hearing. Costanzo is considered a serious flight risk thanks to a long history of criminal conduct and a record of prior failure to appear in court as ordered.

Morpheus, whose legal name is Thomas Mario Costanzo, was being held until his case was to be heard, but will remain in custody for longer.

According to court records, hes been charged with possession of three boxes of Winchester ammunition for an altogether 60 cartridges in different calibers. He denied ownership of the ammunition, but admitted they were in indeed his apartment, according to records, which did not say who owned them.

Thanks to a 2015 conviction in Maricopa County for a felony marijuana possession charge, Costanzo is not legally permitted to possess firearms or ammunition, and was therefore in violation of Arizona state law. Homeland Security Investigations steered a raid on April 20 of Costanzos Mesa apartment. However, it it did not have to do with his marijuana offenses nor illegal possession of guns and ammunition.

The warrant issued by U.S. Magistrate Judge David Duncan sought evidence, instead, that Costanzo may have operated as an unlicensed money transmitting business, a license which requires one to go through an application process with government. Prosecutors also contend that Costanzo sold drugs and hid the profits from his operations.

Agents could seize illegal drugs, Bitcoin records and financial documents, computers, cellphones and other items. Costanzos cell phone company received a search warrant to produce tracking information on his prior whereabouts.

Freedoms Phoenix, a conspiracy website run by Libertarian activist Ernest Hancock, publishedwarrant records on Tuesday obtained by his radio showFreedoms Phoenix, for whom Costanzo worksas sales and marketing manager. Hancock said on air the two have been friends since 2003.

Photos from the raid in Mesa feature SWAT team members and other officers, as well as an armored vehicle, surrounding the Costanzos building. The apartment landlord said Costanzo has lived there alone for approximately one year. Costanzo often refers to himself online as one of the most prolific bitcoin traders in the area. Localbitcoins record show he has made more than 100 trades in four years, and has about a dozen reviews on the website.

On the bitcoin trading website, Costanzos profile reads, Hey Im Morpheus lets get together and do Bitcoin :).

His feedback score is 100%, and the first activity on the account was nearly four years ago. He is trusted by 30+ people on the website. He has apparently been active in both Florida and Arizona.

Awesome to work with! one of his customers wrote in a review.

Another wrote: MorpheusTitania is a great trader! He went above and beyond on my last trade. There was a mix-up and he waited for over an hour before we could meet. You can trade with confidence with MorpheusTitania. Costanzo thought highly of himself, as well.

Because of his rock-solid reputation, he is one of the biggest sellers in the Phoenix area, Costanzo wrote about himself in 2014 on one of his web sites, Titanians.org. Morpheus is now semi-retired as a bitcoin trader / entrepreneur.

Costanzo has been arrested numerous time and served eight months in prison in the mid-1980s after fleeing from police.

He received probation after a 2015 guilty plea for misdemeanor convictions in two marijuana cases, as well as a felony in the third, according to court records.

If Arizona had similar laws to the eight states and Washington D.C. where marijuana is legalized for adults 21 and older, Costanzo would never have been charged and convicted of possession three times, nor been stripped of his gun rights. According to local Homeland Security spokeswoman Yasmeen Pitts OKeefe tells New Times, the investigation is open and active.

This is the second time in the past month Arizona has made Bitcoin and blockchain headlines. The Senate of the state of Arizona recently passed the bill, HB 2417, which was introduced by state representative Jeff Weninger on 6 February, 2017. The bill passed with a vote of 28-1 where it was then passed along to Arizonas governor Doug Ducey.

Smart contracts may exist in commerce, reads the bill. A contract relating to a transaction may not be denied legal effect, validity or enforceability solely because that contract contains a smart contract term.

Featured image from Shutterstock.

The rest is here:
Arizona Bitcoin Trader with Long Rap Sheet to Remain in Custody - CryptoCoinsNews

Read More..

Stock Portfolio App Stockfolio Adds Bitcoin and Altcoin Price Support – newsBTC

Bitcoin and cryptocurrency have become quite popular investment vehicles as of late as well.

It is evident mainstream traders are paying more attention to cryptocurrency. Not only are they looking at bitcoin and altcoin prices, but app developers are doing so as well. Stockfolio, a rather popular app among mainstream traders, added bitcoin price support. Additionally, they now also list some of the top altcoins. An interesting decision that may bring cryptocurrency to the mainstream.

Every time a major app adds cryptocurrency support, there is cause for celebration A lot of people on the planet remain unaware of bitcoin and altcoins. In some cases, that is due to sheer ignorance. On the other hand, there is very little mainstream attention for cryptocurrency as a whole. It is up to individual trading apps to change all of that.

Stockfolio, an application exclusively available on OSX, has done exactly that. Users who update their client will now have access to cryptocurrency information as well. Keeping tabs on the Bitcoin price is now a possibility, as well as the value of prominent altcoins. It is interesting to see investment apps pay attention to cryptocurrency at this point in time.

One caveat is how the app costs US$11.99. That is a bit of a steep price for an investment application. Then again, major traders need apps like this to keep track of their stock portfolio. At this rate, bitcoin may become part of these portfolios as well. Diversification remains key, as always. Bitcoin and cryptocurrency have become quite popular investment vehicles as of late as well.

As of right now, two altcoins are supported by Stockfolio. Both Ethereum and Litecoin prices are tracked in real-time. Moreover, there is also a built-in news feed for cryptocurrency news. All things considered, the Stockfolio app adds the necessary tools to keep tabs on cryptocurrency. Whether or not traders will invest in this market, remains to be seen.

It is good to see Apple approve these app updates related to cryptocurrency. The technology giant has a bit of a rocky history when it comes to bitcoin and altcoins. However, it appears the situation is slowly improving. It is not unlikely more financial apps will focus on cryptocurrency support in the future.

View post:
Stock Portfolio App Stockfolio Adds Bitcoin and Altcoin Price Support - newsBTC

Read More..

Roundup Of Cloud Computing Forecasts, 2017 – Forbes


Forbes
Roundup Of Cloud Computing Forecasts, 2017
Forbes
Cloud platforms are enabling new, complex business models and orchestrating more globally-based integration networks in 2017 than many analyst and advisory firms predicted. Combined with Cloud Services adoption increasing in the mid-tier and small ...

View post:
Roundup Of Cloud Computing Forecasts, 2017 - Forbes

Read More..

OFFSITE Cloud Computing And Data Center Operator Announces … – PR Newswire (press release)

Anthony Portee, OFFSITE chief technology officer said, "The fully customized private cloud solutions being envisioned and commissioned by our client base demand a highly scalable and efficient NGFW solution which can satisfy a wide range of business and security needs. From application inspection and content enforcement to executive reporting and traffic visibility, the Palo Alto solution satisfies all of the unique and challenging technical requirements our customers look to OFFSITE to resolve. The high performance and tightly integrated ecosystem provided by the Palo Alto product family fulfills a critical role for OFFSITE's customers."

About OFFSITE

OFFSITE redefines the data center experience for mid-tier IT organizations with its high performing environment for managing data operations. Operating since 2001, OFFSITE offers private cloud services, IaaS, colocation services, disaster recovery services, network operations center (NOC) services, and hosted and managed solutions. OFFSITE's spacious facilities and customized services enable mid-market businesses to solve their IT challenges and discover new managed services, hosting and private cloud computing solutions. OFFSITE is a privately held company headquartered at its own 50,000 square foot facilities in Southeastern WI with redundant data center operations in Chicago, Illinois. For additional information about OFFSITE, call 262-564-6400, email info@off-site.com, or visit http://www.off-site.com

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/offsite-cloud-computing-and-data-center-operator-announces-integration-of-palo-alto-security-platform-to-its-private-cloud-infrastructure-300444593.html

SOURCE OFFSITE, LLC

Home

Read the original post:
OFFSITE Cloud Computing And Data Center Operator Announces ... - PR Newswire (press release)

Read More..

Inside Microsoft’s ‘soup to nuts’ quantum computing ramp-up – Computerworld Australia

The concept of building a quantum computer with topological qubits had been knocking around Microsoft for nearly 15 years.

At the companys Redmond campus, later expanding into its Station Q centre at the University of California, researchers investigated this complex, yet beautiful mathematical theory as Microsofts quantum guru Michael Freedman once described it.

It remained just that a beautiful theory for years. Then something changed.

Suddenly in late 2016, Microsoft announced Station Q would expand to eight labs worldwide including one at the Quantum Nanoscience Laboratory at the University of Sydney. Four heavyweight academic hires were made. An 'inflection point' had been reached, a release stated.

Why are they now switching on? How much should I read into that? says Professor David Reilly, director of Station Qs new Sydney lab. I think you can read plenty into that.

Is Anyon out there?

The topological approach to forming qubits uses quasiparticles called non-abellian anyons.

We've realised that the only way to really scale is to build much better qubits. Qubits that are inherently, intrinsically immune to noise and immune to disturbances from the environment, says Reilly.

In most approaches to building quantum systems, information is encoded in the properties of particles. That makes the systems very fragile as any disturbances from the environment can destroy a particles quantum state.

According to Microsoft, topological qubits are better able to withstand heat and electrical noise, which allows them to remain in a stable quantum state for longer. By encoding the information not on the quasiparticle but in the order the positions of the anyons are swapped around (called braiding), topological qubits offer a more viable way to make a scalable, usable quantum computer.

The quasiparticles themselves remain something of a riddle. Non-abellian anyons cant be seen with any kind of microscope but they can be measured with high-precision devices. Probably. Certainly there is no consensus among physicists as to whether they are real or not.

As Microsofts Alex Bocharov confidently put it to Nature, the company is pretty sure that they exist.

We reached a point where the experiments were convincing enough that now we should actually try and construct technology from it. And that's where we are today, Reilly adds.

Faith at scale

Backing topological qubits is as much about belief in the approach, Reilly says, as doubt in all the others.

It's a double-edged sword. For me personally some of the decision to go in this direction is born out of a pessimistic view. It's faith in this approach and the reality is it's pessimism that the other existing approaches can really go the distance, he says.

Google and IBM back the superconducting loop approach to building qubits, while Intel and the Commonwealth Bank and Telstra backed Centre for Quantum Computation and Communication Technology at UNSW in Sydney, are pursuing a silicon-based method.

The difference between demonstrating the basic operation of one single device in a university lab and publishing a very nice paper, and what it's going to take to bring that technology to scale I think these are vastly different activities, Reilly says. It becomes pretty depressing and I don't see it.

The ability to scale is key to Microsofts quantum efforts. Its ambition goes way beyond the lab.

It's all about having the fundamental building blocks that can take you to millions of qubits, Reilly says. It's all about going the distance.

Error: Please check your email address.

Tags Sydneytopological qubitKinectquantumquantum computingTelstraHoloLensnanotechnologyStation QMicrosoftRedmondunswXboxCommonwealth Bank of Australia

More about Commonwealth BankGoogleIBMIntelMicrosoftQQuantumReillyTechnologyUniversity of SydneyUNSWXbox

See the rest here:
Inside Microsoft's 'soup to nuts' quantum computing ramp-up - Computerworld Australia

Read More..

Quantum cryptography – Wikipedia

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes (e.g., RSA and ElGamal) can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication (see below for examples). For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.

Quantum cryptography uses Heisenberg's uncertainty principle[1] formulated in 1927, and the No-cloning theorem[2] first articulated by Wootters and Zurek and Dieks in 1982. Werner Heisenberg discovered one of the fundamental principles of quantum mechanics: "At the instant at which the position of the electron is known, its momentum therefore can be known only up to magnitudes which correspond to that discontinuous change; thus, the more precisely the position is determined, the less precisely the momentum is known, and conversely[3] (Heisenberg, 1927: 1745). This simply means that observation of quanta changes its behavior. By measuring the velocity of quanta we would affect it, and thereby change its position; if we want to find a quant's position, we are forced to change its velocity. Therefore, we cannot measure a quantum system's characteristics without changing it[4] (Clark, n.d.) and we cannot record all characteristics of a quantum system before those characteristics are measured. The No-cloning theorem demonstrates that it is impossible to create a copy of an arbitrary unknown quantum state. This makes unobserved eavesdropping impossible because it will be quickly detected, thus greatly improving assurance that the communicated data remains private.

Quantum cryptography was proposed first by Stephen Wiesner, then at Columbia University in New York, who, in the early 1970s, introduced the concept of quantum conjugate coding. His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory Society, but was eventually published in 1983 in SIGACT News (15:1 pp.7888, 1983). In this paper he showed how to store or transmit two messages by encoding them in two "conjugate observables", such as linear and circular polarization of light, so that either, but not both, of which may be received and decoded. He illustrated his idea with a design of unforgeable bank notes. In 1984, building upon this work, Charles H. Bennett, of the IBM's Thomas J. Watson Research Center, and Gilles Brassard, of the Universit de Montral, proposed a method for secure communication based on Wiesner's "conjugate observables", which is now called BB84.[5] In 1991 Artur Ekert developed a different approach to quantum key distribution based on peculiar quantum correlations known as quantum entanglement.[6]

Random rotations of the polarization by both parties (usually called Alice and Bob) have been proposed in Kak's three-stage quantum cryptography protocol.[7] In principle, this method can be used for continuous, unbreakable encryption of data if single photons are used.[8] The basic polarization rotation scheme has been implemented.[9]

The BB84 method is at the basis of quantum key distribution methods. Companies that manufacture quantum cryptography systems include MagiQ Technologies, Inc. (Boston, Massachusetts, United States), ID Quantique (Geneva, Switzerland), QuintessenceLabs (Canberra, Australia) and SeQureNet (Paris, France).

The most well known and developed application of quantum cryptography is quantum key distribution, which is the process of using quantum communication to establish a shared key between two parties (Alice and Bob, for example) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. If Eve tries to learn information about the key being established, key establishment will fail causing Alice and Bob to notice. Once the key is established, it is then typically used for encrypted communication using classical techniques. For instance, the exchanged key could be used as for symmetric cryptography.

The security of quantum key distribution can be proven mathematically without imposing any restrictions on the abilities of an eavesdropper, something not possible with classical key distribution. This is usually described as "unconditional security", although there are some minimal assumptions required, including that the laws of quantum mechanics apply and that Alice and Bob are able to authenticate each other, i.e. Eve should not be able to impersonate Alice or Bob as otherwise a man-in-the-middle attack would be possible.

One aspect of quantum key distribution is that it is secure against quantum computers. Its strength does not depend on mathematical complexity, like post-quantum cryptography, but on physical principles.

Unlike quantum key distribution, quantum coin flipping is a protocol that is used between two participants who do not trust each other.[10] The participants communicate via a quantum channel and exchange information through the transmission of qubits.[11] Alice will determine a random basis and sequence of qubits and then transmit them to Bob. Bob then detects and records the qubits. Once Bob has recorded the qubits sent by Alice, he makes a guess to Alice on what basis she chose. Alice reports whether he won or lost to Bob and then sends Bob her entire original qubit sequence. Since the two parties do not trust each other, cheating is likely to occur at any step in the process. [12]

Quantum coin flipping is theoretically a secure means of communicating through two distrustful parties, but it is difficult to physically accomplish. [10]

Following the discovery of quantum key distribution and its unconditional security, researchers tried to achieve other cryptographic tasks with unconditional security. One such task was commitment. A commitment scheme allows a party Alice to fix a certain value (to "commit") in such a way that Alice cannot change that value while at the same time ensuring that the recipient Bob cannot learn anything about that value until Alice reveal it. Such commitment schemes are commonly in cryptographic protocols. In the quantum setting, they would be particularly useful: Crpeau and Kilian showed that from a commitment and a quantum channel, one can construct an unconditionally secure protocol for performing so-called oblivious transfer.[13]Oblivious transfer, on the other hand, had been shown by Kilian to allow implementation of almost any distributed computation in a secure way (so-called secure multi-party computation).[14] (Notice that here we are a bit imprecise: The results by Crpeau and Kilian[13][14] together do not directly imply that given a commitment and a quantum channel one can perform secure multi-party computation. This is because the results do not guarantee "composability", that is, when plugging them together, one might lose security. Later works showed, however, how composability can be ensured in this setting.[citation needed])

Unfortunately, early quantum commitment protocols[15] were shown to be flawed. In fact, Mayers showed that (unconditionally secure) quantum commitment is impossible: a computationally unlimited attacker can break any quantum commitment protocol.[16]

Yet, the result by Mayers does not preclude the possibility of constructing quantum commitment protocols (and thus secure multi-party computation protocols) under assumptions that they are much weaker than the assumptions needed for commitment protocols that do not use quantum communication. The bounded quantum storage model described below is an example for a setting in which quantum communication can be used to construct commitment protocols. A breakthrough in November 2013 offers "unconditional" security of information by harnessing quantum theory and relativity, which has been successfully demonstrated on a global scale for the first time.[17]

One possibility to construct unconditionally secure quantum commitment and quantum oblivious transfer (OT) protocols is to use the bounded quantum storage model (BQSM). In this model, we assume that the amount of quantum data that an adversary can store is limited by some known constant Q. We do not, however, impose any limit on the amount of classical (i.e., non-quantum) data the adversary may store.

In the BQSM, one can construct commitment and oblivious transfer protocols.[18] The underlying idea is the following: The protocol parties exchange more than Q quantum bits (qubits). Since even a dishonest party cannot store all that information (the quantum memory of the adversary is limited to Q qubits), a large part of the data will have to be either measured or discarded. Forcing dishonest parties to measure a large part of the data allows to circumvent the impossibility result by Mayers;[16] commitment and oblivious transfer protocols can now be implemented.

The protocols in the BQSM presented by Damgrd, Fehr, Salvail, and Schaffner[18] do not assume that honest protocol participants store any quantum information; the technical requirements are similar to those in QKD protocols. These protocols can thus, at least in principle, be realized with today's technology. The communication complexity is only a constant factor larger than the bound Q on the adversary's quantum memory.

The advantage of the BQSM is that the assumption that the adversary's quantum memory is limited is quite realistic. With today's technology, storing even a single qubit reliably over a sufficiently long time is difficult. (What "sufficiently long" means depends on the protocol details. By introducing an artificial pause in the protocol, the amount of time over which the adversary needs to store quantum data can be made arbitrarily large.)

An extension of the BQSM is the noisy-storage model introduced by Wehner, Schaffner and Terhal.[19] Instead of considering an upper bound on the physical size of the adversary's quantum memory, an adversary is allowed to use imperfect quantum storage devices of arbitrary size. The level of imperfection is modelled by noisy quantum channels. For high enough noise levels, the same primitives as in the BQSM can be achieved[20] and the BQSM forms a special case of the noisy-storage model.

In the classical setting, similar results can be achieved when assuming a bound on the amount of classical (non-quantum) data that the adversary can store.[21] It was proven, however, that in this model also the honest parties have to use a large amount of memory (namely the square-root of the adversary's memory bound).[22] This makes these protocols impractical for realistic memory bounds. (Note that with today's technology such as hard disks, an adversary can cheaply store large amounts of classical data.)

The goal of position-based quantum cryptography is to use the geographical location of a player as its (only) credential. For example, one wants to send a message to a player at a specified position with the guarantee that it can only be read if the receiving party is located at that particular position. In the basic task of position-verification, a player, Alice, wants to convince the (honest) verifiers that she is located at a particular point. It has been shown by Chandran et al. that position-verification using classical protocols is impossible against colluding adversaries (who control all positions except the prover's claimed position).[23] Under various restrictions on the adversaries, schemes are possible.

Under the name of 'quantum tagging', the first position-based quantum schemes have been investigated in 2002 by Kent. A US-patent[24] was granted in 2006, but the results only appeared in the scientific literature in 2010.[25] After several other quantum protocols for position verification have been suggested in 2010,[26][27] Buhrman et al. were able to show a general impossibility result:[28] using an enormous amount of quantum entanglement (they use a doubly exponential number of EPR pairs, in the number of qubits the honest player operates on), colluding adversaries are always able to make it look to the verifiers as if they were at the claimed position. However, this result does not exclude the possibility of practical schemes in the bounded- or noisy-quantum-storage model (see above). Later Beigi and Knig improved the amount of EPR pairs needed in the general attack against position-verification protocols to exponential. They also showed that a particular protocol remains secure against adversaries who controls only a linear amount of EPR pairs.[29]

A quantum cryptographic protocol is device-independent if its security does not rely on trusting that the quantum devices used are truthful. Thus the security analysis of such a protocol needs to consider scenarios of imperfect or even malicious devices. Mayers and Yao[30] proposed the idea of designing quantum protocols using "self-testing" quantum apparatus, the internal operations of which can be uniquely determined by their input-output statistics. Subsequently, Roger Colbeck in his Thesis[31] proposed the use of Bell tests for checking the honesty of the devices. Since then, several problems have been shown to admit unconditional secure and device-independent protocols, even when the actual devices performing the Bell test are substantially "noisy," i.e., far from being ideal. These problems include quantum key distribution,[32][33]randomness expansion,[33][34] and randomness amplification.[35]

Quantum computers may become a technological reality; it is therefore important to study cryptographic schemes used against adversaries with access to a quantum computer. The study of such schemes is often referred to as post-quantum cryptography. The need for post-quantum cryptography arises from the fact that many popular encryption and signature schemes (such as RSA and its variants, and schemes based on elliptic curves) can be broken using Shor's algorithm for factoring and computing discrete logarithms on a quantum computer. Examples for schemes that are, as of today's knowledge, secure against quantum adversaries are McEliece and lattice-based schemes. Surveys of post-quantum cryptography are available.[36][37]

There is also research into how existing cryptographic techniques have to be modified to be able to cope with quantum adversaries. For example, when trying to develop zero-knowledge proof systems that are secure against quantum adversaries, new techniques need to be used: In a classical setting, the analysis of a zero-knowledge proof system usually involves "rewinding", a technique that makes it necessary to copy the internal state of the adversary. In a quantum setting, copying a state is not always possible (no-cloning theorem); a variant of the rewinding technique has to be used.[38]

Post quantum algorithms are also called "quantum resistant", because unlike QKD it is not known or provable that there will not be potential future quantum attacks against them. Even though they are not vulnerable to Shor's algorithm the NSA are announcing plans to transition to quantum resistant algorithms.[39] The National Institute of Security and Technology (NIST) believes that it is time to think of quantum-safe primitives.[40]

Continued here:
Quantum cryptography - Wikipedia

Read More..

Computing on the boundary between conventional and quantum – Electronics Weekly

Along the way, they have shown that even simple error-prone quantum computers could have the edge over classical computers for some problems.

Until recently it has been difficult to say definitively when quantum computers can out-perform classical computers, said Professor Michael Bremner, chief investigator at the Australian Centre for Quantum Computation and Communication Technology. The big challenge for quantum complexity theorists over the last decade has been to find stronger evidence for the existence of the quantum frontier, and then to identify where it lives. Were now getting a sense of this, and beginning to understand the resources required to cross the frontier to solve problems that todays computers cant.

The team has identified quantum computations that require the least known physical resources required to go beyond the capabilities of classical computers and, according to Bremner, result indicate that full fault-tolerance may not be required.

To date, it has been widely accepted that error correction would be a necessary component of future quantum computers, but no one has yet been able to achieve this at a meaningful scale, said Bremner. Our work shows that while some level of error mitigation is needed to cross the quantum frontier, we may be able to outperform classical computers without the added design complexity of full fault tolerance.

Dr Ashley Montanaro of the University of Bristol works on the team.

The hope among scientists had always been that if the amount of noise in a quantum system was small enough then it would still be superior to a classical computer, however we have now shown that this probably isnt the case, at least for this particular class of computations, said Montanaro. We then realised that it is possible to use a classical encoding on a quantum circuit to overcome noise in a much simpler way to mitigate these errors. The effectiveness of this approach was surprising. What it suggests is that we could use such structures to develop new quantum algorithms in a way that can directly avoid certain types of errors.

Such intermediate quantum computers could be used in the medium term, while routes to full-scale universal quantum computers are sought.

Image credit Michael Bremner Australian Centre for Quantum Computation and Communication Technology

View post:
Computing on the boundary between conventional and quantum - Electronics Weekly

Read More..