Skip to main content

Showing 1–5 of 5 results for author: Venkatachalam, N

.
  1. arXiv:2211.17019  [pdf, other

    cs.CR

    Real time QKD Post Processing based on Reconfigurable Hardware Acceleration

    Authors: Foram P Shingala, Natarajan Venkatachalam, Selvagangai C, Hema Priya S, Dillibabu S, Pooja Chandravanshi, Ravindra P. Singh

    Abstract: Key Distillation is an essential component of every Quantum Key Distribution system because it compensates the inherent transmission errors of quantum channel. However, throughput and interoperability aspects of post-processing engine design often neglected, and exiting solutions are not providing any guarantee. In this paper, we propose multiple protocol support high throughput key distillation f… ▽ More

    Submitted 30 November, 2022; originally announced November 2022.

  2. Unconditionally secure digital signatures implemented in an 8-user quantum network

    Authors: Yoann Pelet, Ittoop Vergheese Puthoor, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Erika Andersson, John G. Rarity, Djeylan Aktas, Siddarth Koduru Joshi

    Abstract: The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forg… ▽ More

    Submitted 10 February, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: Preprint, 9 pages, 7 figures, 1 table

  3. arXiv:2202.01543  [pdf, other

    cs.CR cs.DC

    Design and Development of Automated Threat Hunting in Industrial Control Systems

    Authors: Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam

    Abstract: Traditional industrial systems, e.g., power plants, water treatment plants, etc., were built to operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) have been exposed to the Internet for ease of access and adaptation to advanced technologies. However, it creates security vulnerabilities. Attackers often exploit these vulnerabilities to launch an attack on IC… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

  4. Scalable authentication and optimal flooding in a quantum network

    Authors: Naomi R. Solomons, Alasdair I. Fletcher, Djeylan Aktas, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian P. Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Stefano Pirandola, John G. Rarity, Siddarth Koduru Joshi

    Abstract: The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network te… ▽ More

    Submitted 21 June, 2023; v1 submitted 28 January, 2021; originally announced January 2021.

    Comments: New version includes changes suggested by referees, and a modification to an incorrect calculation. Fig. 6 has been updated correspondingly. With thanks to Rui Wang for spotting the mistake, and the referees for detailed feedback

    Journal ref: PRX Quantum 3, 020311 (2022)

  5. arXiv:2011.09480  [pdf, other

    quant-ph cs.CR cs.ET

    Experimental implementation of secure anonymous protocols on an eight-user quantum network

    Authors: Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda O. Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Laurent Kling, Mario Stipčević, Rupert Ursin, John G. Rarity

    Abstract: Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polar… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: 11 pages, 4 figures, 1 table, experimental work. ZH and SKJ contributed equally to this work and are joint first authors