-
Secret Sharing with a Single d-level Quantum System
Authors:
Armin Tavakoli,
Isabelle Herbauts,
Marek Zukowski,
Mohamed Bourennane
Abstract:
We give an example of a wide class of problems for which quantum information protocols based on multi-system entanglement can be mapped into much simpler ones involving one system. Secret sharing is a cryptographic primitive which plays a central role in various secure multiparty computation tasks and management of keys in cryptography. In secret sharing protocols, a classical message is divided i…
▽ More
We give an example of a wide class of problems for which quantum information protocols based on multi-system entanglement can be mapped into much simpler ones involving one system. Secret sharing is a cryptographic primitive which plays a central role in various secure multiparty computation tasks and management of keys in cryptography. In secret sharing protocols, a classical message is divided into shares given to recipient parties in such a way that some number of parties need to collaborate in order to reconstruct the message. Quantum protocols for the task commonly rely on multi-partite GHZ entanglement. We present a multiparty secret sharing protocol which requires only sequential communication of a single quantum d-level system (for any prime d). It has huge advantages in scalabilility and can be realized with the state of the art technology. n be realized with the state of the art technology.
△ Less
Submitted 15 June, 2015; v1 submitted 22 January, 2015;
originally announced January 2015.
-
Quantum Byzantine Agreement via Hardy correlations and entanglement swap**
Authors:
Ramij Rahaman,
Marcin Wieśniak,
Marek Żukowski
Abstract:
We present a device-independent quantum scheme for the {\em Byzantine Generals} problem. The protocol is for three parties. Party $C$ is to send two identical one bit messages to parties $A$ and $B$. The receivers $A$ and $B$ may exchange two one bit messages informing the other party on the message received from $C$. A bit flip** error in one of the transmissions, does not allow the receiving p…
▽ More
We present a device-independent quantum scheme for the {\em Byzantine Generals} problem. The protocol is for three parties. Party $C$ is to send two identical one bit messages to parties $A$ and $B$. The receivers $A$ and $B$ may exchange two one bit messages informing the other party on the message received from $C$. A bit flip** error in one of the transmissions, does not allow the receiving parties to establish what was the message of $C$. Our quantum scheme has the feature that if the messages of the Byzantine protocol are readable (that is give an unambiguous bit value for any of the receivers), then any error by $C$ (cheating by one of the commanding general) is impossible. $A$ and $B$ do not have to exchange protocol messages to be sure of this.
△ Less
Submitted 7 August, 2014;
originally announced August 2014.
-
From Cooperative Scans to Predictive Buffer Management
Authors:
Michał Świtakowski,
Peter Boncz,
Marcin Żukowski
Abstract:
In analytical applications, database systems often need to sustain workloads with multiple concurrent scans hitting the same table. The Cooperative Scans (CScans) framework, which introduces an Active Buffer Manager (ABM) component into the database architecture, has been the most effective and elaborate response to this problem, and was initially developed in the X100 research prototype. We now r…
▽ More
In analytical applications, database systems often need to sustain workloads with multiple concurrent scans hitting the same table. The Cooperative Scans (CScans) framework, which introduces an Active Buffer Manager (ABM) component into the database architecture, has been the most effective and elaborate response to this problem, and was initially developed in the X100 research prototype. We now report on the the experiences of integrating Cooperative Scans into its industrial-strength successor, the Vectorwise database product. During this implementation we invented a simpler optimization of concurrent scan buffer management, called Predictive Buffer Management (PBM). PBM is based on the observation that in a workload with long-running scans, the buffer manager has quite a bit of information on the workload in the immediate future, such that an approximation of the ideal OPT algorithm becomes feasible. In the evaluation on both synthetic benchmarks as well as a TPC-H throughput run we compare the benefits of naive buffer management (LRU) versus CScans, PBM and OPT; showing that PBM achieves benefits close to Cooperative Scans, while incurring much lower architectural impact.
△ Less
Submitted 20 August, 2012;
originally announced August 2012.