Menu

Blog

Page 5773

Dec 17, 2020

China’s quantum computer a step, not a leap

Posted by in categories: quantum physics, supercomputing

On December 3, Science magazine published a scientific paper by Chinese scientists on the results of experiments with a prototype quantum computer.

It was widely reported in the media that the Chinese system needed only 200 seconds to carry out a computation that would take over two billion years using the fastest supercomputer existing today.

The experiments were designed and carried out by a top-level research group led by Pan Jianwei and Lu Chaoyang of the University of Science and Technology in Hefei, China. Pan is one of the most famous Chinese physicists today, referred to once in Nature magazine as the “Father of the Quantum.”

Dec 17, 2020

Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states

Posted by in categories: computing, encryption, quantum physics, security

Quantum key distribution is one kind of important cryptographic protocols based on quantum mechanics, in which any outside eavesdropper attempting to obtain the secret key shared by two users will be detected. The successful detection comes from Heisenberg’s uncertainty principle: the measurement of a quantum system, which is required to obtain information of that system, will generally disturb it. The disturbances provide two users with the information that there exists an outside eavesdropper, and they can therefore abort the communication. Nowadays, most people need to share some of their private information for certain services such as products recommendation for online shopping and collaborations between two companies depending on their comm interests. Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA), which are two primitives in cryptography, involve two or more users who intend to obtain the cardinalities of the intersection and the union of their private sets through the minimum information disclosure of their sets1,2,3.

The definition of Private Set Intersection (PSI), also called Private Matching (PM), was proposed by Freedman4. They employed balanced hashing and homomorphic encryption to design two PSI protocols and also investigated some variants of PSI. In 2012, Cristofaro et al.1 developed several PSI-CA and PSU-CA protocols with linear computation and communication complexity based on the Diffie-Hellman key exchange which blinds the private information. Their protocols were the most efficient compared with the previous classical related ones. There are also other classical PSI-CA or PSU-CA protocols5,6,7,8. Nevertheless, the security of these protocols relies on the unproven difficulty assumptions, such as discrete logarithm, factoring, and quadratic residues assumptions, which will be insecure when quantum computers are available9,10,11.

For the sake of improving the security of PSI-CA protocols for two parties, Shi et al.3 designed a probabilistic protocol where multi-qubit entangled states, complicated oracle operators, and measurements in high N-dimensional Hilbert space were utilized. And the same method in Ref.3 was later used to develop a PSI-CA protocol for multiple parties12. For easy implementation of a protocol, Shi et al.13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.3. In both protocols Ref.3 and Ref.13, only two parties who intend to get the cardinalities of the intersection and the union of their private sets are involved. Although Ref.12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems. Inspired by Shi et al.’s work, we are thus trying to design a three-party protocol to solve PSI-CA and PSU-CA problems, where every two and three parties can obtain the cardinalities of the intersection and the union of their respective private sets with the aid of a semi-honest third party (TP). TP is semi-honest means that he loyally executes the protocol, makes a note of all the intermediate results, and might desire to take other parties’ private information, but he cannot collude with dishonest parties. We then give a detailed analysis of the presented protocol’s security. Besides, the influence of six typical kinds of Markovian noise on our protocol is also analyzed.

Dec 17, 2020

Mobile Protected Firepower: The U.S. Army’s New Light Tank

Posted by in categories: biotech/medical, innovation

In a press release, the U.S. Army announced that initial Mobile Protected Firepower (MPF) prototypes arrived at Fort Bragg, North Carolina. The preproduction MPF vehicles will be put through their paces by paratroopers from the Army’s 82 Airborne.

“We are incredibly excited to see the MPF platform entering into this phase,” an Army Ground Combat Systems official stated, explaining that the “MPF represents an innovative and aggressive approach to system acquisition. The beginning of our SVA (soldier vehicle assessment) in January illustrates how hard the teams are working to keep the major events of this program on schedule,” despite the ongoing pandemic.

The Army awarded two initial prototyping contracts to both BAE Systems and General Dynamics back in 2018. The contracts, worth $376 million each, covered a total of 504 final production Mobile Protected Firepower vehicles, with initial deliveries scheduled for 2025.

Dec 17, 2020

NASA Makes Blue Origin Eligible to Launch Future Missions Without Crews

Posted by in category: space travel

Jeff Bezos and his company’s New Glenn rocket, which hasn’t yet flown, received the nod to potentially carry scientific payloads later this decade.


WSJ Membership.

Dec 17, 2020

Japan’s New Fighter Jet Will Have Wild Tech, Like Microwave Weapons

Posted by in category: military

Japan will build its next-gen fighter jet with the help of defense contractor Lockheed Martin. The unnamed fighter will be designed primarily to shoot down enemy planes, but will also have the ability to strike ground targets.

✈ You love badass planes. So do we. Let’s nerd out over them together.

Dec 17, 2020

Superhumans: The remarkable brain waves of high-level meditators

Posted by in category: neuroscience

! 😃


People who have meditated for thousands of hours exhibit a remarkable difference in their brainwaves. Psychologist and author Daniel Goleman says we can actually see what happens in the heads of those who have achieved “enlightenment” and the results are unprecedented in science.

Dec 17, 2020

Fujifilm, IBM unveil 580-terabyte magnetic tape

Posted by in categories: computing, particle physics

When it comes to magnetic tape storage capacity, smaller is larger. That is, as the magnetic particles that store data become smaller, more data can be stockpiled in the same amount of space.

Two leading tech giants put that simple principle to work and announced Wednesday that they have developed a magnetic tape cartridge boasting the most dense capacity of any media in the world. Fujifilm and IBM say research into a new material, strontium , led to the creation of a tape cartridge capable of storing 580 terabytes of data. That’s enough to store roughly 580 million books, according to an IBM blog post published Wednesday.

Considering there are about only 130 million books in existence today, that’ll leave plenty of room for extras.

Dec 17, 2020

Report: Electric Cars Could Be Cheaper Than Gas Ones in Just 2 Years

Posted by in categories: sustainability, transportation

Kill a Watt

The reason why the price of energy storage is such an important automotive indicator is because the battery pack accounts for roughly a quarter of an EV’s total cost, making it the number one determinant of price.

It could be the electric car industry’s watershed moment: once dipping below the price of gasoline-powered engines, electric vehicles will look far more attractive to far more consumers.

Dec 17, 2020

France Says It’s Working on Bionic Supersoldiers Because Everybody Else Is Doing It

Posted by in categories: cyborgs, ethics, military, transhumanism

The French military is starting exploratory work on the development of bionic supersoldiers, which officials describe as a necessary part of keeping pace with the rest of the world.

A military ethics committee gave its blessing to begin developing supersoldiers on Tuesday, according to The BBC, balancing the moral implications of augmenting and altering humanity with the desire to innovate and enhance the military’s capabilities. With the go-ahead, France joins countries like the U.S., Russia, and China that are reportedly attempting to give their soldiers high-tech upgrades.

Dec 17, 2020

Leaked Meeting: Facebook Working on Device to Read Your Brain

Posted by in category: neuroscience

Pre-Emptive Defense

All the same, Schroepfer seemed to acknowledge that getting people to actually use the tech might be a hard sell, according to the leaked meeting audio acquired by BuzzFeed News.

“We have to build responsibly to earn trust and the right to continue to grow,” Schroepfer said. “It’s imperative that we get this right so that people around the world get all these amazing technologies… without experiencing the downsides.”