저널 Read more :: arXiv Measurement-device-independent quantum cryptography In theory, quantum key distribution (QKD) provides information-theoretic security based on the laws of physics. Owing to the imperfections of real-life implementations, however, there is a big gap between the theory and practice of QKD, which has been recently exploited by several quantum hacking activities. To fill this gap, a novel approach, called measurement-device-independent QKD (mdiQKD), has been proposed. It can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKD systems, thus offering a clear avenue towards secure QKD realisations. Here, we review the latest developments in the framework of mdiQKD, together with its assumptions, strengths and weaknesses.
강의 Read more :: MIT OpenCourseWare Advanced Topics in Cryptography The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.
연구과제 Read more :: HORIZON 2020 Access Control Topic Description Scope:Specific challenge: Security includes granting access only to the people that are entitled to it. Currently the most widespread approach relies on passwords. Managing the passwords has its limits and poses a challenge to the user, which adds vulnerabilities. Common practice is to use the same or similar password, which increases significantly the risk should the password be broken. Scope: The focus is on the development and testing of usable, economic and privacy preserving access control platforms based on the use of biometrics, smart cards, or other devices. The solutions are to be installed and tested in a broad-band network, giving access to smart services running over networks with state-of-the-art security, avoiding single points of failure. Proposed work should include the management of the access rights in particular for the service providers, ensure the security and privacy of the databases, facilitate a timely breach notification and remediation to the user, and reduce the insider threat.The proposed solutions have to guarantee interoperability and portability between systems and services, sparing the user to have to install a platform, service or country specific technology. Proposed work could assist the objective of implementing a secure information sharing network.The Commission considers that proposals requesting a contribution from the EU of between €3m and €8m EURO would allow this topic to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.Proposals have to address the specific needs of the end-user, private and public security end user alike. Proposals are encouraged to include public security end-users and/or private end users.Expected impact: Actions supported under this objective will deliver secure, but user-friendly, access to ICT systems, services and infrastructures, resulting in a consumerisation of devices for access control. The level of security of online services and critical infrastructures protected by these access systems should be demonstratably higher than by the state-of-the-art approach. The proposed solutions are expected to support the creation of commercial services making use of electronic identification and authentication. Type of action: Innovation actions Topic conditions and documents Please read carefully all provisions below before the preparation of your application. To see the budget earmarked for this topic, please look at the call budget distribution table by topic. List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme. Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme Evaluation 3.1 Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme 3.2 Guide to the submission and evaluation process Proposal page limits and layout: Please refer to Part B of the standard proposal template. Indicative timetable for evaluation and grant agreement: Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission. Signature of grant agreements: maximum 3 months from the date of informing successful applicants. Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic: Innovation Action: Specific provisions and funding rates Standard proposal template (administrative forms and structure of technical annex) Standard evaluation form Annotated Model Grant Agreement Additional provisions: Horizon 2020 budget flexibility Classified information Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved. Additional documents Flash Call Info en Legal basis - Specific Programme H2020 en WP H2020 - 1. Introduction en WP H2020 - 14. Secure societies - protecting freedom and security of Europe and its citizens en WP H2020 - 17. Communication and Dissemination en Budget Table en A guide to ICT-related activities in WP2014-15 en Get support National Contact Points (NCP) – contact your NCP for further assistance. Enterprise Europe Network – contact your EEN national contact point for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding. B2Match networking platform with project ideas and participant profiles following the networking event in ICT 2013 in Vilnius Ideal-IST partner search facility Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular. IT Helpdesk – contact the Participant Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc. Ethics – to ensure compliance with ethical issues, further information is available on the Participant Portal and on the Science and Society Portal. European IPR Helpdesk assists you on intellectual property issues. The European Charter for Researchers and the Code of Conduct for their recruitment CEN and CENELEC, the European Standards Organisations, advise you how to tackle standardisation in your project proposal. Contact CEN-CENELEC Research Helpdesk at firstname.lastname@example.org. Partner Search Services helps you find a partner organisation for your proposal. H2020 Online Manual your online guide on the procedures from proposal submission to managing your grant.