Quantum internet—applications, functionalities, enabling technologies, challenges, and research directions

A Singh, K Dev, H Siljak, HD Joshi… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The advanced notebooks, mobile phones, and Internet applications in today's world that we
use are all entrenched in classical communication bits of zeros and ones. Classical Internet …

Private retrieval, computing, and learning: Recent progress and future challenges

S Ulukus, S Avestimehr, M Gastpar… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …

Instahide: Instance-hiding schemes for private distributed learning

Y Huang, Z Song, K Li, S Arora - International conference on …, 2020 - proceedings.mlr.press
How can multiple distributed entities train a shared deep net on their private data while
protecting data privacy? This paper introduces InstaHide, a simple encryption of training …

The capacity of private information retrieval

H Sun, SA Jafar - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
In the private information retrieval (PIR) problem, a user wishes to retrieve, as efficiently as
possible, one out of K messages from N non-communicating databases (each holds all K …

Private information retrieval

B Chor, E Kushilevitz, O Goldreich… - Journal of the ACM (JACM), 1998 - dl.acm.org
Publicly accessible databases are an indispensable resource for retrieving up-to-date
information. But they also pose a significant risk to the privacy of the user, since a curious …

The capacity of robust private information retrieval with colluding databases

H Sun, SA Jafar - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one
out of K messages from N non-communicating replicated databases (each holds all K …

Towards sound approaches to counteract power-analysis attacks

S Chari, CS Jutla, JR Rao, P Rohatgi - Advances in Cryptology—CRYPTO' …, 1999 - Springer
Side channel cryptanalysis techniques, such as the analysis of instantaneous power
consumption, have been extremely effective in attacking implementations on simple …

New algorithms for secure outsourcing of modular exponentiations

X Chen, J Li, J Ma, Q Tang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the rapid development of cloud services, the techniques for securely outsourcing the
prohibitively expensive computations to untrusted servers are getting more and more …

Proofs of work and bread pudding protocols

M Jakobsson, A Juels - … and Multimedia Security IFIP TC6/TC11 Joint …, 1999 - Springer
We formalize the notion of a proof of work (POW). In many cryptographic protocols, a prover
seeks to convince a verifier that she possesses knowledge of a secret or that a certain …

Universal blind quantum computation

A Broadbent, J Fitzsimons… - 2009 50th annual IEEE …, 2009 - ieeexplore.ieee.org
We present a protocol which allows a client to have a server carry out a quantum
computation for her such that the client's inputs, outputs and computation remain perfectly …