Search results for: Mykhailo Moskalets
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2

Search results for: Mykhailo Moskalets

2 Spin-Dipole Excitations Produced On-Demand in the Fermi Sea

Authors: Mykhailo Moskalets, Pablo Burset, Benjamin Roussel, Christian Flindt

Abstract:

The single-particle injection from the Andreev level and how such injection is simulated using a voltage pulse are discussed. Recently, high-speed quantum-coherent electron sources injecting one- to few-particle excitations into the Fermi sea have been experimentally realized. The main obstacle to using these excitations as flying qubits for quantum-information processing purposes is decoherence due to the long-range Coulomb interaction. An obvious way to get around this difficulty is to employ electrically neutral excitations. Here it is discussed how such excitations can be generated on-demand using the same injection principles as in existing electron sources. Namely, with the help of a voltage pulse of a certain shape applied to the Fermi sea or using a driven quantum dot with superconducting correlations. The advantage of the latter approach is the possibility of varying the electron-hole content in the excitation and the possibility of creating a charge-neutral but spin-dipole excitation.

Keywords: Andreev level, on-demand, single-electron, spin-dipole

Procedia PDF Downloads 89
1 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 195