Matching Items (4)
Description
Fueled by fear in the post-9/11 United States, American intelligence agencies conduct dragnet data collection on global communication. Despite the intention of surveillance as preventative counter-terrorism action, the default search and seizure of global communication poses a threat to our constitutional rights and individual autonomy. This is the case especially

Fueled by fear in the post-9/11 United States, American intelligence agencies conduct dragnet data collection on global communication. Despite the intention of surveillance as preventative counter-terrorism action, the default search and seizure of global communication poses a threat to our constitutional rights and individual autonomy. This is the case especially for people who may be thought of as in opposition to our current political climate, such as immigrants, people of color, women, people practicing non-western religions, people living outside of the United States, activists, persons engaging in political dissent, and people with intersecting identities. Throughout the Fall and Spring semesters, I have done research, conducted visual experiments and designed exploratory projects in order to more thoroughly identify the issue and explore the ways in which visual communication design can aid in the conversation surrounding global surveillance. It was the intention of my fourth year social issue projects to explore the role of visual communication design in the dialogue surrounding surveillance, principally focusing on the responsibility visual communication design has in spreading ideas about how to globally subvert surveillance until governments disclose information about their unconstitutional actions or until whistleblowers do it for them. My final project, the fourth year social issue exhibit, focuses on how improving our personal password habits can help us gain agency in digital spaces. Using the randomness of rolling a dice to generate entropy can help us generate stronger passwords in order to secure sensitive information online. Using design as a method of communication, my fourth year social issue exhibit shared information about how encrypted passwords can act as the first line of defense in protecting ourselves from invasive data collection and malicious internet activity.
ContributorsBailey, Lauren Nicole (Author) / Sanft, Alfred (Thesis director) / Heywood, William (Committee member) / The Design School (Contributor) / School of Social Transformation (Contributor) / School of Art (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
187804-Thumbnail Image.png
Description
Quantum computing is becoming more accessible through modern noisy intermediate scale quantum (NISQ) devices. These devices require substantial error correction and scaling before they become capable of fulfilling many of the promises that quantum computing algorithms make. This work investigates the current state of NISQ devices by implementing multiple classical

Quantum computing is becoming more accessible through modern noisy intermediate scale quantum (NISQ) devices. These devices require substantial error correction and scaling before they become capable of fulfilling many of the promises that quantum computing algorithms make. This work investigates the current state of NISQ devices by implementing multiple classical computing scenarios with a quantum analog to observe how current quantum technology can be leveraged to achieve different tasks. First, quantum homomorphic encryption (QHE) is applied to the quantum teleportation protocol to show that this form of algorithm security is possible to implement with modern quantum computing simulators. QHE is capable of completely obscuring a teleported state with a liner increase in the number of qubit gates O(n). Additionally, the circuit depth increases minimally by only a constant factor O(c) when using only stabilizer circuits. Quantum machine learning (QML) is another potential application of NISQ technology that can be used to modify classical AI. QML is investigated using quantum hybrid neural networks for the classification of spoken commands on live audio data. Additionally, an edge computing scenario is examined to profile the interactions between a quantum simulator acting as a cloud server and an embedded processor board at the network edge. It is not practical to embed NISQ processors at a network edge, so this paradigm is important to study for practical quantum computing systems. The quantum hybrid neural network (QNN) learned to classify audio with equivalent accuracy (~94%) to a classical recurrent neural network. Introducing quantum simulation slows the systems responsiveness because it takes significantly longer to process quantum simulations than a classical neural network. This work shows that it is viable to implement classical computing techniques with quantum algorithms, but that current NISQ processing is sub-optimal when compared to classical methods.
ContributorsYarter, Maxwell (Author) / Spanias, Andreas (Thesis advisor) / Arenz, Christian (Committee member) / Dasarathy, Gautam (Committee member) / Arizona State University (Publisher)
Created2023
164346-Thumbnail Image.png
Description

Th NTRU cryptosystem is a lattice-based encryption scheme. Several parameters determine the speed, size, correctness rate and security of the algorithm. These parameters need to be carefully selected for the algorithm to function correctly. This thesis includes a short overview of the NTRU algorithm and its mathematical background before discussing

Th NTRU cryptosystem is a lattice-based encryption scheme. Several parameters determine the speed, size, correctness rate and security of the algorithm. These parameters need to be carefully selected for the algorithm to function correctly. This thesis includes a short overview of the NTRU algorithm and its mathematical background before discussing the results of experimentally testing various different parameter sets for NTRU and determining the effect that different relationships between these parameters have on the overall effectiveness of NTRU.

ContributorsPeterson, Steven (Author) / Jones, John (Thesis director) / Sprung, Florian (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2022-05
158005-Thumbnail Image.png
Description
The traditional access control system suffers from the problem of separation of data ownership and management. It poses data security issues in application scenarios such as cloud computing and blockchain where the data owners either do not trust the data storage provider or even do not know who would have

The traditional access control system suffers from the problem of separation of data ownership and management. It poses data security issues in application scenarios such as cloud computing and blockchain where the data owners either do not trust the data storage provider or even do not know who would have access to their data once they are appended to the chain. In these scenarios, the data owner actually loses control of the data once they are uploaded to the outside storage. Encryption-before-uploading is the way to solve this issue, however traditional encryption schemes such as AES, RSA, ECC, bring about great overheads in key management on the data owner end and could not provide fine-grained access control as well.

Attribute-Based Encryption (ABE) is a cryptographic way to implement attribute-based access control, which is a fine-grained access control model, thus solving all aforementioned issues. With ABE, the data owner would encrypt the data by a self-defined access control policy before uploading the data. The access control policy is an AND-OR boolean formula over attributes. Only users with attributes that satisfy the access control policy could decrypt the ciphertext. However the existing ABE schemes do not provide some important features in practical applications, e.g., user revocation and attribute expiration. Furthermore, most existing work focus on how to use ABE to protect cloud stored data, while not the blockchain applications.

The main objective of this thesis is to provide solutions to add two important features of the ABE schemes, i.e., user revocation and attribute expiration, and also provide a practical trust framework for using ABE to protect blockchain data. To add the feature of user revocation, I propose to add user's hierarchical identity into the private attribute key. In this way, only users whose identity is not revoked and attributes satisfy the access control policy could decrypt the ciphertext. To add the feature of attribute expiration, I propose to add the attribute valid time period into the private attribute key. The data would be encrypted by access control policy where all attributes have a temporal value. In this way, only users whose attributes both satisfy the access policy and at the same time these attributes do not expire,

are allowed to decrypt the ciphertext. To use ABE in the blockchain applications, I propose an ABE-enabled trust framework in a very popular blockchain platform, Hyperledger Fabric. Based on the design, I implement a light-weight attribute certificate authority for attribute distribution and validation; I implement the proposed ABE schemes and provide a toolkit which supports system setup, key generation,

data encryption and data decryption. All these modules were integrated into a demo system for protecting sensitive les in a blockchain application.
ContributorsDong, Qiuxiang (Author) / Huang, Dijiang (Thesis advisor) / Sen, Arunabha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2020