Signature Schemes and Applications to Cryptographic Protocol Design by Anna Lysyanskaya Submitted to the Department of Electrical Engineering and Computer Science

Total Page:16

File Type:pdf, Size:1020Kb

Signature Schemes and Applications to Cryptographic Protocol Design by Anna Lysyanskaya Submitted to the Department of Electrical Engineering and Computer Science Signature Schemes and Applications to Cryptographic Protocol Design by Anna Lysyanskaya Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree )' MASSACHUSETTS INSTITUTE OF TECHNOLOGY Doctor of Philosophy NOV 18 2dO2 at the LIBRARIES MASSACHUSETTS INSTITUTE OF TECHNOLOGY BARKER September 2002 @ Massachusetts Institute of Technology 2002. All rights reserved. Author ................................ Department of Electrical Engineering and Computer Science September 4, 2002 Certified by................... .. ...... .. .. .. ..... Ronald L. Rivest Viterbi Professor of Computer Science Thesis Supervisor Accepted by ......... - . ............ Arthur C. Smith Chairman, Department Committee on Graduate Students Signature Schemes and Applications to Cryptographic Protocol Design by Anna Lysyanskaya Submitted to the Department of Electrical Engineering and Computer Science on September 4, 2002, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract Signature schemes are fundamental cryptographic primitives, useful as a stand-alone appli- cation, and as a building block in the design of secure protocols and other cryptographic objects. In this thesis, we study both the uses that signature schemes find in protocols, and the design of signature schemes suitable for a broad range of applications. An important application of digital signature schemes is an anonymous credential sys- tem. In such a system, one can obtain and prove possession of credentials without revealing any additional information. Such systems are the best means of balancing the need of indi- viduals for privacy with the need of large organizations to verify that the people they interact with have the required credentials. We show how to construct an efficient anonymous cre- dential system using an appropriate signature scheme; we then give an example of such a signature scheme. The resulting system is the first one with satisfactory communication and computation costs. The signature scheme we use to construct an anonymous credential system is of inde- pendent interest for use in other protocols. The special property of this signature scheme is that it admits an efficient protocol for a zero-knowledge proof of knowledge of a signature. Further, we consider the question of revocation of signatures. We obtain an efficient revocation scheme. This has immediate consequences for revocation of credentials in our credential system. We explore other uses for signature schemes as building blocks for designing crypto- graphic objects and secure protocols. We give a unique signature scheme which has impli- cations for verifiable random functions and for non-interactive zero-knowledge proofs. Finally, we consider the use of signatures for implementing a broadcast channel in a point-to-point network. It was previously shown that while broadcast was impossible with- out computational assumptions in a point-to-point network where one-third or more nodes exhibited adversarial behavior, using an appropriate set-up phase and a signature scheme, the impossibility could be overcome. We show that the situation is more complex than was previously believed. We consider the composition of protocols in this model, and discover severe limitations. We also show how to augment the model to overcome these limitations. Thesis Supervisor: Ronald L. Rivest Title: Viterbi Professor of Computer Science 3 4 Acknowledgments My experience as a graduate student at MIT has been amazing. It would not have been the same without my mentors and friends. First and foremost, I would like to thank my advisor Ron Rivest. Ron has been a perfect advisor for me, and I feel that I have been truly privileged to work under his supervision. I am grateful to him for giving me direction and confidence, for being patient, encouraging, and kind, and for everything that I learned from him. Silvio Micali has had a tremendous impact on the way that I perceive research and life in general. I am grateful to him for the interest that he has taken in helping me develop both as a researcher and as a teacher, and for his overflowing energy and enthusiasm. My sincere thanks to Shafi Goldwasser. Shafi has always taken an interest in my work, and I am grateful to her for her encouragement, kindness, and patience. I am very grateful to Madhu Sudan for always being friendly, open and helpful. I also thank him for inviting me to take part in organizing the theory seminar at MIT. My gratitude also goes to Charles Leiserson, who was my graduate counselor and helped me a great deal, always having some valuable insight and advice for me. The theory group at MIT's Lab for Computer Science has been a nurturing and stimulating environment. I am grateful to Leo Reyzin, whom I can always rely upon for finding an approach to any problem, technical or otherwise, and whose friendship I greatly value. I thank Yevgeniy Dodis for his sincerity and friendship, and for giving me many technical insights. Many thanks to Alantha Newman for being my friend and for her sincere help and support throughout my time at MIT. I am grateful to Tal Malkin who befriended me the moment that I arrived. Eric Lehman deserves special thanks for being my friend, as well as the Theory Jeopardy Tsar. I am grateful to Stas Jarecki, Moses Liskov, Tal Malkin, Chris Peikert, Zully Ramzan, Leo Reyzin, Amit Sahai and Adam Smith for fruitful research collaborations. I am also very grateful to Moses Liskov for sharing in my first teaching experience. Chocolate greatly helped! Thank you, Be Blackburn, for being the administrative mom of the theory group and for taking care of me! I am also grateful to Marilyn Pierce, the goddess of EECS. With grief over the events of September 11, 2001 and his tragic death, I thank Danny Lewin, who was my first officemate and took care of me while I was a clueless first-year. My two summers at IBM Zurich (1999 and 2000) were unforgettable. I am very grateful to Christian Cachin for making this experience possible, and to him, Victor Shoup and Jan Camenisch for hosting me there. Discussions with Victor have bene- fitted me greatly, and I am very grateful to him. Jan has been a great collaborator and a wonderful friend. The work I did jointly with Jan makes up a substantial part of my research experience, and part of this thesis is based on it. It has been a great pleasure to work with him. I am also happy to have collaborated with Klaus Kursawe. I am very grateful to the IBM T.J.Watson's Crypto group who hosted me during the summer of 2001. My thanks go to Tal Rabin, as well as Ran Canetti, Rosario 5 Gennaro, Shai Halevi, Nick Howgrave-Graham, and Yehuda Lindell, for giving me such a fun experience and for working with me on research problems. Part of this thesis is based on joint work with Tal and Yehuda. Many thanks to Peter Winkler, my mentor at Bell Laboratories, where I worked for two very happy summers (1997 and 1998), for teaching me to work on research problems, for advising me about life, and for all the great stories and beautiful puzzles he told me. I am very grateful to my Smith College undergraduate advisors, Joe O'Rourke and Phyllis Cassidy, for sending me on this path. I worked on my first research project under Joe's supervision, and I would like to thank him for his encouragement and enthusiasm. I would like to thank my roommates, Maja Razlog and Alice Wang, for putting up with me all this time and for being my closest friends. My love and gratitude to my parents, Nadezhda and Alexander Lysyansky, for everything-everything-everything. (Funding for my graduate studies has been provided by an NSF graduate research fellowship, Lucent Technologies graduate research program for women, and DARPA, Merrill Lynch and NTT grants given to Ron Rivest.) 6 Contents 1 Introduction 11 1.1 Digital Signature Schemes . ............ ........... 12 1.1.1 Use of Signatures in Protocols ............ ...... 14 1.1.2 Revocation of Signatures ... .................. 16 1.1.3 Unique Signatures ........................ 17 1.1.4 Other Applications of Signatures in Protocols ......... 18 1.2 Privacy of D ata .............................. 18 1.2.1 Review of Existing Technologies .. ............ ... 20 1.2.2 Identity and Anonymity in the Electronic Setting ....... 22 1.3 Summary of This Thesis ............ ............ 23 2 Preliminaries 25 2.1 N otation ........................ .......... 25 2.2 Definitions of Security for Signature Schemes .............. 26 2.3 Commitment Schemes ..................... ..... 27 2.3.1 Trapdoor commitments ............. ......... 28 2.4 Zero-Knowledge Proofs ...... ......... ........ ... 29 2.5 Proofs of Knowledge . ............. ............ 31 2.5.1 Concurrent Composition ..... ....... ........ 33 2.6 Protocols for Models with Public Parameters .............. 36 2.6.1 Concurrent Zero-knowledge Using Trapdoor Commitments .. 37 3 Anonymous Credential System 41 3.1 Formal Definitions and Requirements ... ............... 43 3.1.1 Definition of a Secure System Conforming to an Ideal-World Functionality ....... .................... 43 3.1.2 Ideal Basic Credential System Functionality ....... ... 46 3.2 Constructing a Basic Scheme using Signatures and Commitments . 47 3.2.1 Signing a Committed Value .... ............ ... 48 3.2.2 Basic Anonymous Credential System ...... ........ 49 3.2.3 Proof of Security ......................... 50 3.2.4 Discussion and Efficiency Analysis ................ 52 3.3 Building in Additional Desirable
Recommended publications
  • An Advance Visual Model for Animating Behavior of Cryptographic Protocols
    An Advance Visual Model for Animating Behavior of Cryptographic Protocols Mabroka Ali Mayouf Maeref1*, Fatma Alghali2, Khadija Abied2 1 Sebha University, Faculty of Science, Department of Computer Science, P. O. Box 18758 Sebha, Libya, Libyan. 2 Sebha University of Libya, Sebha, Libya. * Corresponding author. Tel.: 00218-925132935; email: [email protected] Manuscript submitted February 13, 2015; accepted July 5, 2015. doi: 10.17706/jcp.10.5.336-346 Abstract: Visual form description benefits from the ability of visualization to provide precise and clear description of object behavior especially if the visual form is extracted from the real world. It provides clear definition of object and the behavior of that object. Although the current descriptions of cryptographic protocol components and operations use a different visual representation, the cryptographic protocols behaviors are not actually reflected. This characteristic is required and included within our proposed visual model. The model uses visual form and scenario-based approach for describing cryptographic protocol behavior and thus increasing the ability to describe more complicated protocol in a simple and easy way. Key words: Animation, cryptographic protocols, interactive tool, visualization. 1. Introduction Cryptographic protocols (CPs) mostly combine both theory and practice [1], [2]. These cause protocol complexity describing and understanding. Therefore, separating the mathematical part from the protocol behavior should provide feeling of how the protocol works, thus increasing the ability to describe and to gain confidence in reflecting more complicated information about CPs, as well as to generate interest to know about other more complex protocol concepts. Several researchers realized the use of visual model and animation techniques to reflect the explanation of the learning objectives and their benefits [3]-[11].
    [Show full text]
  • Diamondoid Mechanosynthesis Prepared for the International Technology Roadmap for Productive Nanosystems
    IMM White Paper Scanning Probe Diamondoid Mechanosynthesis Prepared for the International Technology Roadmap for Productive Nanosystems 1 August 2007 D.R. Forrest, R. A. Freitas, N. Jacobstein One proposed pathway to atomically precise manufacturing is scanning probe diamondoid mechanosynthesis (DMS): employing scanning probe technology for positional control in combination with novel reactive tips to fabricate atomically-precise diamondoid components under positional control. This pathway has its roots in the 1986 book Engines of Creation, in which the manufacture of diamondoid parts was proposed as a long-term objective by Drexler [1], and in the 1989 demonstration by Donald Eigler at IBM that individual atoms could be manipulated by a scanning tunelling microscope [2]. The proposed DMS-based pathway would skip the intermediate enabling technologies proposed by Drexler [1a, 1b, 1c] (these begin with polymeric structures and solution-phase synthesis) and would instead move toward advanced DMS in a more direct way. Although DMS has not yet been realized experimentally, there is a strong base of experimental results and theory that indicate it can be achieved in the near term. • Scanning probe positional assembly with single atoms has been successfully demonstrated in by different research groups for Fe and CO on Ag, Si on Si, and H on Si and CNHCH3. • Theoretical treatments of tip reactions show that carbon dimers1 can be transferred to diamond surfaces with high fidelity. • A study on tip design showed that many variations on a design turn out to be suitable for accurate carbon dimer placement. Therefore, efforts can be focused on the variations of tooltips of many kinds that are easier to synthesize.
    [Show full text]
  • Nanorobot Construction Crews
    Nanorobot Construction Crews Jaeseung Jeong, Ph.D Department of Bio and Brain engineering, KAIST Nanorobotics • Nanorobotics is the technology of creating machines or robots atltthit or close to the microscopi c scal lfe of a nanomet res (10-9 metres). More specifically, nanorobotics refers to the still largely ‘hypothetical’ nanotechnology engineering discipline of designing and building nanorobots. • Nanorobots ((,,nanobots, nanoids, nanites or nanonites ) would be typically devices ranging in size from 0.1-10 micrometers and constructed of nanoscale or molecular components. As no artificial non-biological nanorobots have yet been created, they remain a ‘hypothetical’ concept. • Another definition sometimes used is a robot which allows precision interactions with nanoscale objects , or can manipulate with nanoscale resolution. • Followingggpp this definition even a large apparatus such as an atomic force microscope can be considered a nanorobotic instrument when configured to perform nanomanipulation. • Also, macroscalble robots or mi crorob ots which can move wi th nanoscale precision can also be considered nanorobots. The T-1000 in Terminator 2: Judggyment Day • Since nanorobots would be microscopic in size , it would probably be necessary for very large numbers of them to work together to perform microscopic and macroscopic tasks. • These nanorobot swarms are fdifound in many sci ence fi fitiction stories, such as The T-1000 in Terminator 2: Judgment Day, nanomachine i n Meta l G ear So lid. • The word "nanobot" (also "nanite",,g, "nanogene", or "nanoant") is often used to indicate this fictional context and is a n info rma l o r eve n pejo rat ive term to refer to the engineering concept of nanorobots.
    [Show full text]
  • Race in the Age of Obama Making America More Competitive
    american academy of arts & sciences summer 2011 www.amacad.org Bulletin vol. lxiv, no. 4 Race in the Age of Obama Gerald Early, Jeffrey B. Ferguson, Korina Jocson, and David A. Hollinger Making America More Competitive, Innovative, and Healthy Harvey V. Fineberg, Cherry A. Murray, and Charles M. Vest ALSO: Social Science and the Alternative Energy Future Philanthropy in Public Education Commission on the Humanities and Social Sciences Reflections: John Lithgow Breaking the Code Around the Country Upcoming Events Induction Weekend–Cambridge September 30– Welcome Reception for New Members October 1–Induction Ceremony October 2– Symposium: American Institutions and a Civil Society Partial List of Speakers: David Souter (Supreme Court of the United States), Maj. Gen. Gregg Martin (United States Army War College), and David M. Kennedy (Stanford University) OCTOBER NOVEMBER 25th 12th Stated Meeting–Stanford Stated Meeting–Chicago in collaboration with the Chicago Humanities Perspectives on the Future of Nuclear Power Festival after Fukushima WikiLeaks and the First Amendment Introduction: Scott D. Sagan (Stanford Introduction: John A. Katzenellenbogen University) (University of Illinois at Urbana-Champaign) Speakers: Wael Al Assad (League of Arab Speakers: Geoffrey R. Stone (University of States) and Jayantha Dhanapala (Pugwash Chicago Law School), Richard A. Posner (U.S. Conferences on Science and World Affairs) Court of Appeals for the Seventh Circuit), 27th Judith Miller (formerly of The New York Times), Stated Meeting–Berkeley and Gabriel Schoenfeld (Hudson Institute; Healing the Troubled American Economy Witherspoon Institute) Introduction: Robert J. Birgeneau (Univer- DECEMBER sity of California, Berkeley) 7th Speakers: Christina Romer (University of Stated Meeting–Stanford California, Berkeley) and David H.
    [Show full text]
  • A Matter of Security, Privacy and Trust
    A matter of security, privacy and trust: A study of the principles and values of encryption in New Zealand Michael Dizon Ryan Ko Wayne Rumbles Patricia Gonzalez Philip McHugh Anthony Meehan Acknowledgements This study was funded by grants from the New Zealand Law Foundation and the University of Waikato. We would like to express our gratitude to our project collaborators and members of the Advisory Board – Prof Bert-Jaap Koops (Tilburg University), Prof Lyria Bennett Moses (UNSW Sydney), Prof Alana Maurushat (Western Sydney University), and Associate Professor Alex Sims (University of Auckland) – for their support as well as feedback on specific parts of this report. We would also like to thank Patricia Gonzalez, Joseph Graddy, Philip McHugh, Anthony Meehan, Jean Murray and Peter Upson for their valuable research assistance and other contributions to this study. Michael Dizon, Ryan Ko and Wayne Rumbles Principal investigators December 2019 Executive summary Cybersecurity is crucial for ensuring the safety and well-being of the general public, businesses, government, and the country as a whole. New Zealand has a reasonably comprehensive and well-grounded legal regime and strategy for dealing with cybersecurity matters. However, there is one area that deserves further attention and discussion – encryption. Encryption is at the heart of and underpins many of the technologies and technical processes used for computer and network security, but current laws and policies do not expressly cover this significant technology. The principal objective of this study is to identify the principles and values of encryption in New Zealand with a view to informing future developments of encryption- related laws and policies.
    [Show full text]
  • Magic Adversaries Versus Individual Reduction: Science Wins Either Way ?
    Magic Adversaries Versus Individual Reduction: Science Wins Either Way ? Yi Deng1;2 1 SKLOIS, Institute of Information Engineering, CAS, Beijing, P.R.China 2 State Key Laboratory of Cryptology, P. O. Box 5159, Beijing ,100878,China [email protected] Abstract. We prove that, assuming there exists an injective one-way function f, at least one of the following statements is true: – (Infinitely-often) Non-uniform public-key encryption and key agreement exist; – The Feige-Shamir protocol instantiated with f is distributional concurrent zero knowledge for a large class of distributions over any OR NP-relations with small distinguishability gap. The questions of whether we can achieve these goals are known to be subject to black-box lim- itations. Our win-win result also establishes an unexpected connection between the complexity of public-key encryption and the round-complexity of concurrent zero knowledge. As the main technical contribution, we introduce a dissection procedure for concurrent ad- versaries, which enables us to transform a magic concurrent adversary that breaks the distribu- tional concurrent zero knowledge of the Feige-Shamir protocol into non-black-box construc- tions of (infinitely-often) public-key encryption and key agreement. This dissection of complex algorithms gives insight into the fundamental gap between the known universal security reductions/simulations, in which a single reduction algorithm or simu- lator works for all adversaries, and the natural security definitions (that are sufficient for almost all cryptographic primitives/protocols), which switch the order of qualifiers and only require that for every adversary there exists an individual reduction or simulator. 1 Introduction The seminal work of Impagliazzo and Rudich [IR89] provides a methodology for studying the lim- itations of black-box reductions.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • The Best Nurturers in Computer Science Research
    The Best Nurturers in Computer Science Research Bharath Kumar M. Y. N. Srikant IISc-CSA-TR-2004-10 http://archive.csa.iisc.ernet.in/TR/2004/10/ Computer Science and Automation Indian Institute of Science, India October 2004 The Best Nurturers in Computer Science Research Bharath Kumar M.∗ Y. N. Srikant† Abstract The paper presents a heuristic for mining nurturers in temporally organized collaboration networks: people who facilitate the growth and success of the young ones. Specifically, this heuristic is applied to the computer science bibliographic data to find the best nurturers in computer science research. The measure of success is parameterized, and the paper demonstrates experiments and results with publication count and citations as success metrics. Rather than just the nurturer’s success, the heuristic captures the influence he has had in the indepen- dent success of the relatively young in the network. These results can hence be a useful resource to graduate students and post-doctoral can- didates. The heuristic is extended to accurately yield ranked nurturers inside a particular time period. Interestingly, there is a recognizable deviation between the rankings of the most successful researchers and the best nurturers, which although is obvious from a social perspective has not been statistically demonstrated. Keywords: Social Network Analysis, Bibliometrics, Temporal Data Mining. 1 Introduction Consider a student Arjun, who has finished his under-graduate degree in Computer Science, and is seeking a PhD degree followed by a successful career in Computer Science research. How does he choose his research advisor? He has the following options with him: 1. Look up the rankings of various universities [1], and apply to any “rea- sonably good” professor in any of the top universities.
    [Show full text]
  • The Molecular Epair of the Rain, Part II by Ralph Merkle, Ph.D
    THIS ISSUE'S FEATURE: The Molecular epair of the rain, Part II By Ralph Merkle, Ph.D. Michael Perry, Ph.D. introduces us to "The Realities of Patient Storage" in this issue's For the Record lUS: Book Reviews, Relocation Reports, and Cryonics Fiction by Linda Dunn and Richard Shock ISSN 1054-4305 $4.50 "What is Cryonics?" Cryonics is the ultra-low-temperature preservation (biostasis) of terminal patients. The goal of biostasis and the technology of cryonics is the transport of today's terminal patients to a time in the future when cell and tissue repair technology will be available, and restoration to full function and health will be possible, a time when cures will exist for virtually all of today's diseases, including aging. As human knowledge and medical technology continue to expand in scope, people considered beyond hope of restoration (by today's medical standards) will be restored to health. (This historical trend is very clear.) The coming control over living systems should allow fabrication of new organisms and sub-cell-sized devices for repair and revival of patients waiting in cryonic suspension. The challenge for cryonicists today is to devise techniques that will ensure the patients' survival. Subscribe to CRY 0 ICS Magazine! CRYONICS magazine explores the practical, research, nanotechnology and molecular scientific, and social aspects of ultra­ engineering, book reviews, the physical low temperature pre­ format of memory and personality, the servation of humans. nature of identity, cryonics history, and As the quarterly much more. ·s FEAfURE' • .r h< • • f h THISISSUE oena\f'JI pu bl 1cat1on o t e •Ao\ecu\ar"' ~"h~>~'"''·~··o· C r If you're a first- The IV\ Bg Ra~1 RYfl'J\ Alcor Foundation-the THIS issuE's • ~L vJcs time subscriber, you p\1.\l.
    [Show full text]
  • Analysis and Implementation of the Messaging Layer Security Protocol
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AMS Tesi di Laurea Alma Mater Studiorum · Universita` di Bologna CAMPUS DI CESENA Dipartimento di Informatica - Scienza e Ingegneria Corso di Laurea Magistrale in Ingegneria e Scienze Informatiche Analysis and Implementation of the Messaging Layer Security Protocol Tesi in Sicurezza delle Reti Relatore: Presentata da: Gabriele D'Angelo Nicola Giancecchi Anno Accademico 2018/2019 Parole chiave Network Security Messaging MLS Protocol Ratchet Trees \Oh me, oh vita! Domande come queste mi perseguitano. Infiniti cortei d'infedeli, citt`agremite di stolti, che v'`edi nuovo in tutto questo, oh me, oh vita! Risposta: Che tu sei qui, che la vita esiste e l’identit`a. Che il potente spettacolo continua, e che tu puoi contribuire con un verso." - Walt Whitman Alla mia famiglia. Introduzione L'utilizzo di servizi di messaggistica su smartphone `eincrementato in maniera considerevole negli ultimi anni, complice la sempre maggiore disponi- bilit`adi dispositivi mobile e l'evoluzione delle tecnologie di comunicazione via Internet, fattori che hanno di fatto soppiantato l'uso dei classici SMS. Tale incremento ha riguardato anche l'utilizzo in ambito business, un contesto dove `epi`ufrequente lo scambio di informazioni confidenziali e quindi la necessit`adi proteggere la comunicazione tra due o pi`upersone. Ci`onon solo per un punto di vista di sicurezza, ma anche di privacy personale. I maggiori player mondiali hanno risposto implementando misure di sicurezza all'interno dei propri servizi, quali ad esempio la crittografia end-to-end e regole sempre pi`ustringenti sul trattamento dei dati personali.
    [Show full text]
  • Molecular Nanotechnology - Wikipedia, the Free Encyclopedia
    Molecular nanotechnology - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Molecular_manufacturing Molecular nanotechnology From Wikipedia, the free encyclopedia (Redirected from Molecular manufacturing) Part of the article series on Molecular nanotechnology (MNT) is the concept of Nanotechnology topics Molecular Nanotechnology engineering functional mechanical systems at the History · Implications Applications · Organizations molecular scale.[1] An equivalent definition would be Molecular assembler Popular culture · List of topics "machines at the molecular scale designed and built Mechanosynthesis Subfields and related fields atom-by-atom". This is distinct from nanoscale Nanorobotics Nanomedicine materials. Based on Richard Feynman's vision of Molecular self-assembly Grey goo miniature factories using nanomachines to build Molecular electronics K. Eric Drexler complex products (including additional Scanning probe microscopy Engines of Creation Nanolithography nanomachines), this advanced form of See also: Nanotechnology Molecular nanotechnology [2] nanotechnology (or molecular manufacturing ) Nanomaterials would make use of positionally-controlled Nanomaterials · Fullerene mechanosynthesis guided by molecular machine systems. MNT would involve combining Carbon nanotubes physical principles demonstrated by chemistry, other nanotechnologies, and the molecular Nanotube membranes machinery Fullerene chemistry Applications · Popular culture Timeline · Carbon allotropes Nanoparticles · Quantum dots Colloidal gold · Colloidal
    [Show full text]
  • Party Time for Mathematicians in Heidelberg
    Mathematical Communities Marjorie Senechal, Editor eidelberg, one of Germany’s ancient places of Party Time HHlearning, is making a new bid for fame with the Heidelberg Laureate Forum (HLF). Each year, two hundred young researchers from all over the world—one for Mathematicians hundred mathematicians and one hundred computer scientists—are selected by application to attend the one- week event, which is usually held in September. The young in Heidelberg scientists attend lectures by preeminent scholars, all of whom are laureates of the Abel Prize (awarded by the OSMO PEKONEN Norwegian Academy of Science and Letters), the Fields Medal (awarded by the International Mathematical Union), the Nevanlinna Prize (awarded by the International Math- ematical Union and the University of Helsinki, Finland), or the Computing Prize and the Turing Prize (both awarded This column is a forum for discussion of mathematical by the Association for Computing Machinery). communities throughout the world, and through all In 2018, for instance, the following eminences appeared as lecturers at the sixth HLF, which I attended as a science time. Our definition of ‘‘mathematical community’’ is journalist: Sir Michael Atiyah and Gregory Margulis (both Abel laureates and Fields medalists); the Abel laureate the broadest: ‘‘schools’’ of mathematics, circles of Srinivasa S. R. Varadhan; the Fields medalists Caucher Bir- kar, Gerd Faltings, Alessio Figalli, Shigefumi Mori, Bào correspondence, mathematical societies, student Chaˆu Ngoˆ, Wendelin Werner, and Efim Zelmanov; Robert organizations, extracurricular educational activities Endre Tarjan and Leslie G. Valiant (who are both Nevan- linna and Turing laureates); the Nevanlinna laureate (math camps, math museums, math clubs), and more.
    [Show full text]