-
Victim-Centred Abuse Investigations and Defenses for Social Media Platforms
Authors:
Zaid Hakami,
Ashfaq Ali Shafin,
Peter J. Clarke,
Niki Pissinou,
Bogdan Carbunar
Abstract:
Online abuse, a persistent aspect of social platform interactions, impacts user well-being and exposes flaws in platform designs that include insufficient detection efforts and inadequate victim protection measures. Ensuring safety in platform interactions requires the integration of victim perspectives in the design of abuse detection and response systems. In this paper, we conduct surveys (n = 2…
▽ More
Online abuse, a persistent aspect of social platform interactions, impacts user well-being and exposes flaws in platform designs that include insufficient detection efforts and inadequate victim protection measures. Ensuring safety in platform interactions requires the integration of victim perspectives in the design of abuse detection and response systems. In this paper, we conduct surveys (n = 230) and semi-structured interviews (n = 15) with students at a minority-serving institution in the US, to explore their experiences with abuse on a variety of social platforms, their defense strategies, and their recommendations for social platforms to improve abuse responses. We build on study findings to propose design requirements for abuse defense systems and discuss the role of privacy, anonymity, and abuse attribution requirements in their implementation. We introduce ARI, a blueprint for a unified, transparent, and personalized abuse response system for social platforms that sustainably detects abuse by leveraging the expertise of platform users, incentivized with proceeds obtained from abusers.
△ Less
Submitted 3 March, 2025;
originally announced March 2025.
-
Realization of Quantum Digital Signatures without the requirement of quantum memory
Authors:
Robert J. Collins,
Ross J. Donaldson,
Vedran Dunjko,
Petros Wallden,
Patrick J. Clarke,
Erika Andersson,
John Jeffers,
Gerald S. Buller
Abstract:
Digital signatures are widely used to provide security for electronic communications, for example in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures (QDS) offer information-theoretic security based on laws of quantum mechanics (e.g. Got…
▽ More
Digital signatures are widely used to provide security for electronic communications, for example in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures (QDS) offer information-theoretic security based on laws of quantum mechanics (e.g. Gottesman and Chuang 2001). Here, security against forging relies on the impossibility of perfectly distinguishing between non-orthogonal quantum states. A serious drawback of previous QDS schemes is however that they require long-term quantum memory, making them unfeasible in practice. We present the first realisation of a scheme (Dunjko et al 2013) that does not need quantum memory, and which also uses only standard linear optical components and photodetectors. To achieve this, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination (e.g. Barnett 2009, Bandyopadhyay et al 2013). This significantly advances QDS as a quantum technology with potential for real applications.
△ Less
Submitted 14 May, 2014; v1 submitted 22 November, 2013;
originally announced November 2013.
-
Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light
Authors:
Patrick J. Clarke,
Robert J. Collins,
Vedran Dunjko,
Erika Andersson,
John Jeffers,
Gerald S. Buller
Abstract:
Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called "one-way" mathematical functions is used to provide security over sufficiently long timescales. No mathematical proofs are known for the long-term security…
▽ More
Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called "one-way" mathematical functions is used to provide security over sufficiently long timescales. No mathematical proofs are known for the long-term security of such techniques. Quantum digital signatures offer a means of sending a message which cannot be forged or repudiated, with security verified by information-theoretical limits and quantum mechanics. Here we demonstrate an experimental system which distributes quantum signatures from one sender to two receivers and enables message sending ensured against forging and repudiation. Additionally, we analyse the security of the system in some typical scenarios. The system is based on the interference of phase encoded coherent states of light and our implementation utilises polarisation maintaining optical fibre and photons with a wavelength of 850 nm.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Quantum key distribution system in standard telecommunications fiber using a short wavelength single-photon source
Authors:
R. J. Collins,
P. J. Clarke,
V. Fernandez,
K. J. Gordon,
M. N. Makhonin,
J. A. Timpson,
A. Tahraoui,
M. Hopkinson,
A. M. Fox,
M. S. Skolnick,
G. S. Buller
Abstract:
A demonstration of the principles of quantum key distribution is performed using a single-photon source in a proof of concept test-bed over a distance of 2 km in standard telecommunications optical fiber. The single-photon source was an optically-pumped quantum dot in a microcavity emitting at a wavelength of 895 nm. Characterization of the quantum key distribution parameters was performed at a…
▽ More
A demonstration of the principles of quantum key distribution is performed using a single-photon source in a proof of concept test-bed over a distance of 2 km in standard telecommunications optical fiber. The single-photon source was an optically-pumped quantum dot in a microcavity emitting at a wavelength of 895 nm. Characterization of the quantum key distribution parameters was performed at a range of different optical excitation powers. An investigation of the effect of varying the optical excitation power of the quantum dot microcavity on the quantum bit error rate and cryptographic key exchange rate of the system are presented.
△ Less
Submitted 27 April, 2010;
originally announced April 2010.