-
QuantumSolver: A quantum tool-set for developers
Authors:
Daniel Escanez-Exposito,
Pino Caballero-Gil,
Francisco Martin-Fernandez
Abstract:
This paper introduces a new opensource quantum tool-set called QuantumSolver based on Qiskit to help developers without knowledge in quantum computing. The developed library includes a set of algorithms with different features: random number generation, Bernstein-Vazirani algorithm and quantum key distribution using the BB84 protocol. This paper described the main details about the implementation…
▽ More
This paper introduces a new opensource quantum tool-set called QuantumSolver based on Qiskit to help developers without knowledge in quantum computing. The developed library includes a set of algorithms with different features: random number generation, Bernstein-Vazirani algorithm and quantum key distribution using the BB84 protocol. This paper described the main details about the implementation of the toolset, focusing in the challenges that the authors faced. Finally, this document analyzes the results obtained with some conclusions that authors compares with the included features.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Revocation management in vehicular ad-hoc networks
Authors:
F Martín-Fernández,
P Caballero-Gil,
C Caballero-Gil
Abstract:
This paper describes a solution for the efficient management of revocation in vehicular ad-hoc networks, for both certificate-based and identity-based authentication. It proposes the use of an authenticated data structure based on a dynamic hash tree, which is a perfect $k$-ary tree, together with a new version of the SHA-3 hash function. This combination allows optimizing search and insertion ope…
▽ More
This paper describes a solution for the efficient management of revocation in vehicular ad-hoc networks, for both certificate-based and identity-based authentication. It proposes the use of an authenticated data structure based on a dynamic hash tree, which is a perfect $k$-ary tree, together with a new version of the SHA-3 hash function. This combination allows optimizing search and insertion operations in the tree. Consequently, the proposal is very useful both when vehicular networks are widely used, and in urban environments. Simulation results are promising and confirm this hypothesis.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Analysis of the new standard hash function
Authors:
F Martín-Fernández,
P Caballero-Gil
Abstract:
On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy. The public selection of a new standard of cryptographic hash function SHA (Secure Has…
▽ More
On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy. The public selection of a new standard of cryptographic hash function SHA (Secure Hash Algorithm) took five years. Its object is to generate a hash a fixed size from a pattern with arbitrary length. The first selection on behalf of NIST on a standard of this family took place in 1993 when SHA-1 was chosen, which later on was replaced by SHA-2. This paper is focused on the analysis both from the point of view of security and the implementation of the Keccak function, which is the base of the new SHA-3 standard. In particular, an implementation in the mobile platform Android is presented here, providing the first known external library in this mobile operating system so that any developer could use the new standard hashing. Finally, the new standard in applications in the Internet of Things is analysed.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Poster: Revocation in VANETs Based on k-ary Huffman Trees
Authors:
Francisco Martín-Fernández,
Pino Caballero-Gil,
Cándido Caballero-Gil
Abstract:
One of the biggest problems of vehicular ad-hoc networks is revocation. The efficient management of such issue has become one of the major paradigms in this area of research. A solution proposed here is based on the use of authenticated data structures like revocation trees to replace the classical and inefficient certificate revocation lists. In particular, the idea of this paper is to propose th…
▽ More
One of the biggest problems of vehicular ad-hoc networks is revocation. The efficient management of such issue has become one of the major paradigms in this area of research. A solution proposed here is based on the use of authenticated data structures like revocation trees to replace the classical and inefficient certificate revocation lists. In particular, the idea of this paper is to propose the use of k-ary hash trees, Huffman coding and a duplex version of the SHA-3 hash function, to optimize insertions and searches in the revocation structure. Thus, the inclusion of a new certificate revoked in the tree, only implies a new iteration of the duplex construction of the hash function, avoiding recalculating the entire hashes and the entire tree. Furthermore, a k-ary Huffman tree is used to insert leaf nodes at different levels so that those revoked nodes that are more queried, are located closer to the root node position, so the revocation proof is smaller for those vehicles that spend more time on the roads. This paper details a method to calculate the optimum value $k$ for the k-ary tree in order to optimize the revocation proof size. Therefore, the proposal described here improves both the insertion of new revoked certificates in the revocation structure and the search of revoked certificates in the revocation structure. This paper is part of a work in progress, so that we plan to implement the scheme in real scenarios to get ideal values of the parameters and comparisons with other schemes.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
Using query frequencies in tree-based revocation for certificateless authentication in VANETs
Authors:
Pino Caballero-Gil,
Francisco Martín-Fernández,
Cándido Caballero-Gil
Abstract:
Revocation of dishonest users is not an easy problem. This paper proposes a new way to manage revocation of pseudonyms in vehicular ad-hoc networks when using identity-based authentication to increase efficiency and security through certificateless authentication. In order to improve the performance of revocation lists, this paper proposes the use of a data structure based on authenticated dynamic…
▽ More
Revocation of dishonest users is not an easy problem. This paper proposes a new way to manage revocation of pseudonyms in vehicular ad-hoc networks when using identity-based authentication to increase efficiency and security through certificateless authentication. In order to improve the performance of revocation lists, this paper proposes the use of a data structure based on authenticated dynamic hash k-ary trees and the frequency with which revoked pseudonyms are consulted. The use of the knowledge about the frequency of consultation of revoked pseudonyms allows an easier access to the most popular revoked pseudonyms to the detriment of revoked pseudonyms that are the least consulted. Accordingly, the proposal is especially useful in urban environments where there are vehicles that spend more time on road than others, such as public service vehicles.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
Secure Implementation of a Vehicular Application for the Symbian Platform
Authors:
F. Martín-Fernández,
C. Caballero-Gil,
P. Caballero-Gil,
J. Molina-Gil
Abstract:
A vehicular ad-hoc network is a type of communication network where the nodes are vehicles. Their aim is to manage traffic efficiently in order to prevent unwanted events such as accidents, jams, etc. The research on this type of networks assumes the use of additional infrastructure installed on the roads, and special devices installed in vehicles. In this paper we propose a novel solution for the…
▽ More
A vehicular ad-hoc network is a type of communication network where the nodes are vehicles. Their aim is to manage traffic efficiently in order to prevent unwanted events such as accidents, jams, etc. The research on this type of networks assumes the use of additional infrastructure installed on the roads, and special devices installed in vehicles. In this paper we propose a novel solution for the deployment of vehicular networks, which uses only existing smartphones with technologies such as Wi-Fi, GPS and Bluetooth. This approach will save the costs of road infrastructure deployment and extra vehicles devices, making it possible to deploy the first real-world vehicular ad-hoc network with a low cost. In particular, the developed implementation of the proposal for the Symbian platform is here examined in full detail.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
Automated Source Code Generation and Auto-completion Using Deep Learning: Comparing and Discussing Current Language-Model-Related Approaches
Authors:
Juan Cruz-Benito,
Sanjay Vishwakarma,
Francisco Martin-Fernandez,
Ismael Faro
Abstract:
In recent years, the use of deep learning in language models gained much attention. Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machin…
▽ More
In recent years, the use of deep learning in language models gained much attention. Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machine Learning community has been researching this software engineering area, pursuing goals like applying different approaches to auto-complete, generate, fix, or evaluate code programmed by humans. Considering the increasing popularity of the Deep-Learning-enabled language models approach, we detected a lack of empirical papers that compare different deep learning architectures to create and use language models based on programming code. This paper compares different neural network architectures like AWD-LSTMs, AWD-QRNNs, and Transformer while using transfer learning and different tokenizations to see how they behave in building language models using a Python dataset for code generation and filling mask tasks. Considering the results, we discuss each approach's different strengths and weaknesses and what gaps we find to evaluate the language models or apply them in a real programming context.
△ Less
Submitted 12 January, 2021; v1 submitted 16 September, 2020;
originally announced September 2020.