Google open-sources tools to bring fully homomorphic encryption into the mainstream – The Daily Swig

John Leyden16 June 2021 at 13:46 UTC Updated: 16 June 2021 at 15:10 UTC

Cryptographic expertise not needed to enable computations on encrypted data, says tech giant

Google has released a set of coding utilities that allowfully homomorphic encryption (FHE) operations on encrypted data.

The open source collection of libraries and tools allow computational processes to be carried out on encrypted data without first having to decrypt it, offering security and privacy benefits as a result.

Homomorphic encryption and secure multi-party computation are known technologies. Googles release is largely focused on refining and making them suitable for wider deployment, rather than reinventing the basis for the technologies.

Catch up on the latest encryption-related security news and analysis

Our release focuses most on ease of use, cleanly abstracting the various layers of development between design (what the developer is actually trying to do) and implementation (what actually is performed), a Google spokesperson told The Daily Swig.

The transpiler offers a glimpse into all of these layers, allowing the combined expertise of the crypto, hardware, logical optimization and distributed computing communities to come together in one place.

The suite of tools is available on Github.

Use cases for homomorphic encryption range from spell checkers for an email, to updates from wearables, to medical record analysis to, further down the road, things like photo filters or genomic analysis, according to Google.

The more sensitive or identifying the use case might be, the more important it is that a developer is able to provide strong guarantees on data handling, the Google spokesperson added.

No special expertise in cryptography is required to make use of the search giants technology, which is geared towards overcoming a lack of crypto expertise amongst developers that has historically held back wider adoption of such tools.

DONT FORGET TO READComputer Fraud and Abuse Act: What the landmark Van Buren ruling means for security researchers

The trade-off for the privacy benefits of homomorphic encryption is that the mechanism can be more computationally intensive and slower than other methods an issue not immediately addressed in Googles release.

Performance remains a significant barrier (one we continue to work on) and so this wont be a drop-in replacement for all existing cloud services, the Google representative explained.

At the moment, this environment is aimed at well-scoped problems where data sensitivity is critical or where extra compute cost is worth the added privacy benefit.

Google's approach to fully homomorphic encryption in explained in more detail in a recent white paper (PDF).

Professor Alan Woodward, a computer scientist from the University of Surrey, said Googles FHE tools might be useful across a wide range of applications.

What Google appear to be doing is providing tools to enable FHE across a wide range of areas, he explained.

Bottom line is that anything where you want the dataset encrypted when in live use, not just encrypted at rest, then FHE could help.

RELATED GitHub changes policy to welcome security researchers

More:
Google open-sources tools to bring fully homomorphic encryption into the mainstream - The Daily Swig

Quantum Cryptography Market share forecast to witness considerable growth from 2020 to 2026 KSU | The Sentinel Newspaper – KSU | The Sentinel…

The business report released by Zion Market Research on Quantum Cryptography Market share forecast to witness considerable growth from 2020 to 2026 is focused to facilitate a deep understanding of the market definition, potential, and scope. The report is curate after deep research and analysis by experts. It consists of an organized and methodical explanation of current market trends to assist the users to entail in-depth market analysis. The report encompasses a comprehensive assessment of different strategies like mergers & acquisitions, product developments, and research & developments adopted by prominent market leaders to stay at the forefront in the global market.

FREE | Request Sample is Available @ https://www.zionmarketresearch.com/sample/quantum-cryptography-market

The major players in the global Quantum Cryptography Market are PQ Solutions (U.K), Infineon (Germany), Qubitekk (U.S), Quintessence labs (Australia), Nucrypt Llc (U.S), Crypta Labs (U.K), Qutools GmbH (Germany), Magiq Technologies (U.S), NEC Corporation (Japan), Toshiba (Japan).

Along with contributing significant value to the users, the report by Zion Market Research has focused on Porters Five Forces analysis to put forward the wide scope of the market in terms of opportunities, threats, and challenges. The information extracted through different business models like SWOT and PESTEL is represented in the form of pie charts, diagrams, and other pictorial representations for a better and faster understanding of facts.

The growth and restraining factor section covers all the pain points and the touch points of the Quantum Cryptography Market. The insights are the conclusions from high authorities resources. Ourexperts and analysts use various market projection methodologies and quantitative customer insight tools to arrive at reliable conclusions. The report used uses various statistical tools toeradicate the errors in findings and estimate accurate long-term forecasts. Also, the trend projection method used in a the report presents the sales and demand from recent years and the future growth opportunities and trends.The report can be divided into following main parts.

Growth drivers:

The report provides an accurate and professional study of global Quantum Cryptography Market business scenarios. The complex analysis of opportunities, growth drivers, and the future forecast is presented in simple and easily understandable formats. The report comprehends the Quantum Cryptography Market by elaborating the technology dynamics, financial position, growth strategy, product portfolio during the forecast period.

Download Free PDF Report Brochure @ https://www.zionmarketresearch.com/requestbrochure/quantum-cryptography-market

Segmentation:

The report is curate on the basis of segmentation and sub-segmentation that are aggregated from primary and secondary research. Segmentation and sub-segmentation is a consolidation of industry segment, type segment, channel segment, and many more. Further, the report is expanded to provide you thorough insights on each segment.

Regional analysis:

The report covers all the regions in the world showing regional developmental status, the market volume, size, and value. It facilitates users valuable regional insights that will provide a complete competitive landscape of the regional market. Further, different regional markets along with their size and value are illustrated thoroughly in the report for precise insights.

Inquire more about this report @ https://www.zionmarketresearch.com/inquiry/quantum-cryptography-market

Competitive analysis:

The report is curate after a SWOT analysis of major market leaders. It contains detailed and strategic inputs from global leaders to help users understand the strength and weaknesses of the key leaders. Expert analysts in the field are following players who are profiled as prominent leaders in the Quantum Cryptography Market. The report also contains the competitive strategy adopted by these market leaders to the market value. Their research and development process was explained well enough by experts in the global Quantum Cryptography Market to help users understand their working process

Key Details of the Existing Report Study:

Frequently Asked Questions

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Us:

Zion Market Research is an obligated company. We create futuristic, cutting-edge, informative reports ranging from industry reports, the company reports to country reports. We provide our clients not only with market statistics unveiled by avowed private publishers and public organizations but also with vogue and newest industry reports along with pre-eminent and niche company profiles. Our database of market research reports comprises a wide variety of reports from cardinal industries. Our database is been updated constantly in order to fulfill our clients with prompt and direct online access to our database. Keeping in mind the clients needs, we have included expert insights on global industries, products, and market trends in this database. Last but not the least, we make it our duty to ensure the success of clients connected to usafter allif you do well, a little of the light shines on us.

Contact Us:

Zion Market Research244 Fifth Avenue, Suite N202New York, 10001, United StatesTel: +49-322 210 92714USA/Canada Toll-Free No.1-855-465-4651Email: sales@zionmarketresearch.comWebsite: https://www.zionmarketresearch.com

Go here to see the original:
Quantum Cryptography Market share forecast to witness considerable growth from 2020 to 2026 KSU | The Sentinel Newspaper - KSU | The Sentinel...

Watch: Unpacking Bitcoin, blockchain and the cryptos shaking up the world of finance – Euronews

What are cryptos?

Cryptocurrencies are virtual currencies that can be used to buy goods and services but rely on a ledger and cryptography to secure and verify transactions rather than a trusted third party.

Bitcoin is the name of the original cryptocurrency. It was designed to allow users make digital payments without relying on financial institutions like banks.. This also means its users can send or receive money anonymously.

In 2008, a developer known only as Satoshi Nakamoto uploaded the Bitcoin whitepaper to a cryptography mailing list, laying out his vision for the first cryptocurrency.

The same individual is believed to be responsible for deploying the source code and protocol that Bitcoin is based on. There is still no definitive answer as to who Nakamoto is or whether it was someone working alone or a group of people working together.

Bitcoin is built on a publicly distributed digital ledger known as the blockchain. This allows a record of all transactions to be compiled and shared across a peer to peer network. The same ledger protects the system from the problem of double spending, which is the risk that a digital token or a digital coin can be spent twice.

Under the bitcoin protocol, every ten minutes a block of all the transactions carried out on the network in the preceding ten minutes is compiled and verified through what is known as Proof of Work mining.

The Proof of work mechanism requires computers in the network to compete in a race to solve a computational problem. Think of it as an elaborate game of guess the number where the higher your computational power is, the higher your chances are of winning.

The first computer to solve the problem is allowed to verify the block and add it to the blockchain, earning Bitcoin as a reward.

Under the Bitcoin protocol, the computational problem to be solved becomes more complex the more computers there are trying to solve it.

The idea behind proof of work is to make the network more secure and protect it from attacks, spammers or individuals gaming the system.

Critics point out that its hugely energy intensive, leading to recent concerns about Bitcoins environmental impact.

See the article here:
Watch: Unpacking Bitcoin, blockchain and the cryptos shaking up the world of finance - Euronews

How do you make supply chains more visible without compromising security? A Dutch start-up may have the answer – The European Sting

(Credit: Unsplash)

This article is brought to you thanks to the collaboration ofThe European Stingwith theWorld Economic Forum.

Author: Sean Fleming, Senior Writer, Formative Content

Better supply chain visibility can boost sustainable production methods and provide greater confidence to businesses on where their materials are coming from. It can also offer insights into who is working for all the businesses connected to a particular supply chain.

It is, however, a major headache for organizations. The data journalism site Statista cites a 2018 survey which found that the biggest challenge (21.8%) for global supply chain executives was visibility.

A Netherlands-based start-up called Circularise has been working on a technology platform that helps deliver the kind of supply chain transparency many businesses would like, while overcoming one of the biggest concerns businesses have the security of their sensitive data.

Total transparency

Circularise, a member of the World Economic Forums UpLink platform, uses what it describes as a combination of blockchain, peer-to-peer technology and cryptography like Zero-Knowledge Proofs (ZKPs) in a decentralized information storage and communication platform. It allows information exchange between participants in value chains while retaining the ability to fine-tune the amount of information disclosed.

Blockchain is an early-stage technology that enables the decentralized and secure storage and transfer of information. It has the potential to be a powerful tool for tracking goods, data, documentation and transactions. In this way, it can cut out intermediaries, reduce corruption, increase trust and empower users.

The potential uses of blockchain technology are essentially limitless, as every transaction is recorded and distributed on a ledger that is almost impossible to hack. Though the most well-known use case is cryptocurrencies, blockchain is being positioned to become a global decentralized source of trust that could be used to collect taxes, reduce financial fraud, improve healthcare privacy and even ensure voting security.

Blockchain has the potential to upend entire systems but it also faces challenges. Read more about the work we have launched on blockchain and distributed ledger technologies to ensure the technology is deployed responsibly and for the benefit of all. Were working on accelerating the most impactful blockchain use cases, ranging from making supply chains more inclusive to making governments more transparent, as well as supporting central banks in exploring digital currencies.

Blockchain works like a database that groups related pieces of data together into units called blocks and connects them together sequentially in chains. Each block of data contains information regarding when they were created or amended, becoming a permanent record of the history and provenance of each block in the chain. Anyone party to a blockchain database can see who has made changes and when things have been added or removed.

In that way, blockchains can be used to provide an ultra-robust record of the provenance of anything that can be recorded in a database, making it possible to know the name of the farm that grew the food you eat, for instance. Or in the case of industrial processes, whether the recycled aluminium in an order actually came from a source of recycled aluminium.

Cryptography for sensitive information

Few businesses would be willing to let the rest of the world access their commercially sensitive data its one of the reasons cybersecurity is so important.

From trade secrets to lists of materials and details of business deals, there are many examples of data within a supply chain that businesses dont want to share openly. Naturally, this makes the open and accessible nature of blockchains less appealing.

The World Economic Forums Centre for Cybersecurity is leading the global response to address systemic cybersecurity challenges and improve digital trust. We are an independent and impartial global platform committed to fostering international dialogues and collaboration on cybersecurity in the public and private sectors. We bridge the gap between cybersecurity experts and decision makers at the highest levels to reinforce the importance of cybersecurity as a key strategic priority. World Economic Forum | Centre for Cybersecurity

Our community has three key priorities:

Strengthening Global Cooperation to increase global cooperation between public and private stakeholders to foster a collective response to cybercrime and address key security challenges posed by barriers to cooperation.

Understanding Future Networks and Technology to identify cybersecurity challenges and opportunities posed by new technologies, and accelerate forward-looking solutions.

Building Cyber Resilience to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

Initiatives include building a partnership to address the global cyber enforcement gap through improving the efficiency and effectiveness of public-private collaboration in cybercrime investigations; equipping business decision makers and cybersecurity leaders with the tools necessary to govern cyber risks, protect business assets and investments from the impact of cyber-attacks; and enhancing cyber resilience across key industry sectors such as electricity, aviation and oil & gas. We also promote mission aligned initiatives championed by our partner organizations.

The Forum is also a signatory of the Paris Call for Trust and Security in Cyberspace which aims to ensure digital peace and security which encourages signatories to protect individuals and infrastructure, to protect intellectual property, to cooperate in defense, and refrain from doing harm.

For more information, please contact us.

The ZKPs that Circularise uses keeps information hidden indefinitely, while still allowing users of the blockchain to interrogate it. Rather than list all the materials in a component, the ZKP acts as a question-and-answer portal. Circularise says on its website: Smart Questioning allows stakeholders to ask critical questions (eg, Does this plastic part contain hazardous materials?) to a secret dataset (eg, the bill of materials).

This approach makes it possible for businesses across a supply chain to share information about their products on an open blockchain-based system without exposing their sensitive data.

Circularise is one of 17 companies selected from more than 200 applicants for The Circulars Accelerator Cohort 2021, which is run in collaboration with UpLink, the World Economic Forums innovation crowdsourcing platform.

The six-month programme which is led by Accenture, in partnership with Anglo American, Ecolab and Schneider Electric helps circular innovators scale their solutions by providing them with tailored support and mentorship, and connecting them with industry leaders.

It operates through UpLink, which launched at the World Economic Forum Annual Meeting in 2020. The platform crowdsources expertise and resources to help scale up innovative ideas that can advance the UNs SDGs.

View post:
How do you make supply chains more visible without compromising security? A Dutch start-up may have the answer - The European Sting

Solving the Global Epidemic of Data Forgery and Cyber Attack. – Stockhouse

As data forgery and theft continues to plague businesses and individuals alike, real word, real time solutions are needed to battle the bad actors infiltrating private corporate and personal data.

Enter SoLVBL Solutions Inc. (CSE.SOLV, OTCMKTS: SOLBF, Forum) a cybersecurity engineering company specializing in applications that address critical data integrity problems. In short, a proprietary, patent-pending data authentication solution that creates trustfast.”

Stockhouse Media’s Dave Jackson caught up with company CEO Ray Pomroy to get investors up-to-date with all things SoLVBL Solutions.

TRANSCRIPT BELOW:

SH: To start off with, can you tell us a little bit about yourself and the history of the company?

RP:Sure. Well my background is supply chain. That's really where I spent most of my career and I worked in Europe, in Canada, in the US. For my sort of final, big corporate job, I looked after all the Personal Care Supply Chain for North America for a rather large company, I think it's the second largest consumer goods company in the world. And that was a great job. I managed a billion dollars of costs, seven factories, 2000 people, a lot of change, a lot going on. So really, I look after the total supply chain. When I came into this company , it was called Agile Blockchain. I came in as a Director due to my Supply Chain background and the company was focused on supply chain solutions using a blockchain.The CEO left end of 2019. And I offered to come in on a temporary basis hold the fort whilst we got a permanent CEO.

And that's what I did. I came in, you know, first thing was to ask everyone what they were doing, what we were working on, what was going on. And I was pretty underwhelmed actually. I thought most of it was pretty generic. I didn't think that we could charge high margins for anything we were doing. All the problems with blockchains being slow were all beginning to manifest themselves as we were trying to find some products. Our clever Developershad realized the problems with blockchains and had tried to find a solution to the speed and latency issues. As I was going through with them what, what we were working on this issue came up. They proposed a way of tackling it, I was so taken with it because it was different, it was new, it was novel that I actually shut down all the other work and we pivoted. We decided to forget the supply chain and focus on this idea. It’s why SoLVBL as we are now called came into being. We decided to run with this idea and turn it into something, turn it into code, turn it into a product, get it working. And I have to say at the time it was just a concept. I mean, it wasn't anything more than a concept and the guys have done a fantastic job to turn that concept actually into a potential product. As a consequence, we decided that agile blockchain was a name that just confused people. So we changed our name to SoLVBL solutions. Not that long ago, actually. I think it was probably around the turn of the year that we dropped the Agile Blockchain and became SoLVBL solutions.Andchanged our focus, as I say, away from supply chain into the cyber security area. Although we didn't really think of it as cyber security at the time. The way we looked at it was in the real world, the world that you and I live in, if you want to forge a Check there are ways that I can check the Check is authentic. I can check your handwriting. I can check the ink that you've used. I can see when the paper's scuffed under a microscope, there's lots of physical things I can do to see whether you've actually committed forgery. In the digital world. It's just ones and zeros. That's all. And as you know, one set of ones and zeros are very much like another set of ones and zeros. And how would you know where the ones and zeros had been changed? In our view, you wouldn’t. Enter SoLVBL.

So what we have done is developed a product , such that when you create data, you essentially interact with us. And we mutually seal up the data and we provide the equivalent of the thumbprint, and that thumbprint travels forever with that data. If anyone comes in and in a malicious way, a bad actor comes in and decides to substitute the data or modify the data, whatever, then the thumbprint on the changed data don't match up. When you use the data, you can have it authenticated automatically. And if someone's come in and changed the data you can detect it. So our view is you can't stop digital fraud. It's too difficult to stop it. But what you can do and what we offer is authentication. Detection, if it’s changed . We're different. Although we say we're a cybersecurity company, we're different from a lot of other cyber security businesses.Normally the strategy, if you go back to the old castle days, you build a castle, you put a moat around it, you have a drawbridge, which can be raised, you make the walls very high and you stop people from coming in. However, if someone manages to get in, once they're inside the castle walls, they’re free roam around, they're free to do whatever they like. That's a space that we want to play in , we're not a typical cybersecurity company. We're not offering, you know firewalls and defenses that are on the boundaries. We’re essentially saying, look, you just will not be able to stop everyone from coming in. So it makes far more sense to protect your data inside the organization. Other Companies can, can help you provide the walls to try and keep the hackers out.

But if a hacker gets through, then our system allows you before you use data, to authenticate it and to feel confident that it hasn't been manipulated. And when you think about the way the world's moving now, data is just exploding. Data’s been used for all sorts of things, Algorithms, it’s being used for AI. And you knowif you're going to use the automated systems to produce results, and to run your business then you've got to know that the input is valid. When I went to school, they taught us, garbage in, equals garbage out. And so what we can do is we can tell you whether garbage is coming in or not. Then you don't have to use the garbage” data and you're protected.

So that, in a nutshell, is how we've ended up where we are today. We started off with a Blockchain focus. We didn't like the speed and latency issues around Blockchains. I'm not knocking Block chains, by the way, they have their place, but they can't operate at speed and they have high latency associated with them And we looked to solve those issues ,originally for supply chain solutions. But soon as I realized that we potentially had a wider solution, it made far more sense to pivot into the world that we're now focused on.

SH: For our investor audience that might not be that familiar with cybersecurity solutions and the technology behind it, can you tell us basically how your technology works and what makes SoLVBL so different and innovative?

RP:Well, I can't tell you exactly how it works because it's a trade secret. I think I can give you a rough idea. So we use a combination of cryptography and blockchain. Although this is not a hundred percent accurate analogy, I think this is a good way to think about what we do. If you go to your lawyer and you want to set a up a will. Normally the lawyer signs it, you sign it and a witness witnesses the signatures so that the lawyer can't say the document didn't exist and he didn't sign it. You can't say the same thing. And an independent witness has actually watched the two signatures. Sowhat we do with cryptography and a blockchain is something akin to that. You send me data here, you are signing it. We receive the data, we're signing it. And that's all done with cryptography.

And then with a clever use of the blockchain, the blockchain sort of becomes a witness to the event. So we can't say this, this didn't happen. And it doesn't exist. By the way I should add, I didn't say it in the first part, butwe were totally data agnostic. We never see the data. The data never leaves your control, if you're someone who wants to protect your data, your data stays your data. We have no idea what it is. It could be spreadsheets. It could be a housing predictions. I mean, who knows? We don't care. Actually, all we do is we take a representation of the data. And then we, we work to magically use cryptography, and a blockchain. We give you this little thumbprint, which allows you at any stage to authenticate the data. Actually anybody else using the data can authenticate the data as well. You can confirm the data is as it was when it was first created, plus the data never leaves your possession.

SH: You also announced in March that the company had increased its cryptography capabilities. Can you unpack the benefits of this?

RP: Sure. Cryptography is a very specialist area. It's a highly mathematical area. And we had arrived at the solution with non-cryptographic people being very clever and being very imaginative and very innovative. And we worked out a way of solving a problem. What we needed was validation from a cryptographer. Someone independent to come in and have a look at what we've done and say, yeah, that works. We struggled to find cryptographic help. First of all, there aren't many cryptographers. Secondly, they're all very busy because every major institution, every major bank scoops these people up and uses them. So it was very difficult for us to get somebody. And then it was very difficult for us to find someone who would be interested in working with a small startup company and helping them. However, we did find someone and we're very pleased and it's working out to be a very good collaboration.

She's bringing a lot to the party. She's bringing a way of thinking and analysis that is different to the way we work. And of course we're bringing a different way of thinking , as well for her. So it's a good mutual combination and I see lots and lots of potentially innovative products coming down the line. And so once this first phase is over, there'slots of ideas for products that we have where she can be very helpful to us. So maybe she can get involved from the word go. I think it's just very exciting and I'm very pleased we actually found somebody. It took me almost nine months to find a cryptographer.

SH: For company shareholders and potential investors, what kind of future development and projects can we expect from SoLVBL moving through 2021 and beyond?

RP:Well, the first thing, obviously, we've got to do is to get to Q by SoLVBL into the marketplace, we've got to get it in use, we've got to generate revenue and make some sales. The big priority for me is to get into a trial situation that leads to sales. And we're targeting three areas where we think we can offer something that's valuable and that people will be prepared to pay for it. One obviously is the financial world, where there’s a lot of data moving around or a high value data moving around and it's important that, fraud isn't actually occurring in this movement. So that's one area that we feel that we really want to target. And we have plans in place for that. The two other areas thatwe envisioned for the use of our technology, one of them is it's called NG 911, or you may not have heard very much about this, but the NG stands for Next Generation.

911 is the emergency service. And what's happening is the world is changing and everyone's got as everyone's got a smartphone. For example, if there's an accident on the side of the road, people are taking videos, they're taking photographs and they're sending these things into 911. They're sending texts and they're tweeting, it's not only landline phone calls any longer. It's a whole range of digital interactions. And of course, some of the stuff that comes in may be needed for evidence., There may be court cases that arise and maybe lawsuits that come out of it. We believe, we have an opportunity to use our system to seal up data as it's actually coming in and authenticated it. So that at some later stage you can authenticate it as the original feed that came in. You can show someone hasn't photo-shopped it. You can also see someone hasn't sent something in that they Photoshopped. We can say, no, this is the real video. as we received it. It's been sealed up and no one's altered it. So what you're now producing as evidence obviously has been photo-shopped because it doesn’t match the original.

So we see that as, NG 911, rolls out, mainly in America, to start with and later in Canada. There’s a huge opportunity for us to get in there and offer our services. And of course this will ultimately be a worldwide phenomenon. Once it's finished in North America, you know, it's going to happen in Europe, it's going to happen in South Africa, Australia, Latin America. So that's a nice global opportunity there for us. And out of thinking about that, we then came to the third area that we believe that we have something to offer, and that is the Digital Chain of Evidence.

So this is the world where the police operate in. Increasingly the evidence that police are collecting is digital and that they have very complicated procedures. We have looked at what they do, and we believe that we can offer some productivity savings and cost savings and some speed savings to them. So that's the other area that we'll be focusing on. Over the next period of time, you should be looking for news in those areas coming from us. That's what we're focusing on. We have to focus. We have limited resources. Although I can think of lots and lots of uses for this product we need to focus. The mantra t we use inside the businesses is if the data worth forging, it’s worth protecting”. We're not in the game of just protecting data for the sake of protecting it.

There has to be some value to someone to get in there and forge the data. Either they can pocket some money, they can influence a trial, they can change, they can change outcomes, whatever. That's where we want to play. That's where we want to go. And that, I think over the next 18 months, you should look for news items that come out that shows that we've got trials going on in those areas. And then hopefully those trials will lead to business and to orders.Not an issue of course, it's educating people to understand that there's actually a problem here. I can say there's a problem. I'm not the person who will be buying the software. So we have to convince the potential customers that there's a vulnerability. And not only is there a vulnerability, but you wouldn't even know if someone was doing it to you. So it's not like you can have a problem and go, oh, I've got a problem. I need to solve it. This could be going on today and you wouldn't know. It's a bit more of a harder sell for us, but once we're in and we can demonstrate the product, the speed, the latency, and the ability of the software, I think we'll be fine.

SH: I have to mention your stock has been on a bit of a roller coaster ride since you went public back in late February. What can you tell our investor audience regarding the current valuation of your stock and why you think it’s a good buy right now?

RP:So I have to be a bit careful in answering this particular question because it's a little bit outside of my expertise level. What I will say is that we have something that's unique. We have something that works. There's a real problem out there that needs a solution, even if people don't necessarily know or have realized yet there's a problem. So I think we've all the ingredients to be very successful, but it's not going to be an overnight. It's not like we're putting an app out and, you know, we're going to be the next Tik Tok or something. I mean, we're talking about selling business to business, and we're talking about pretty high value deals. So, you know, the sales cycle is going to be a little bit long, I don't think you should expect news coming out every week.

If you want to invest in the stock, I think you have to believe there's actually a problem that we have a solution to the problem, and that we are capable going out there and convincing people to buy our product and if we're right in our view , the stock looks like a bargain at the present moment. But all that stuff has to happen and it's not going to happen in a week and it’s not going to happen in two weeks. It's not going to happen in a month. It takes time to get it, to get to the right people and then persuade them. There's an issue that needs addressing, , to do a trial, to see the results, and then to part with their hard-earned money. It's just a long sales cycle.

SH: Can you tell our audience a little bit about your corporate management and board teams, along with the experience and innovative ideas they bring to the cybersecurity space?

RP:Yeah. As well as I said at the start,we've sort of backed into the cyber security space. So, when the company was started, that really wasn't the target market, but we're lucky we have on our board, we have someone with great financial experience. We have someone with great academic connections and experience and in the digital world, we our chairman is someone who actually has started up digital businesses made them successful, had them bought out and come back in and started again. So there's an entrepreneurial mindset there. And we have someone who is very good on the HR side. So we've got a nice, rounded board as for the management team. There's two of us, there's me. And I told you, my background. And I work with a CFO who has lots of experience in small entrepreneurial companies, companies that have gone public. So he brings a lot of financial wisdom to the party and realism for that matter. And I have to say that, although they're not defined as a management team, the developers that we've got are fantastic. They're very, open-minded, they're very interested in learning new stuff and applying new stuff. And I, I'm pretty impressed actually with the team, everyone that we've got actually. So I think it bodes well for the future.

SH: And finally, Ray, if there’s anything I’ve overlooked please feel free to elaborate.

RP:No, I think you've been pretty comprehensive there, Dave, actually, I think we've covered,most of the ground. I think you knowas in everything else, the proof of the pudding is in the eating. So when someone actually buys our system and it's in use, you'll know that what I'm saying is for real. I know it's for real, and I'm pretty excited ,if it wasn't real and exciting, I'm not sure I'd be doing this present at the present moment. You know, I think this is, it's an unusual situation that you find you've developed something, which is new, and unique, and that there's a real need for it. So watch the space. I think that's what we'll be saying.

For more information, visit solvbl.com

FULL DISCLOSURE: This is a paid article produced by Stockhouse Publishing.

See the original post here:
Solving the Global Epidemic of Data Forgery and Cyber Attack. - Stockhouse

Clearing the way toward robust quantum computing – MIT News

MIT researchers have made a significant advance on the road toward the full realization of quantum computation, demonstrating a technique that eliminates common errors in the most essential operation of quantum algorithms, the two-qubit operation or gate.

Despite tremendous progress toward being able to perform computations with low error rates with superconducting quantum bits (qubits), errors in two-qubit gates, one of the building blocks of quantum computation, persist, says Youngkyu Sung, an MIT graduate student in electrical engineering and computer science who is the lead author of a paper on this topic published today in Physical Review X. We have demonstrated a way to sharply reduce those errors.

In quantum computers, the processing of information is an extremely delicate process performed by the fragile qubits, which are highly susceptible to decoherence, the loss of their quantum mechanical behavior. In previous research conducted by Sung and the research group he works with, MIT Engineering Quantum Systems, tunable couplers were proposed, allowing researchers to turn two-qubit interactions on and off to control their operations while preserving the fragile qubits. The tunable coupler idea represented a significant advance and was cited, for example, by Google as being key to their recent demonstration of the advantage that quantum computing holds over classical computing.

Still, addressing error mechanisms is like peeling an onion: Peeling one layer reveals the next. In this case, even when using tunable couplers, the two-qubit gates were still prone to errors that resulted from residual unwanted interactions between the two qubits and between the qubits and the coupler. Such unwanted interactions were generally ignored prior to tunable couplers, as they did not stand out but now they do. And, because such residual errors increase with the number of qubits and gates, they stand in the way of building larger-scale quantum processors. The Physical Review X paper provides a new approach to reduce such errors.

We have now taken the tunable coupler concept further and demonstrated near 99.9 percent fidelity for the two major types of two-qubit gates, known as Controlled-Z gates and iSWAP gates, says William D. Oliver, an associate professor of electrical engineering and computer science, MIT Lincoln Laboratory fellow, director of the Center for Quantum Engineering, and associate director of the Research Laboratory of Electronics, home of the Engineering Quantum Systems group. Higher-fidelity gates increase the number of operations one can perform, and more operations translates to implementing more sophisticated algorithms at larger scales.

To eliminate the error-provoking qubit-qubit interactions, the researchers harnessed higher energy levels of the coupler to cancel out the problematic interactions. In previous work, such energy levels of the coupler were ignored, although they induced non-negligible two-qubit interactions.

Better control and design of the coupler is a key to tailoring the qubit-qubit interaction as we desire. This can be realized by engineering the multilevel dynamics that exist, Sung says.

The next generation of quantum computers will be error-corrected, meaning that additional qubits will be added to improve the robustness of quantum computation.

Qubit errors can be actively addressed by adding redundancy, says Oliver, pointing out, however, that such a process only works if the gates are sufficiently good above a certain fidelity threshold that depends on the error correction protocol. The most lenient thresholds today are around 99 percent. However, in practice, one seeks gate fidelities that are much higher than this threshold to live with reasonable levels of hardware redundancy.

The devices used in the research, made at MITs Lincoln Laboratory, were fundamental to achieving the demonstrated gains in fidelity in the two-qubit operations, Oliver says.

Fabricating high-coherence devices is step one to implementing high-fidelity control, he says.

Sung says high rates of error in two-qubit gates significantly limit the capability of quantum hardware to run quantum applications that are typically hard to solve with classical computers, such as quantum chemistry simulation and solving optimization problems.

Up to this point, only small molecules have been simulated on quantum computers, simulations that can easily be performed on classical computers.

In this sense, our new approach to reduce the two-qubit gate errors is timely in the field of quantum computation and helps address one of the most critical quantum hardware issues today, he says.

Go here to read the rest:
Clearing the way toward robust quantum computing - MIT News

Here’s How Quantum Computers Will Really Affect Cryptocurrencies – Forbes

Cryptocurrency

Theres been a lot of focus recently on encryption within the context of cryptocurrencies. Taproot being implemented in bitcoin has led to more cryptographic primitives that make the bitcoin network more secure and private. Its major upgrade from a privacy standpoint is to make it impossible to distinguish between multi-signature and single-signature transactions. This will, for example, make it impossible to tell which transactions involve the opening of Lightning Network channels versus regular base layer transactions. The shift from ECDSA signatures to Schnorr signatures involves changes and upgrades in cryptography.

ADVERTISEMENT

Yet these cryptographic primitives might need to shift or transition in the face of new computers such as quantum computers. If you go all the way back down to how these technologies work, they are built from unsolved mathematical problems something humans havent found a way to reduce down to our brains capacity for creativity yet limited memory retrieval, or a computers way of programmed memory retrieval. Solving those problems can create dramatic breaks in current technologies.

I sat down with Dr. Jol Alwen, the chief cryptographer of Wickr, the encrypted chat app, to talk about post-quantum encryption and how evolving encryption standards will affect cryptocurrencies. Heres a summary of the insights:

Despite all of the marketing hype around quantum computing and quantum supremacy, the world isnt quite at the stage where the largest (publicly disclosed) quantum computer can meaningfully break current encryption standards. That may happen in the future, but commercially available quantum computers now cannot meaningfully dent the encryption standards cryptocurrencies are built on.

Quantum computer and encryption experts are not communicating with one another as much as they should. This means that discrete advances in quantum computing may happen with a slight lag in how encryption would operate. Its been the case that nation-states, such as China, have been going dark on research related to quantum this has the effect of clouding whether or not serious attempts can be made on the encryption standards of today, and disguising the sudden or eventual erosion of encryption a sudden break that might mean devastation for cryptocurrencies and other industries that rely on cryptography.

Its been known that many encryption schemes that defeat classical computers may not be able to defeat a sufficiently powerful quantum computer. Grovers algorithm is an example. This is a known problem and with the continued development of quantum computers, will likely be a significant problem in a matter of time.

Encryption standards being diluted now is not only a risk for the future, but also an attack on the conversations and transactions people will have to remain private in the past as well. Past forms of encryption that people relied upon would be lost the privacy they assumed in the past would be lost as well.

Cryptographic primitives are baked into cryptocurrencies regardless of their consensus algorithm. A sudden shift in encryption standards will damage the ability for proof-of-work miners or those looking to demonstrate the cryptographic proof that theyve won the right to broadcast transactions in the case of proof-of-stake designs such as the one proposed by Ethereum. Digital signatures are the common point of vulnerability here, as well as the elliptic curve cryptography used to protect private keys.

ADVERTISEMENT

Everything here breaks if the digital signatures are no longer valid anybody with access to public keys could then spend amounts on other peoples behalf. Wallet ownership would be up for grabs. says Dr. Alwen. Proof-of-work or proof-of-stake as a consensus algorithm would be threatened as well in all cases, the proof would no longer be valid and have it be authenticated with digital signatures anybody could take anybody elses blocks.

While proof-of-work blocks would have some protection due to the increasingly specialized hardware (ASICs) being manufactured specifically for block mining, both systems would have vulnerabilities if their underlying encryption scheme were weakened. Hashing might be less threatened but quantum compute threatens key ownership and the authenticity of the system itself.

Post-quantum encryption is certainly possible, and a shift towards it can and should be proactive. Theres real stuff we can do. Dr. Alwen says here. Bitcoin and other cryptocurrencies may take some time to move on this issue, so any preparatory work should be regarded as important, from looking at benefits and costs you can get a lot of mileage out of careful analysis.

ADVERTISEMENT

Its helped here by the fact that there is a good bottleneck in a sense: there are only really two or three types of cryptographic techniques that need replacement. Digital signatures and key agreement are the two areas that need the focus. Patching these two areas will help the vast majority of vulnerabilities that might come from quantum computation.

Its important to note that a sudden and critical break in encryption would affect other industries as well and each might have different reasons why an attack would be more productive or they might be more slow to react. Yet if there were a revolution tomorrow, this would pose a clear and direct threat to the decentralization and security promises inherent in cryptocurrencies. Because of how important encryption and signatures are to cryptocurrencies, its probable that cryptocurrency communities will have many more debates before or after a sudden break, but time would be of the essence in this scenario. Yet, since encryption is such a critical part of cryptocurrencies, there is hope that the community will be more agile than traditional industries on this point.

If a gap of a few years is identified before this break happens, a soft fork or hard fork that the community rallies around can mitigate this threat along with new clients. But it requires proactive changes and in-built resistance, as well as keeping a close eye on post-quantum encryption.

ADVERTISEMENT

It is likely that instead of thinking of how to upgrade the number of keys used or a gradual change, that post-quantum encryption will require dabbling into categories of problems that havent been used in classical encryption. Dr. Alwen has written about lattice-based cryptography as a potential solution. NIST, the National Institute of Standards and Technology currently responsible for encryption standards has also announced a process to test and standardize post-quantum public-key encryption.

Hardware wallets are in principle the way to go now for security in a classical environment Dr. Alwen points out, having done research in the space. The fact that theyre hard to upgrade is a problem, but its much better than complex devices like laptops and cell phones in terms of the security and focus accorded to the private key.

In order to keep up with cryptography and its challenges, MIT and Stanford open courses are a good place to start to get the basic terminology. There is for example, an MIT Cryptography and Cryptanalysis course on MIT OpenCourseWare and similar free Stanford Online courses.

ADVERTISEMENT

There are two areas of focus: applied cryptography or theory of cryptography. Applied cryptography is a field that is more adjacent to software engineering, rather than math-heavy cryptography theory. An important area is to realize what role suits you best when it comes to learning: making headway on breaking cryptography theory or understanding from an engineering perspective how to implement solid cryptography.

When youre a bit more advanced and focused on cryptography theory, Eprint is a server that allows for an open forum for cryptographers to do pre-prints. Many of the most important developments in the field have been posted there.

Forums around common cryptography tools help with applied cryptography as well as some of the cryptography theory out there: the Signal forums, or the Wickr blog are examples.

ADVERTISEMENT

Cryptocurrencies are co-evolving with other technologies. As computers develop into different forms, there are grand opportunities, from space-based cryptocurrency exchange to distributed devices that make running nodes accessible to everybody.

Yet, in this era, there will also be new technologies that force cryptocurrencies to adapt to changing realities. Quantum computing and the possibility that it might eventually break the cryptographic primitives cryptocurrencies are built on is one such technology. Yet, its in the new governance principles cryptocurrencies embody that might help them adapt.

ADVERTISEMENT

Read more:
Here's How Quantum Computers Will Really Affect Cryptocurrencies - Forbes

Honeywell joins hands with Cambridge Quantum Computing to form a new company – The Hindu

(Subscribe to our Today's Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

Multinational conglomerate Honeywell said it will combine with Cambridge Quantum Computing in a bid to form the largest standalone quantum computing company in the world.

According to Honeywell, the merger will be completed in the third quarter of 2021 and will set the pace for what is projected to become a $1 trillion quantum computing industry over the next three decades.

In the yet to be named company, Honeywell will invest between $270 million and $300 million, and will own a major stake. It will also engage in an agreement for manufacturing critical ion traps needed to power quantum hardware.

The new company will be led by Ilyas Khan, the CEO and founder of CQC, a company that focuses on building software for quantum computing. Honeywell Chairman and Chief Executive Officer Darius Adamczyk will serve as chairman of the new company while Tony Uttley, currently the president of HQS, will serve as the new company's president.

"Joining together into an exciting newly combined enterprise, HQS and CQC will become a global powerhouse that will develop and commercialize quantum solutions that address some of humanity's greatest challenges, while driving the development of what will become a $1 trillion industry," Khan said in a statement.

With this new company, both firms plan to use Honeywells hardware expertise and Cambridges software platforms to build the worlds highest-performing computer.

See original here:
Honeywell joins hands with Cambridge Quantum Computing to form a new company - The Hindu

New quantum computing company will set the pace – Cambridge Network

Cambridge Quantum Computing, a quantum computing and algorithm company founded by Ilyas Khan, Leader in Residence and a Fellow in Management Practice at Cambridge Judge Business School, announced it will combine with Honeywell Quantum Solutions, a unit of US-based Honeywell, which has been an investor in Cambridge Quantum since 2019.

Ilyas was also the inaugural Chairman of the Stephen Hawking Foundation, is a fellow commoner of St Edmunds College, and was closely involved in the foundation of the Accelerate Cambridge programme run by the Business Schools Entrepreneurship Centre.

The new company is extremely well-positioned to lead the quantum computing industry by offering advanced, fully integrated hardware and software solutions at an unprecedented pace, scale and level of performance to large high-growth markets worldwide, Cambridge Quantum said in an announcement.

The combination will form the largest, most advanced standalone quantum computing company in the world, setting the pace for what is projected to become a $1 trillion quantum computing industry over the next three decades, Honeywell said in a companion announcement.

The new company, which will be formally named at a later date, will be led by Cambridge Quantum founder Ilyas Khan as Chief Executive with Tony Uttley of Honeywell Quantum Solutions as President. Honeywell Chairman and CEO Darius Adamczyk will serve on the board of directors as the Chairman. Honeywell will have a 54% share of the merged entity, which was dubbed by publication Barrons as the Apple of Quantum Computing, and CQCs shareholders will have a 46% share.

In addition, Honeywell will invest between $270 million to $300 million in the new company. Cambridge Quantum was founded in 2014, and has offices in Cambridge, London and Oxford, and abroad in the US, Germany and Japan.

Originally posted here:
New quantum computing company will set the pace - Cambridge Network

Is quantum computing about to change the world? – BroadbandDeals

Quantum computing potential extends beyond simply processing things faster, offering scope to create entire new consumer services and product offerings

Neil Cumins Thursday, 17 June, 2021

Its common for new technologies to be treated with a healthy degree of scepticism when theyre first unveiled.

From the internet to social media, it often takes a while for potential to become reality.

Today, theres excitable talk about the blockchains potential, or how light-powered LiFi may supplant WiFi in the nations homes. Talk, but not much action as yet.

Quantum computing potential may be unmatched in terms of transforming our world even more so than the Internet of Things, or fully automated robotics.

And while you dont need a degree in quantum physics to understand quantum computing, its important to appreciate the basics of this highly complex (and unstable) technology.

Regardless of what theyre being asked to do, electronic devices only understand binary inputs. Zero or one, on or off. Thats it.

Every FIFA tournament, CAD package, Netflix marathon and email is composed of immense strings of zeroes and ones the binary data bits computers can process and interpret.

Quantum computing potentially subverts this by allowing bits to be both zeroes and ones at the same time.

This status fluidity involves holding data in whats called a superposition state a coin spinning on its side rather than landing heads-up or tails-up.

Superpositions grant a single bit far more potential, offering exponentially more processing power than a modern (classical) computer can deliver.

Quantum computers are theoretically capable of achieving feats todays hardware couldnt manage in a hundred lifetimes.

Google claims to own a quantum computer which can perform tasks 100,000,000 times faster than its most powerful classical computer.

Indeed, computer scientists have already demonstrated that quantum processing can encrypt data in such a way it becomes impossible to hack.

This alone could transform online security, rendering spyware and most modern malware redundant, while ensuring a far safer world for consumers and businesses.

Quantum computing may be able to process the vast repositories of digital information being generated by billions of AI devices, which would otherwise result in huge data siloes.

It could unlock the secrets of our universe, helping us to achieve nuclear fusion or test drugs in ways wed never be able to accomplish with classical computing and brainpower alone.

Unfortunately, there are certain obstacles in the way of achieving full quantum computing potential.

The molecular instability involved in superpositions requires processors to be stored at cryogenic temperatures as close to absolute zero (-273C) as possible.

Devices need to be stored and handled with exceptional care, which in turn makes them incredibly expensive and unsuitable for domestic deployment.

And while the ability to develop uncrackable encryption algorithms is appealing, a quantum processor could also unlock almost any existing encryption method.

The havoc that could wreak in the wrong hands doesnt bear thinking about, and scientists are struggling to develop quantum-resistant algorithms for classical computers.

Like all emerging technologies, quantum computing has some way to go before it achieves mainstream adoption and acceptance.

When it does, the world will be a very different place.

Read this article:
Is quantum computing about to change the world? - BroadbandDeals