Explore chapters and articles related to this topic
The Longer Term: Quantum Information Processing and Communication
Published in Simon Deleonibus, Electronic Device Architectures for the Nano-CMOS Era, 2019
In the quantum setting, is has been found that, for some classes of functions, the number of exchanged qubits (the quantum communication complexity) is significantly lower than the number of bits for the same functions. There are even classes of function with an exponential drop of communication complexity. There are still many open questions in quantum communication complexity, even for some classes of very simple functions. An intriguing question, among others, is the analysis of situations where the partners share a set of qubits previously established in a globally entangled state. It has been found that, for some classes of functions, this allows a significant drop in communication complexity. Understanding precisely how and why entangled states become a computational resource that can improve communication complexity still needs a deeper analysis of such situations for distributed computations.
Distributed Intelligent Model for Privacy and Secrecy in Preschool Education
Published in Applied Artificial Intelligence, 2023
The measurement of the communication complexity of the specific method will be done as a function of the messages exchanged during learning. More specifically, it is assumed that the machine learning model stored locally in each agent consists of a total of M parameters (e.g., the weights of a Neural Network). The specific method requires each agent to exchange the local parameters and the gradient . Consequently, the communication load of each agent now depends on the size of its neighborhood and is of the order of .
Fault-Tolerant Based Group Key Servers with Enhancement of Utilizing the Contributory Server for Cloud Storage Applications
Published in IETE Journal of Research, 2023
K. Vivekrabinson, K. Muneeswaran
The main challenges in the key management schemes are computational complexity, storage complexity, communication complexity, and maintaining forward and backward secrecy. In this section, we discuss various key management techniques on both centralized and contributory methods. The Diffie–Hellman key exchange protocol [24] is the first public key-based key management scheme which implements the public key authentication via binding the certificate with the public key. The certificates are managed by trusted third parties but the cost of managing the certificate list is high.
Hyperelliptic Curve Diffie–Hellman-Based Two-Server Password-Only Authenticated Key Exchange Protocol for Edge Computing Systems
Published in IETE Journal of Research, 2021
K. Anitha Kumari, T. P. Kamatchi, R. Senthil Prabha, Bharath K. Samanthula
Communication complexity, computational complexity, security defensive rate, and attack resistance rate are considered as the metrics to evaluate the proposed protocol. Manifold edge gateway devices are connected to centralize cloud servers for storing and processing the data. Initially, the devices are registered and verified via 3D HECC DH PAKE protocol. The test cases obtained are shown in Table 1.