April 5, 2023, 1:10 a.m. | Mina Doosti, Lucas Hanouz, Anne Marin, Elham Kashefi, Marc Kaplan

cs.CR updates on arXiv.org arxiv.org

We show the security of multi-user key establishment on a single line of
quantum communication. More precisely, we consider a quantum communication
architecture where the qubit generation and measurement happen at the two ends
of the line, whilst intermediate parties are limited to single-qubit unitary
transforms. This network topology has been previously introduced to implement
quantum-assisted secret-sharing protocols for classical data, as well as the
key establishment, and secure computing. This architecture has numerous
advantages. The intermediate nodes are only …

architecture communication computing data hardware key keys measurement network networks nodes precisely protocol protocols quantum qubit secret secret keys secure computing security sharing single the key

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Principal Security Analyst - Threat Labs (Position located in India) (Remote)

@ KnowBe4, Inc. | Kochi, India

Cyber Security - Cloud Security and Security Architecture - Manager - Multiple Positions - 1500860

@ EY | Dallas, TX, US, 75219

Enterprise Security Architect (Intermediate)

@ Federal Reserve System | Remote - Virginia

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States

Vulnerability Management Team Lead - North Central region (Remote)

@ GuidePoint Security LLC | Remote in the United States