Software-based remote memory attestation using quantum entanglement

HIGHLIGHTS

  • What: The authors demonstrate how these attacks can be mitigated by making use of quantum effects while remaining within the class of software-based methods. While defeating these attacks is impossible under the standard computational model, the authors show in this Article that achieving secure remote attestation without secure hardware is possible using quantum methods. In contrast, the authors provide a softwarebased approach that relies solely on information and quantum theory. If the authors have the state √1 |00 + √1 |11, and the authors provide one half of 2 2 the entangled pair to one party and . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?