Center for Technology Transfer and Commercialization of Novosibirsk State University posted this:Post-quantum cryptosystem with public keyA post-quantum public-key cryptographic system has been developed in the cryptography laboratory of the university (Novosibirsk). It is used in the Internet of things, blockchain technology, cryptocurrency, key exchange, for example, in instant messengers, or as an independent mean of protection. The cryptosystem is resistant to hacking, including a quantum computer through the use of NP-hard in a quantum sense problem. The university is looking for partners for furtherance on the Russian and international markets.
Center for Technology Transfer and Commercialization of Novosibirsk State University posted this:Resistant to hacking by a quantum computer electronic digital signatureResearchers of Novosibirsk State University have developed a revolutionary algorithm for quantum-stable digital signature based on results of fundamental research in mathematics. Moreover, they implemented the algorithm as a software prototype. The cryptographic stability of the digital signature guarantees information security when using it in e-economics, the Internet of things and other areas in the post-quantum era. The stability of the algorithm is ensured by solving the problem that is an NP-hard (non-polinomial intractable) in the quantum sense. The university is looking for partners to commercialize the technology in international markets.
Pierre CHEVALIER posted this:
CEO at INAWA
Universidad de Alcalá-OTRI posted this:CATCHAPs/HIPS to test and improve the securityA research group from the Computer Engineering Department of the University of Alcalá proposes a security analysis expertise to those individuals and companies that are developing their own CAPTCHA/HIP proposals or want to test the security of their current proposals. The group can also work towards the improvement of the security of current CAPTCHA/HIP proposals whenever that target is attainable. Moreover, the group has a few CAPTCHA proposals that could be implemented at a grand scale level. These proposals though, need to undergo a security analysis previous to being put into production. It could be possible to share part of the IP with the companies wanting to implement these proposals if they assist the group economically in their initial implementation and security analysis. The group is seeking for individual clients and companies to achieve collaboration and commercial agreements with technical assistance.
Universidad de Alcalá-OTRI posted this:Optimization of the distance selling operations and electronic commerce.The innovative aspects can be summarized in the Integration between front-office and back-office activities with the possibility of total outsourcing. The establishing variable cost structures to facilitate the approach to the market without geographical limitation, thus reaching an overall degree of internationalization at low cost.
Fundació URV posted this:New secure electronic ticket system with revocable anonymity and transferabilityThe use of Information Technologies (IT) in the day-by-day operations is growing dramatically. Nowadays, it is possible to perform a lot of actions at home and there are not temporal restrictions. The electronic tickets are an example, we can buy a transport ticket or a movie ticket. In this sense, the smart-phones are a key element because users can buy the e-ticket from any place and can carry tickets while they are moving, and validate them in order to get access to the service. Moreover, the e-ticketing systems must offer the same properties of the paper tickets, i.e. they must be secure, anonymous and transferable. Our system provides a secure method that is anonymous and that allows the ticket transferability between users. We are interested in licensing our method. The e-ticketing system proposed can be used in differents services, so that service providers can adapt the system in order to meet their requirements. The system provides to the users the same properties of some of the paper tickets. The tickets are anonymous and users can transfer them to other users without the interaction of the ticket issuer or the provider. The privacy for the users must be seriously taken into account. The acceptance of a system that could control all the movements of a determined user could lead to a privacy threat. Thus, the users could be reluctant to use a system without the proper privacy protection. Moreover, each user could send her ticket and grant permission to another user. Nonetheless, if one user does some fraud the anonymity can be revoked and the user is identified. The system can be deployed in the cloud for the service providers. The users can use their smart-phones to obtain, use or transfer the e-tickets.
Maria João Cardoso posted this:
Science and Technology Manager at UATEC - Unidade de Transferência de Tecnologia