To see the other types of publications on this topic, follow the link: Quantum security definitions.

Journal articles on the topic 'Quantum security definitions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 30 journal articles for your research on the topic 'Quantum security definitions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Arapinis, Myrto, Nikolaos Lamprou, Elham Kashefi, and Anna Pappa. "Definitions and Security of Quantum Electronic Voting." ACM Transactions on Quantum Computing 2, no. 1 (April 2021): 1–33. http://dx.doi.org/10.1145/3450144.

Full text
Abstract:
Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particular, for electronic voting (e-voting), several schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims that are never formalized and are at best justified only against specific attacks. To address this, we propose the first formal security definitions for quantum e-voting protocols. With these at hand, we systematize and evaluate the security of previously proposed quantum e-voting protocols; we examine the claims of these works concerning privacy, correctness, and verifiability, and if they are correctly attributed to the proposed protocols. In all non-trivial cases, we identify specific quantum attacks that violate these properties. We argue that the cause of these failures lies in the absence of formal security models and references to the existing cryptographic literature.
APA, Harvard, Vancouver, ISO, and other styles
2

Arrazola, Juan Miguel, Petros Wallden, and Erika Andersson. "Multiparty quantum signature schemes." Quantum Information and Computation 16, no. 5&6 (April 2016): 435–64. http://dx.doi.org/10.26421/qic16.5-6-3.

Full text
Abstract:
Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive their security from computational assumptions. However, it is possible to construct unconditionally secure signature protocols. In particular, using quantum communication, it is possible to construct signature schemes with security based on fundamental principles of quantum mechanics. Several quantum signature protocols have been proposed, but none of them has been explicitly generalised to more than three participants, and their security goals have not been formally defined. Here, we first extend the security definitions of Swanson and Stinson [1] so that they can apply also to the quantum case, and introduce a formal definition of transferability based on different verification levels. We then prove several properties that multiparty signature protocols with informationtheoretic security – quantum or classical – must satisfy in order to achieve their security goals. We also express two existing quantum signature protocols with three parties in the security framework we have introduced. Finally, we generalize a quantum signature protocol given in [2] to the multiparty case, proving its security against forging, repudiation and non-transferability. Notably, this protocol can be implemented using any pointto-point quantum key distribution network and therefore is ready to be experimentally demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
3

RENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (February 2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.

Full text
Abstract:
Quantum Information Theory is an area of physics which studies both fundamental and applied issues in quantum mechanics from an information-theoretical viewpoint. The underlying techniques are, however, often restricted to the analysis of systems which satisfy a certain independence condition. For example, it is assumed that an experiment can be repeated independently many times or that a large physical system consists of many virtually independent parts. Unfortunately, such assumptions are not always justified. This is particularly the case for practical applications — e.g. in quantum cryptography — where parts of a system might have an arbitrary and unknown behavior. We propose an approach which allows us to study general physical systems for which the above mentioned independence condition does not necessarily hold. It is based on an extension of various information-theoretical notions. For example, we introduce new uncertainty measures, called smooth min- and max-entropy, which are generalizations of the von Neumann entropy. Furthermore, we develop a quantum version of de Finetti's representation theorem, as described below. Consider a physical system consisting of n parts. These might, for instance, be the outcomes of n runs of a physical experiment. Moreover, we assume that the joint state of this n-partite system can be extended to an (n + k)-partite state which is symmetric under permutations of its parts (for some k ≫ 1). The de Finetti representation theorem then says that the original n-partite state is, in a certain sense, close to a mixture of product states. Independence thus follows (approximatively) from a symmetry condition. This symmetry condition can easily be met in many natural situations. For example, it holds for the joint state of n parts, which are chosen at random from an arbitrary (n + k)-partite system. As an application of these techniques, we prove the security of quantum key distribution (QKD), i.e. secret key agreement by communication over a quantum channel. In particular, we show that, in order to analyze QKD protocols, it is generally sufficient to consider so-called collective attacks, where the adversary is restricted to applying the same operation to each particle sent over the quantum channel separately. The proof is generic and thus applies to known protocols such as BB84 and B92 (where better bounds on the secret-key rate and on the the maximum tolerated noise level of the quantum channel are obtained) as well as to continuous variable schemes (where no full security proof has been known). Furthermore, the security holds with respect to a strong so-called universally composable definition. This implies that the keys generated by a QKD protocol can safely be used in any application, e.g. for one-time pad encryption — which, remarkably, is not the case for most standard definitions.
APA, Harvard, Vancouver, ISO, and other styles
4

Schanck, John M., William Whyte, and Zhenfei Zhang. "Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 219–36. http://dx.doi.org/10.1515/popets-2016-0037.

Full text
Abstract:
Abstract We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation. In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security. These new definitions reflect the types of adversaries that a protocol might be designed to resist. We prove that, with some small modifications, the currently deployed Tor circuit extension handshake, ntor, provides pre-quantum ACCE security. We then prove that our new protocol, when instantiated with a post-quantum key encapsulation mechanism, achieves the stronger notion of transitional ACCE security. Finally, we instantiate our protocol with NTRU-Encrypt and provide a performance comparison between ntor, our proposal, and the recent design of Ghosh and Kate.
APA, Harvard, Vancouver, ISO, and other styles
5

Alagic, Gorjan, Tommaso Gagliardoni, and Christian Majenz. "Can you sign a quantum state?" Quantum 5 (December 16, 2021): 603. http://dx.doi.org/10.22331/q-2021-12-16-603.

Full text
Abstract:
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In this work, we ask: can all forms of signing quantum data, even in a possibly weak sense, be completely ruled out? We give two results which shed significant light on this basic question.First, we prove an impossibility result for digital signatures for quantum data, which extends the result of Barnum et al. Specifically, we show that no nontrivial combination of correctness and security requirements can be fulfilled, beyond what is achievable simply by measuring the quantum message and then signing the outcome. In other words, only classical signature schemes exist.We then show a positive result: a quantum state can be signed with the same security guarantees as classically, provided that it is also encrypted with the public key of the intended recipient. Following classical nomenclature, we call this notion quantum signcryption. Classically, signcryption is only interesting if it provides superior performance to encypt-then-sign. Quantumly, it is far more interesting: it is the only signing method available. We develop "as-strong-as-classical" security definitions for quantum signcryption and give secure constructions based on post-quantum public-key primitives. Along the way, we show that a natural hybrid method of combining classical and quantum schemes can be used to "upgrade" a secure classical scheme to the fully-quantum setting, in a wide range of cryptographic settings including signcryption, authenticated encryption, and CCA security.
APA, Harvard, Vancouver, ISO, and other styles
6

Kent, Adrian. "S-money: virtual tokens for a relativistic economy." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 475, no. 2225 (May 2019): 20190170. http://dx.doi.org/10.1098/rspa.2019.0170.

Full text
Abstract:
We propose definitions and implementations of ‘S-money’—virtual tokens designed for high-value fast transactions on networks with relativistic or other trusted signalling constraints, defined by inputs that in general are made at many network points, some or all of which may be space-like separated. We argue that one significant way of characterizing types of money in space–time is via the ‘summoning’ tasks they can solve: that is, how flexibly the money can be propagated to a desired space–time point in response to relevant information received at various space–time points. We show that S-money is more flexible than standard quantum or classical money in the sense that it can solve deterministic summoning tasks that they cannot. It requires the issuer and user to have networks of agents with classical data storage and communication, but no long-term quantum state storage, and is feasible with current technology. User privacy can be incorporated by secure bit commitment and zero-knowledge proof protocols. The level of privacy feasible in given scenarios depends on efficiency and composable security questions that remain to be systematically addressed.
APA, Harvard, Vancouver, ISO, and other styles
7

Xin, Xiangjun, Qinglan Yang, and Fagen Li. "Quantum proxy signature with provable security." Modern Physics Letters A 35, no. 24 (June 23, 2020): 2050197. http://dx.doi.org/10.1142/s0217732320501977.

Full text
Abstract:
A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally proved to be secure. There is not even security model for the quantum proxy signatures. Some quantum proxy signature schemes have been proved to be insecure against forgery attacks. In this paper, first, the formal definition and the corresponding security model for the quantum proxy signatures are proposed. Second, based on the Hadamard operator and the controlled NOT operation, a new quantum proxy signature scheme is proposed. The security of our quantum proxy signature scheme can be formally proved under security model. The security model of the quantum proxy signatures is helpful for analyzing and improving the security of the quantum proxy signature schemes. On the other hand, compared with the other quantum proxy signatures, the new one proposed in this paper is the first that can be formally proved to be secure under security model.
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, F. L., and Z. F. Han. "Quantum group signature scheme based on controlled quantum teleportation." International Journal of Quantum Information 14, no. 08 (December 2016): 1650041. http://dx.doi.org/10.1142/s0219749916500416.

Full text
Abstract:
Group signature scheme is a method of allowing a member of a group to sign a message anonymously on behalf of the group. The group administrator is in charge of adding group members and has the ability to reveal the original signer in the event of disputes. Based on controlled quantum teleportation with three-particle entangled W states, we propose a new quantum group signature scheme with designated receiver. Security analysis proves that the proposed scheme possesses the characteristics of group signature and resists the usual attacks. Compared with previous proposed schemes, this scheme follows security definition of group signature fully and meets its basic requirements.
APA, Harvard, Vancouver, ISO, and other styles
9

Pachankis, Y. "Theory on Extremal Nucleon Heuristics to Psychiatry." European Psychiatry 66, S1 (March 2023): S282. http://dx.doi.org/10.1192/j.eurpsy.2023.637.

Full text
Abstract:
IntroductionThe theorization focuses on the climate change’s influence to neurobiology. In modern societies, environmental nucleon generates in everyday activities from computers to industrial pollution. The subtle psychiatric changes can be categorized into: 1) the change of media in consciousness formation processes from cognition, such as from paper to electronic reading and from linguistics to coding; 2) activity changes in local reciprocal environment especially in places undergoing industrialization or developmental energy sources; 3) global exchanges underlying the current definitions of climate change but also taken into consideration of media change in cognitive behaviors; and 4) changes from outer space environment to the effects of global-to-local changes.ObjectivesThe objective of the theorization seeks to develop a heuristic paradigm to quantify the climate change’s effects to psychiatry from a neurobiological perspective. Albeit climate change is a complex topical issue, especially regarding the multivariable sources and traditional paradigms of case studies in the psychological and medical sciences, common sources of impacts to psychiatric public health in collective behaviors have been less of a focus. With the higher order of autonomous human functioning governed by the brains, the theorization in psychiatric public health hopes to quantify environmental impacts to brain functionings.MethodsThe theorization accumulated from nonproliferation research and the researcher’s developments in dopamine treatments in the high risk social-natural environment on depression. Inspired by the explicit review on electronic warfare’s impact on public health and astronomical research with proton decay outcome, a correlative theorization emerged between the cosmic decay and biodiversity in biochemistry. The theorization draws on developmental psychology to the nucleon heuristics in data research in cosmology, with prior experience documenting proliferation by applied quantum chromodynamics. Psychiatric data can be retrieved from relevant clinical settings of equivalent multi-wavelength brain scans as samples.ResultsFrom the perspective of cosmology, extremal graph theory can sample climate change on earth’s plasma from cosmic changes. This means earth’s dipole shifts to quantitative local population can be plotted, similar to the wild life researches in birds’ migration pattern changes. Local variants mainly derive from energy source types and energy consumption, however, bona fide data can hardly be retrieved due to deliberate transgressions for certain dire areas. Normative research can be conducted with cross-disciplinary collaborations with due consideration to privacy in public health research ethics.ConclusionsEnvironmental monitoring and psychiatric effects in developmental psychology are necessary in fundamental research on human security. This would increase some certainties and predictabilities for human development.Disclosure of InterestNone Declared
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.

Full text
Abstract:
With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD) is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN) is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.
APA, Harvard, Vancouver, ISO, and other styles
11

Gutoski, Gus, Ansis Rosmanis, and Jamie Sikora. "Fidelity of quantum strategies with applications to cryptography." Quantum 2 (September 3, 2018): 89. http://dx.doi.org/10.22331/q-2018-09-03-89.

Full text
Abstract:
We introduce a definition of the fidelity function for multi-round quantum strategies, which we call the strategy fidelity, that is a generalization of the fidelity function for quantum states. We provide many properties of the strategy fidelity including a Fuchs-van de Graaf relationship with the strategy norm. We also provide a general monotinicity result for both the strategy fidelity and strategy norm under the actions of strategy-to-strategy linear maps. We illustrate an operational interpretation of the strategy fidelity in the spirit of Uhlmann's Theorem and discuss its application to the security analysis of quantum protocols for interactive cryptographic tasks such as bit-commitment and oblivious string transfer. Our analysis is general in the sense that the actions of the protocol need not be fully specified, which is in stark contrast to most other security proofs. Lastly, we provide a semidefinite programming formulation of the strategy fidelity.
APA, Harvard, Vancouver, ISO, and other styles
12

Xie, Congge, Jian Weng, and Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices." Security and Communication Networks 2020 (January 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.

Full text
Abstract:
In 2014, a new security definition of a revocable identity-based signature (RIBS) with signing key exposure resistance was introduced. Based on this new definition, many scalable RIBS schemes with signing key exposure resistance were proposed. However, the security of these schemes is based on traditional complexity assumption, which is not secure against attacks in the quantum era. Lattice-based cryptography has many attractive features, and it is believed to be secure against quantum computing attacks. We reviewed existing lattice-based RIBS schemes and found that all these schemes are vulnerable to signing key exposure. Hence, in this paper, we propose the first lattice-based RIBS scheme with signing key exposure resistance by using the left-right lattices and delegation technology. In addition, we employ a complete subtree revocation method to ensure our construction meeting scalability. Finally, we prove that our RIBS scheme is selective-ID existentially unforgeable against chosen message attacks (EUF-sID-CMA) under the standard short integer solutions (SIS) assumption in the random oracle model.
APA, Harvard, Vancouver, ISO, and other styles
13

Tomamichel, Marco, and Anthony Leverrier. "A largely self-contained and complete security proof for quantum key distribution." Quantum 1 (July 14, 2017): 14. http://dx.doi.org/10.22331/q-2017-07-14-14.

Full text
Abstract:
In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the stateof-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that takes into account finite resource effects. For this purpose we collect and clarify several arguments spread in the literature on the subject with the goal of making this treatment largely self-contained. More precisely, we focus on a class of prepare-and-measure protocols based on the Bennett-Brassard (BB84) protocol as well as a class of entanglement-based protocols similar to the Bennett-Brassard-Mermin (BBM92) protocol. We carefully formalize the different steps in these protocols, including randomization, measurement, parameter estimation, error correction and privacy amplification, allowing us to be mathematically precise throughout the security analysis. We start from an operational definition of what it means for a quantum key distribution protocol to be secure and derive simple conditions that serve as sufficient condition for secrecy and correctness. We then derive and eventually discuss tradeoff relations between the block length of the classical computation, the noise tolerance, the secret key length and the security parameters for our protocols. Our results significantly improve upon previously reported tradeoffs.
APA, Harvard, Vancouver, ISO, and other styles
14

Broadbent, Anne. "Delegating private quantum computations." Canadian Journal of Physics 93, no. 9 (September 2015): 941–46. http://dx.doi.org/10.1139/cjp-2015-0030.

Full text
Abstract:
We give a protocol for the delegation of quantum computation on encrypted data. More specifically, we show that in a client–server scenario, where the client holds the encryption key for an encrypted quantum register held by the server, it is possible for the server to perform a universal set of quantum gates on the quantum data. All Clifford group gates are non-interactive, while the remaining non-Clifford group gate that we implement (the π/8 gate) requires the client to prepare and send a single random auxiliary qubit (chosen among four possibilities), and exchange classical communication. This construction improves on previous work, which requires either multiple auxiliary qubits or two-way quantum communication. Using a reduction to an entanglement-based protocol, we show privacy against any adversarial server according to a simulation-based security definition.
APA, Harvard, Vancouver, ISO, and other styles
15

Hu, Yanglin, Yingkai Ouyang, and Marco Tomamichel. "Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption." Quantum 7 (April 13, 2023): 976. http://dx.doi.org/10.22331/q-2023-04-13-976.

Full text
Abstract:
Quantum homomorphic encryption, which allows computation by a server directly on encrypted data, is a fundamental primitive out of which more complex quantum cryptography protocols can be built. For such constructions to be possible, quantum homomorphic encryption must satisfy two privacy properties: data privacy which ensures that the input data is private from the server, and circuit privacy which ensures that the ciphertext after the computation does not reveal any additional information about the circuit used to perform it, beyond the output of the computation itself. While circuit privacy is well-studied in classical cryptography and many homomorphic encryption schemes can be equipped with it, its quantum analogue has received little attention. Here we establish a definition of circuit privacy for quantum homomorphic encryption with information-theoretic security. Furthermore, we reduce quantum oblivious transfer to quantum homomorphic encryption. By using this reduction, our work unravels fundamental trade-offs between circuit privacy, data privacy and correctness for a broad family of quantum homomorphic encryption protocols, including schemes that allow only the computation of Clifford circuits.
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Yonghong. "Group and Cipher in Wormhole and Quantum Entanglement." European Journal of Pure and Applied Mathematics 14, no. 2 (May 18, 2021): 521–36. http://dx.doi.org/10.29020/nybg.ejpam.v14i2.3972.

Full text
Abstract:
In this article, we present wormholes cryptosystems (WCS). The first is the wormhole key distribution centre theorem, which asserts that the WCS is a public key group. The second is the security theorem, which asserts that the WCS are a one-way function. The third is new version of the definition for the WCS, and we introduce the notion of groups of WCS. The fourth ingredient is the encryption algorithm and decryption algorithm, and design principle. Here, we present a toy example to illustrate the computation of these encryptions and decryptions. The finally we present the unsymmetrical WCS theorem.
APA, Harvard, Vancouver, ISO, and other styles
17

Song, Yaqi, and Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer." Applied Sciences 8, no. 10 (October 19, 2018): 1990. http://dx.doi.org/10.3390/app8101990.

Full text
Abstract:
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper. We first construct a practical quantum random oblivious transfer (R-OT) protocol based on the fact that non-orthogonal states cannot be reliably distinguished. Then, we construct a fault-tolerant one-out-of-two oblivious transfer ( O T 1 2 ) protocol based on the quantum R-OT protocol. Afterwards, we propose a quantum bit commitment (QBC) protocol which executes the fault-tolerant O T 1 2 several times. Mayers, Lo and Chau (MLC) no-go theorem proves that QBC protocol cannot be unconditionally secure. However, we find that computing the unitary transformation of no-go theorem attack needs so many resources that it is not realistically implementable. We give a definition of physical security for QBC protocols and prove that the practical QBC we proposed is physically secure and can be implemented in the real world.
APA, Harvard, Vancouver, ISO, and other styles
18

Yesina, M. V., S. O. Kandiy, E. V. Ostryanska, and I. D. Gorbenko. "Generation of general system parameters for Rainbow electronic signature scheme for 384 and 512 security bits." Radiotekhnika, no. 204 (April 9, 2021): 16–23. http://dx.doi.org/10.30837/rt.2021.1.204.02.

Full text
Abstract:
Today, there is rapid progress in the creation of quantum computers to solve various computational problems and for different purposes. At the same time, special efforts are made to create such a quantum computer that can solve the problems of cryptanalysis of existing cryptosystems: asymmetric ciphers, key encapsulation protocols, electronic signatures, etc. Prevention of such threats can be achieved by developing cryptographic systems that will be protected against both quantum and classical attacks, and be able to interact with existing protocols and communication networks. There is also a significant need for protection against attacks by side channels. Currently, significant efforts of cryptologists are focused on the NIST PQC open competition. The main idea of the NIST PQC competition is to define mathematical methods based on which standards for asymmetric cryptotransformations, primarily electronic signatures, as well as asymmetric ciphers and key encapsulation protocols can be developed. Three electronic signature schemes – Crystals-Dilithium, Falcon and Rainbow become the finalists of the third stage of the NIST PQC competition according to the results of the second stage. The first two are based on the mathematics of algebraic lattices, and Rainbow is based on multivariate transformations. Currently, a comprehensive analysis of the finalists is an important task for the entire global crypto community. The vast majority of schemes that have become finalists or alternative algorithms are based on problems in the theory of algebraic lattices. Special attention was also paid to the Rainbow electronic signature scheme based on multivariate transformations. The purpose of this work consists in a preliminary analysis of existing attacks on promising electronic signature Rainbow, definition of requirements to the system-wide parameters to ensure cryptographic stability of at least 512 bits against classical and 256 bits against quantum cryptanalysis, as well as development and practical implementation of Rainbow algorithms for generating system-wide parameters for 512 bits against classical and 256 bits against quantum cryptanalysis.
APA, Harvard, Vancouver, ISO, and other styles
19

Škorić, Boris, and Manon de Vries. "Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)." International Journal of Quantum Information 15, no. 03 (April 2017): 1750016. http://dx.doi.org/10.1142/s0219749917500162.

Full text
Abstract:
Perfect encryption of quantum states using the Quantum One-Time Pad (QOTP) requires two classical key bits per qubit. Almost-perfect encryption, with information-theoretic security, requires only slightly more than 1. We slightly improve lower bounds on the key length. We show that key length [Formula: see text] suffices to encrypt [Formula: see text] qubits in such a way that the cipherstate’s [Formula: see text]-distance from uniformity is upperbounded by [Formula: see text]. For a stricter security definition involving the [Formula: see text]-norm, we prove sufficient key length [Formula: see text], where [Formula: see text] is a small probability of failure. Our proof uses Pauli operators, whereas previous results on the [Formula: see text]-norm needed Haar measure sampling. We show how to QOTP-encrypt classical plaintext in a nontrivial way: we encode a plaintext bit as the vector [Formula: see text] on the Bloch sphere. Applying the Pauli encryption operators results in eight possible cipherstates which are equally spread out on the Bloch sphere. This encoding, especially when combined with the half-keylength option of QOTP, has advantages over 4-state and 6-state encoding in applications such as Quantum Key Recycling (QKR) and Unclonable Encryption (UE). We propose a key recycling scheme that is more efficient and can tolerate more noise than a recent scheme by Fehr and Salvail. For 8-state QOTP encryption with pseudorandom keys, we do a statistical analysis of the cipherstate eigenvalues. We present numerics up to nine qubits.
APA, Harvard, Vancouver, ISO, and other styles
20

Horlynskyi, Viktor, and Borys Horlynskyi. "Сonstitution of national cyber space and its educational significance for cyber security professionals." Collection "Information Technology and Security" 11, no. 1 (June 29, 2023): 69–83. http://dx.doi.org/10.20535/2411-1031.2023.11.1.283710.

Full text
Abstract:
It is shown that the construction of an established system of cybersecurity of the state in the context of globalization, development of information technologies, transfer of “hybrid wars” to cyberspace, requires improving the quality of training, on which depends the reliability of national cyberspace. It is specified that the key indicator of qualification of specialists in the field of cybersecurity is competence, but their final definition and actual content, in accordance with the requirements of rapid technical and technological development, requires substantiation of theoretical principles that are the object of study. It is substantiated that an essential component of the theoretical basis for determining the system of competencies is a certain set of factors that determine its constitution and determine the subject and purpose of the study. The key factors that need to be taken into account in determining professional competencies are the following: the requirements of the modern education system; the systemic nature of the processes unfolding in global cyberspace; conceptual principles of cybersecurity; rapid development of information technologies and the transition to a quantum basis; new threats to national security arising from the convergence of information and high-tech technologies; cyberattacks aimed at government agencies and national security structures; attempts at destructive psychological influence on the personnel of the security and defense sector; Ukraine's course towards Euro-Atlantic integration, harmonization of the national system of standards with NATO standards in the field of cyber security; increasing the riskiness of professional activity; challenges of gender policy to achieve gender equality in the field of security and defense of Ukraine. Therefore, it should be noted that the training of specialists in the field of cybersecurity in the interests of the future of the country should be based on a certain, methodologically sound system of competencies, the implementation of which should lead to quality training in professional activities in the field of cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
21

Nape, Isaac, Valeria Rodríguez-Fajardo, Feng Zhu, Hsiao-Chih Huang, Jonathan Leach, and Andrew Forbes. "Measuring dimensionality and purity of high-dimensional entangled states." Nature Communications 12, no. 1 (August 27, 2021). http://dx.doi.org/10.1038/s41467-021-25447-0.

Full text
Abstract:
AbstractHigh-dimensional entangled states are promising candidates for increasing the security and encoding capacity of quantum systems. While it is possible to witness and set bounds for the entanglement, precisely quantifying the dimensionality and purity in a fast and accurate manner remains an open challenge. Here, we report an approach that simultaneously returns the dimensionality and purity of high-dimensional entangled states by simple projective measurements. We show that the outcome of a conditional measurement returns a visibility that scales monotonically with state dimensionality and purity, allowing for quantitative measurements for general photonic quantum systems. We illustrate our method using two separate bases, the orbital angular momentum and pixels bases, and quantify the state dimensionality by a variety of definitions over a wide range of noise levels, highlighting its usefulness in practical situations. Importantly, the number of measurements needed in our approach scale linearly with dimensions, reducing data acquisition time significantly. Our technique provides a simple, fast and direct measurement approach.
APA, Harvard, Vancouver, ISO, and other styles
22

Nadeem, Mohd, Masood Ahmad, Syed Anas Ansar, Prabhash Chandra Pathak, Rajeev Kumar, and Raees Ahmad Khan. "Security Evaluation of Software by Using Fuzzy-TOPSIS through Quantum Criteria." Journal of Fuzzy Logic and Modeling in Engineering 02 (August 17, 2023). http://dx.doi.org/10.2174/2666294902666230817162030.

Full text
Abstract:
aims: Quantum computer development attracts the security experts of software. The rapid development of number of qubit in quantum computer makes the present security mechanism of software insecure. Software developers need to pay attention to the development of quantum computers in terms of software security. background: Software security evaluation focuses on the fundamental security features of software as well as the quantum enable security alternatives. The software security evaluation is the most crucial part of surveying, controlling, and administering security in order to further improve the properties of safety. objective: It's crucial to understand that performing a security assessment early on in the develop-ment process can help you find bugs, vulnerabilities, faults, and attacks. In this quantitative study, the definition and use of the quantum computing security approach in software security will be cov-ered. The cryptographic calculations had to secure our institutions based on computers and networks. method: The Fuzzy Technique for Order Preference by Similarity to Ideal Situation (Fuzzy-TOPSIS) to quantitatively assess the rank of the quantum enable security alternatives with security factors. result: The Quantum Key Distribution [A2], the quantum technique of security approach, has got the top priority and quantum key distribution in GHz state [A6] got the least in the estimation of software security during the era of quantum computer by the neural network method of Fuzzy-TOPSIS. conclusion: The quantum mechanism of computing makes classical computing insecure. The secu-rity estimation of software makes developers focus on the quantum mechanism of security. The quantum mechanism of quantum key distribution is to make software secure.
APA, Harvard, Vancouver, ISO, and other styles
23

Pan, Chuyue, Tao Shang, and Yuanjing Zhang. "Universal quantum obfuscation for quantum non-linear functions." Frontiers in Physics 10 (January 4, 2023). http://dx.doi.org/10.3389/fphy.2022.1048832.

Full text
Abstract:
Research on quantum cryptography has burgeoned in the recent decades and combined quantum mechanics and cryptography theory. Among the existing quantum cryptographic primitives, quantum obfuscation is an emergent force to be reckoned with. Quantum obfuscation means obfuscating a circuit by quantum mechanics to improve security. It is used to hide functionality and prevent the reverse engineering of quantum circuits. However, research studies on the construction of quantum obfuscation are relatively immature due to its difficulty in implementation and application. Also, the obfuscation for quantum non-linear functions has not been suggested yet, although quantum non-linear functions cover a wide range of quantum functions that can be obfuscated. In this paper, we initiate a universal definition of quantum obfuscation which utilizes quantum teleportation to construct an obfuscator and interpreter for quantum non-linear functions. Furthermore, we demonstrate the validity of applying the obfuscation to the quantum asymmetric encryption scheme and rigorously prove that the encryption realized by quantum obfuscation satisfies IND (indistinguishability)-security. This work provides a positive possibility of quantum obfuscation for quantum non-linear functions and will complement the theory of both quantum obfuscation and quantum asymmetric encryption.
APA, Harvard, Vancouver, ISO, and other styles
24

Hyman, Prue. "A Living Wage - The Current New Zealand Campaign and the International Background." Labour, Employment and Work in New Zealand, January 1, 2013. http://dx.doi.org/10.26686/lew.v0i0.1974.

Full text
Abstract:
In a paper to LEW10, I asked why the concept of a living wage, formerly prevalent in New Zealand discourse, was no longer a common slogan – and suggested that it might be politic for it to be revived as a campaigning tool in the context of overseas activity. Exactly ten years later, such a campaign, led by the Service and Food Workers Union (SFWU) and with widespread union and community group support, is well under way, inspired partly by successes overseas. For example, the London Olympics used the living wage principle, while many UK local government authorities including the Greater London Council declare themselves to be living wage employers. Many other countries also have active campaigns and jurisdictions where living wages have been adopted. This paper will first discuss the political, economic, social and industrial relations context and rationales for such a campaign and the progress to date in New Zealand. It will then move on to the definitional, theoretical and practical issues in establishing the quantum of a living wage above the minimum wage, drawing on relevant overseas literature and experience. It will also discuss opposition based on lack of affordability, interference with the market, and employment implications. Basic definitions are variations on the theme that a living wage represents a minimum income required for a ‘decent livelihood’, to include the costs of paid work, particularly child care and transport/other directly attributable costs. The major methods of establishing a living wage are similar to those for establishing a poverty line, but must include the in work costs as well as often being based on a slightly more generous standard to ensure that being in paid work has some material benefit above social security minimum standards, in addition to its intrinsic benefits. There are therefore two common methods for calculating a living wage. The first uses relativities to average or median incomes, commonly 60% of the median (the NZ Poverty Measurement Study used 60% of median, equivalent, disposable, household income). The second approach builds up household budgets using one or ideally both of two approaches - published data from expenditure surveys and focus group discussions. Reconciliation or averaging of the two approaches, which often lead to fairly similar results, is common. This paper will discuss these methods, together with issues related to different household structures and regional differences, which make the living wage conceptually and practically more complex than a minimum wage. Finally, the paper will discuss the relationships, both positive and with some tensions, between the living wage campaign and various other social justice initiatives in the labour market and society generally – to improve paid parental leave, oppose changes to the welfare system, reduce child and general poverty, and reverse the thirty year increase in inequality
APA, Harvard, Vancouver, ISO, and other styles
25

Sun, Shi-Hai, Zhi-Yu Tian, Mei-Sheng Zhao, and Yan Ma. "Security evaluation of quantum key distribution with weak basis-choice flaws." Scientific Reports 10, no. 1 (October 23, 2020). http://dx.doi.org/10.1038/s41598-020-75159-6.

Full text
Abstract:
Abstract Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. In this paper, we evaluate the security of QKD with weak basis-choice flaws, in which the random bits used by Alice and Bob are weakly controlled by Eve. Based on the definition of Li et al. (Sci Rep 5:16200, 2015) and GLLP’s analysis, we obtain a tight and analytical bound to estimate the phase error and key rate for both the single photon source and the weak coherent source. Our approach largely increases the key rate from that of the original approach. Finally, we investigate and confirm the security of BB84-QKD with a practical commercial devices.
APA, Harvard, Vancouver, ISO, and other styles
26

Yesina, M. V., S. G. Vdovenko, and I. D. Gorbenko. "MODELS OF SECURITY OF POST-QUANTUM ASYMMETRIC ENCUSSION BASED ON INDISTINGUISHABILITY." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, March 29, 2019, 15–26. http://dx.doi.org/10.46972/2076-1546.2019.16.02.

Full text
Abstract:
The article takes a verifier of equivalence of the quality of indistinguishability (uncertainty) of the semantic security for the cryptosystems defense against of attacker's cryptanalyses based on matched (selected) open text. The issues of analysis and research of security models of post-quantum cryptoalgorithms in relation to cryptoprimitives of all types, the definition of criteria for assessing their compliance with different security models (according to different types of crypto-transformations) are relevant and of practical importance. The indistinguishability (uncertainty) of encrypted text is an important property of the security of many encryption schemes. The indistinguishability (uncertainty) property when attacking on the basis of matched (selected) plain text is considered a basic requirement for the majority of reliably protected public-key cryptosystems. Some schemes also provide an indistinguishability for attack based on selected (selected) encrypted text and attack based on adaptively picked (selected) encrypted text. The indistinguishability (uncertainty) of an attack on the basis of a selected (selected) open text is equivalent to the properties of semantic security. If the cryptosystem has the property of indistinguishability, the attacker will not be able to distinguish between pairs of encrypted texts based on the message that they encrypt. In the case of non-differentiation (uncertainty) of ciphertext protects all known cryptosystems from the intruder which: is a probabilistic Turing machine of polynomial time; has all algorithms; has full access to communications. Using the property of the indeterminacy (uncertainty) of the encrypted text at the present time, it is guaranteed to protect all known symmetric and asymmetric cryptosystems from the classical or quantum cryptanalysis of the intruder. Here are a review of mostly attacks on the encryption security namely an attack based on adaptively matched (selected) ciphertexts, an attack based on adaptively matched (selected) open texts, an attack based on both of this types of texts, an attack based on matched (selected) ciphertexts, an attack based on matched (selected) open texts and a recognition attacks (recognizability).
APA, Harvard, Vancouver, ISO, and other styles
27

Leermakers, Daan, and Boris Škorić. "Two-way unclonable encryption with a vulnerable sender." International Journal of Quantum Information 20, no. 02 (March 2022). http://dx.doi.org/10.1142/s0219749921500374.

Full text
Abstract:
Unclonable Encryption, introduced by Gottesman in 2003 [Quantum Inform. Comput. 3 (2003) 581], is a quantum protocol that guarantees the secrecy of a successfully transferred classical message even when all keys leak at a later time. We propose an Unclonable Encryption protocol with the additional property that the sender’s key material is allowed to leak even in the case of an unsuccessful run. This extra feature makes it possible to achieve secure quantum encryption even when one of the parties is unable to protect its keys against after-protocol theft. Such an asymmetry occurs e.g. in case of server–client scenarios, where the client device is resource constrained and/or located in a hostile environment. Our protocol makes use of a bidirectional quantum channel in a manner similar to the two-way protocol LM05 [Phys. Rev. Lett. 94 (2005) 140501]. Bob sends random qubit states to Alice. Alice flips the states in a way that depends on the message and a shared key, and sends the resulting states back to Bob. Bob recovers Alice’s message by measuring the flips. We prove that our protocol satisfies the definition of unclonable encryption and additionally that the message remains secure even if all of Alice’s keys leak after the protocol. Furthermore, we show that some of the key materials can be safely re-used. Our security proof is formulated in terms of diamond norms, which makes it composable, and allows for noisy quantum channels. We work out the details only for the asymptotics in the limit of long messages. As a side result, we construct a two-way QKD scheme with a high key rate. We show that its key rate is higher than the rate of the two-way QKD scheme LM05 proven by Beaudry et al. [Phys. Rev. A 88 (2013) 062302] for the case of independent channel noise.
APA, Harvard, Vancouver, ISO, and other styles
28

Vasilescu, Dragos-Cristian, and Michael Filzmoser. "Machine invention systems: a (r)evolution of the invention process?" AI & SOCIETY, November 23, 2020. http://dx.doi.org/10.1007/s00146-020-01080-1.

Full text
Abstract:
AbstractCurrent developments in fields such as quantum physics, fine arts, robotics, cognitive sciences or defense and security indicate the emergence of creative systems capable of producing new and innovative solutions through combinations of machine learning algorithms. These systems, called machine invention systems, challenge the established invention paradigm in promising the automation of – at least parts of – the innovation process. This paper’s main contribution is twofold. Based on the identified state-of-the-art examples in the above mentioned fields, key components for machine invention systems and their relations are identified, creating a conceptual model as well as proposing a working definition for machine invention systems. The differences and delimitations to other concepts in the field of machine learning and artificial intelligence, such as machine discovery systems are discussed as well. Furthermore, the paper briefly addresses the social and societal implications and limitations that come with the adoption of the technology. Because of their revolutionizing potential, there are widespread implications to consider from ethical and moral implications to policymaking and societal changes, like changes in the job structure. The discussion part approaches some of these implications, as well as solutions to some of the proposed challenges. The paper concludes by discussing some of the systemic benefits that can be accessed through machine invention.
APA, Harvard, Vancouver, ISO, and other styles
29

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
30

Lyubchenko, Irina. "NFTs and Digital Art." M/C Journal 25, no. 2 (April 25, 2022). http://dx.doi.org/10.5204/mcj.2891.

Full text
Abstract:
Introduction This article is concerned with the recent rise in popularity of crypto art, the term given to digital artworks whose ownership and provenance are confirmed with a non-fungible token (NFT), making it possible to sell these works within decentralised cryptocurrency art markets. The goal of this analysis is to trace a genealogy of crypto art to Dada, an avant-garde movement that originated in the early twentieth century. My claim is that Dadaism in crypto art appears in its exhausted form that is a result of its revival in the 1950s and 1960s by the Neo Dada that reached the current age through Pop Art. Dada’s anti-art project of rejecting beauty and aesthetics has transformed into commercial success in the Neo Dada Pop Art movement. In turn, Pop Art produced its crypto version that explores not only the question of what art is and is not, but also when art becomes money. In what follows, I will provide a brief overview of NFT art and its three categories that could generally be found within crypto marketplaces: native crypto art, non-digital art, and digital distributed-creativity art. Throughout, I will foreground the presence of Dadaism in these artworks and provide art historical context. NFTs: Brief Overview A major technological component that made NFTs possible was developed in 1991, when cryptographers Stuart Haber and W. Scott Stornetta proposed a method for time-stamping data contained in digital documents shared within a distributed network of users (99). This work laid the foundation for what became known as blockchain and was further implemented in the development of Bitcoin, a digital currency invented by Satoshi Nakamoto in 2008. The original non-fungible tokens, Coloured Coins, were created in 2012. By “colouring” or differentiating bitcoins, Coloured Coins were assigned special properties and had a value independent of the underlying Bitcoin, allowing their use as commodity certificates, alternative currencies, and other financial instruments (Assia et al.). In 2014, fuelled by a motivation to protect digital artists from unsanctioned distribution of their work while also enabling digital art sales, media artist Kevin McCoy and tech entrepreneur Anil Dash saw the potential of blockchain to satisfy their goals and developed what became to be known as NFTs. This overnight invention was a result of McCoy and Dash’s participation in the Seven on Seven annual New York City event, a one-day creative collaboration that challenged seven pairs of artists and engineers to “make something” (Rhizome). McCoy and Dash did not patent their invention, nor were they able to popularise it, mentally archiving it as a “footnote in internet history”. Ironically, just a couple of years later NFTs exploded into a billion-dollar market, living up to an ironic name of “monetized graphics” that the pair gave to their invention. Crypto art became an international sensation in March 2021, when a digital artist Mike Winklemann, known as Beeple, sold his digital collage titled Everydays: The First 5000 Days for US$69.3 million, prompting Noah Davis, a curator who assisted with the sale at the Christie’s auction house, to proclaim: “he showed us this collage, and that was my eureka moment when I knew this was going to be extremely important. It was just so monumental and so indicative of what NFTs can do” (Kastrenakes). As a technology, a non-fungible token can create digital scarcity in an otherwise infinitely replicable digital space. Contrary to fungible tokens, which are easily interchangeable due to having an equal value, non-fungible tokens represent unique items for which one cannot find an equivalent. That is why we rely on the fungibility of money to exchange non-fungible unique goods, such as art. Employing non-fungible tokens allows owning and exchanging digital items outside of the context in which they originated. Now, one can prove one’s possession of a digital skin from a videogame, for example, and sell it on digital markets using crypto currency (“Bible”). Behind the technology of NFTs lies the use of a cryptographic hash function, which converts a digital artwork of any file size into a fixed-length hash, called message digest (Dooley 179). It is impossible to revert the process and arrive at the original image, a quality of non-reversibility that makes the hash function a perfect tool for creating a digital representation of an artwork proofed from data tampering. The issued or minted NFT enters a blockchain, a distributed database that too relies on cryptographic properties to guarantee fidelity and security of data stored. Once the NFT becomes a part of the blockchain, its transaction history is permanently recorded and publicly available. Thus, the NFT simultaneously serves as a unique representation of the artwork and a digital proof of ownership. NFTs are traded in digital marketplaces, such as SuperRare, KnownOrigin, OpenSea, and Rarible, which rely on a blockchain to sustain their operations. An analysis of these markets’ inventory can be summarised by the following list of roughly grouped types of artistic works available for purchase: native crypto art, non-digital art, distributed creativity art. Native Crypto Art In this category, I include projects that motivated the creation of NFT protocols. Among these projects are the aforementioned Colored Coins, created in 2012. These were followed by issuing other visual creations native to the crypto-world, such as LarvaLabs’s CryptoPunks, a series of 10,000 algorithmically generated 8-bit-style pixelated digital avatars originally available for free to anyone with an Ethereum blockchain account, gaining a cult status among the collectors when they became rare sought-after items. On 13 February 2022, CryptoPunk #5822 was sold for roughly $24 million in Ethereum, beating the previous record for such an NFT, CryptoPunk #3100, sold for $7.58 million. CryptoPunks laid the foundation for other collectible personal profile projects, such Bored Ape Yacht Club and Cool Cats. One of the ultimate collections of crypto art that demonstrates the exhaustion of original Dada motivations is titled Monas, an NFT project made up of 5,000 programmatically generated versions of a pixelated Mona Lisa by Leonardo da Vinci (c. 1503-1506). Each Monas, according to the creators, is “a mix of Art, history, and references from iconic NFTs” (“Monas”). Monas are a potpourri of meme and pop culture, infused with inside jokes and utmost silliness. Monas invariably bring to mind the historic Dadaist gesture of challenging bourgeois tastes through defacing iconic art historical works, such as Marcel Duchamp’s treatment of Mona Lisa in L.H.O.O.Q. In 1919, Duchamp drew a moustache and a goatee on a reproduction of La Joconde, as the French called the painting, and inscribed “L.H.O.O.Q.” that when pronounced sounds like “Elle a chaud au cul”, a vulgar expression indicating sexual arousal of the subject. At the time of its creation, this Dada act was met with the utmost public contempt, as Mona Lisa was considered a sacred work of art and a patron of the arts, an almost religious symbol (Elger and Grosenick 82). Needless to say, the effect of Monas on public consciousness is far from causing disgust and, on the contrary, brings childish joy and giggles. As an NFT artist, Mankind, explains in his YouTube video on personal profile projects: “PFPs are built around what people enjoy. People enjoy memes, people enjoy status, people enjoy being a part of something bigger than themselves, the basic primary desire to mix digital with social and belong to a community”. Somehow, “being bigger than themselves” has come to involve collecting defaced images of Mona Lisa. Turning our attention to historical analysis will help trace this transformation of the Dada insult into a collectible NFT object. Dada and Its Legacy in Crypto Art Dada was founded in 1916 in Zurich, by Hugo Ball, Tristan Tzara, Hans Richter, and other artists who fled their homelands during the First World War (Hapgood and Rittner 63). One of Dada’s primary aspirations was to challenge the dominance of reason that brought about the tragedy of the First World War through attacking the postulates of culture this form of reason produced. Already in 1921, such artists as André Breton, Louis Aragon, and Max Ernst were becoming exhausted by Dada’s nihilist tendencies and rejection of all programmes for the arts, except for the one that called for the total freedom of expression. The movement was pronounced dead about May 1921, leaving no sense of regret since, in the words of Breton, “its omnipotence and its tyranny had made it intolerable” (205). An important event associated with Dada’s revival and the birth of the Neo Dada movement was the publication of The Dada Painters and Poets in 1951. This volume, the first collection of Dada writings in English and the most comprehensive anthology in any language, was introduced to the young artists at the New School by John Cage, who revived Tristan Tzara’s concept that “life is far more interesting” than art (Hapgood and Rittner 64). The 1950s were marked by a renewed interest in Dadaism that can also be evidenced in galleries and museums organising numerous exhibitions on the movement, such as Dada 1916 –1923 curated by Marcel Duchamp at the Sidney Janis Gallery in 1953. By the end of the decade, such artists as Jasper Johns and Robert Rauschenberg began exploring materials and techniques that can be attributed to Dadaism, which prompted the title of Neo Dada to describe this thematic return (Hapgood and Rittner 64). Among the artistic approaches that Neo Dada borrowed from Dada are Duchampian readymades that question the status of the art object, Kurt Schwitters’s collage technique of incorporating often banal scraps and pieces of the everyday, and the use of chance operations as a compositional device (Hapgood and Rittner 63–64). These approaches comprise the toolbox of crypto artists as well. Monas, CryptoPunks, and Bored Ape Yacht Club are digital collages made of scraps of pop culture and the everyday Internet life assembled into compositional configurations through chance operation made possible by the application of algorithmic generation of the images in each series. Art historian Helen Molesworth sees the strategies of montage, the readymade, and chance not only as “mechanisms for making art objects” but also as “abdications of traditional forms of artistic labor” (178). Molesworth argues that Duchamp’s invention of the readymade “substituted the act of (artistic) production with consumption” and “profoundly questioned the role, stability, nature, and necessity of the artist’s labor” (179). Together with questioning the need for artistic labour, Neo Dadaists inherited what an American art historian Jack D. Flam terms the “anything goes” attitude: Dada’s liberating destruction of rules and derision of art historical canon allowed anything and everything to be considered art (xii). The “anything goes” approach can also be traced to the contemporary crypto artists, such as Beeple, whose Everydays: The First 5000 Days was a result of assembling into a collage the first 5,000 of his daily training sketches created while teaching himself new digital tools (Kastrenakes). When asked whether he genuinely liked any of his images, Beeple explained that most digital art was created by teams of people working over the course of days or even weeks. When he “is pooping something out in 45 minutes”, it “is probably not gonna look that great comparatively” (Cieplak-Mayr von Baldegg). At the core of Dada was a spirit of absurdism that drove an attack on the social, political, artistic, and philosophical norms, constituting a radical movement against the Establishment (Flam xii). In Dada Art and Anti-Art, Hans Richter’s personal historical account of the Dada movement, the artist describes the basic principle of Dada as guided by a motivation “to outrage public opinion” (66). Richter’s writings also point out a desensitisation towards Dada provocations that the public experienced as a result of Dada’s repetitive assaults, demanding an invention of new methods to disgrace the public taste. Richter recounts: our exhibitions were not enough. Not everyone in Zurich came to look at our pictures, attending our meetings, read our poems and manifestos. The devising and raising of public hell was an essential function of any Dada movement, whether its goal was pro-art, non-art or anti-art. And the public (like insects or bacteria) had developed immunity to one of kind poison, we had to think of another. (66) Richter’s account paints a cultural environment in which new artistic provocations mutate into accepted norms in a quick succession, forming a public body that is immune to anti-art “poisons”. In the foreword to Dada Painters and Poets, Flam outlines a trajectory of acceptance and subjugation of the Dadaist spirit by the subsequent revival of the movement’s core values in the Neo Dada of the 1950s and 1960s. When Dadaism was rediscovered by the writers and artists in the 1950s, the Dada spirit characterised by absurdist irony, self-parody, and deadpan realism was becoming a part of everyday life, as if art entered life and transformed it in its own image. The Neo Dada artists, such as Jasper Johns, Robert Rauschenberg, Claes Oldenburg, Roy Lichtenstein, and Andy Warhol, existed in a culturally pluralistic space where the project of a rejection of the Establishment was quickly absorbed into the mainstream, mutating into the high culture it was supposedly criticising and bringing commercial success of which the original Dada artists would have been deeply ashamed (Flam xiii). Raoul Hausmann states: “Dada fell like a raindrop from heaven. The Neo-Dadaists have learnt to imitate the fall, but not the raindrop” (as quoted in Craft 129). With a similar sentiment, Richard Huelsenbeck writes: “Neo-Dada has turned the weapons used by Dada, and later by Surrealism, into popular ploughshares with which to till the fertile soil of sensation-hungry galleries eager for business” (as quoted in Craft 130). Marcel Duchamp, the forefather of the avant-garde, comments on the loss of Dada’s original intent: this Neo-Dada, which they call New Realism, Pop Art, Assemblage, etc., is an easy way out, and lives on what Dada did. When I discovered ready-mades I thought to discourage aesthetics. In Neo-Dada they have taken my ready-mades and found aesthetic beauty in them. I threw the bottle-rack and the urinal into their faces as a challenge and now they admire them for their aesthetic beauty. (Flam xiii) In Neo Dada, the original anti-art impulse of Dadaism was converted into its opposite, becoming an artistic stance and a form of aesthetics. Flam notes that these gradual transformations resulted in the shifts in public consciousness, which it was becoming more difficult to insult. Artists, among them Roy Lichtenstein, complained that it was becoming impossible to make anything despicable: even a dirty rug could be admired (Flam xiii). The audience lost their ability to understand when they were being mocked, attacked, or challenged. Writing in 1981, Flam proclaimed that “Dada spirit has become an inescapable condition of modern life” (xiv). I contend that the current crypto art thrives on the Dada spirit of absurdism, irony, and self-parody and continues to question the border between art and non-art, while fully subscribing to the “anything goes” approach. In the current iteration of Dada in the crypto world, the original subversive narrative can be mostly found in the liberating rhetoric promoted by the proponents of the decentralised economic system. While Neo Dada understood the futility of shocking the public and questioning their tastes, crypto art is ignorant of the original Dada as a form of outrage, a revolutionary movement ignited by a social passion. In crypto art, the ambiguous relationship that Pop Art, one of the Neo Dada movements, had with commercial success is transformed into the content of the artworks. As Tristan Tzara laconically explained, the Dada project was to “assassinate beauty” and with it all the infrastructure of the art market (as quoted in Danto 39). Ironically, crypto artists, the descendants of Dada, erected the monument to Value artificially created through scarcity made possible by blockchain technology in place of the denigrated Venus demolished by the Dadaists. After all, it is the astronomical prices for crypto art that are lauded the most. If in the pre-NFT age, artistic works were evaluated based on their creative merit that included considering the prominence of the artist within art historical canon, current crypto art is evaluated based on its rareness, to which the titles of the crypto art markets SuperRare and Rarible unambiguously refer (Finucane 28–29). In crypto art, the anti-art and anti-commercialism of Dada has fully transformed into its opposite. Another evidence for considering crypto art to be a descendant of Dada is the NFT artists’ concern for the question of what art is and is not, brought to the table by the original Dada artists. This concern is expressed in the manifesto-like mission statement of the first Museum of Crypto Art: at its core, the Museum of Crypto Art (M○C△) challenges, creates conflict, provokes. M○C△ puts forward a broad representation of perspectives meant to upend our sense of who we are. It poses two questions: “what is art?” and “who decides?” We aim to resolve these questions through a multi-stakeholder decentralized platform of art curation and exhibition. (The Museum of Crypto Art) In the past, the question regarding the definition of art was overtaken by the proponent of the institutional approach to art definition, George Dickie, who besides excluding aesthetics from playing a part in differentiating art from non-art famously pronounced that an artwork created by a monkey is art if it is displayed in an art institution, and non-art if it is displayed elsewhere (Dickie 256). This development might explain why decentralisation of the art market achieved through the use of blockchain technology still relies on the endorsing of the art being sold by the widely acclaimed art auction houses: with their stamp of approval, the work is christened as legitimate art, resulting in astronomical sales. Non-Digital Art It is not surprising that an NFT marketplace is an inviting arena for the investigation of questions of commercialisation tackled in the works of Neo Dada Pop artists, who made their names in the traditional art world. This brings us to a discussion of the second type of artworks found in NFT marketplaces: non-digital art sold as NFT and created by trained visual artists, such as Damien Hirst. In his recent NFT project titled Currency, Hirst explores “the boundaries of art and currency—when art changes and becomes a currency, and when currency becomes art” (“The Currency”). The project consists of 10,000 artworks on A4 paper covered in small, coloured dots, a continuation of the so-called “spot-paintings” series that Hirst and his assistants have been producing since the 1980s. Each artwork is painted on a hand-made paper that bears the watermark of the artist’s bust, adorned with a microdot that serves as a unique identification, and is made to look very similar to the others—visual devices used to highlight the ambiguous state of these artworks that simultaneously function as Hirst-issued currency. For Hirst, this project is an experiment: after the purchase of NFTs, buyers are given an opportunity to exchange the NFT for the original art, safely stored in a UK vault; the unexchanged artworks will be burned. Is art going to fully transform into currency? Will you save it? In Hirst’s project, the transformation of physical art into crypto value becomes the ultimate act of Dada nihilism, except for one big difference: if Dada wanted to destroy art as a way to invent it anew, Hirst destroys art to affirm its death and dissolution in currency. In an ironic gesture, the gif NFT artist Nino Arteiro, as if in agreement with Hirst, attempts to sell his work titled Art Is Not Synonymous of Profit, which contains a crudely written text “ART ≠ PROFIT!” for 0.13 Ether or US$350. Buying this art will negate its own statement and affirm its analogy with money. Distributed-Creativity Art When browsing through crypto art advertised in the crypto markets, one inevitably encounters works that stand out in their emphasis on aesthetic and formal qualities. More often than not, these works are created with the use of Artificial Intelligence (AI). To a viewer bombarded with creations unconcerned with the concept of beauty, these AI works may serve as a sensory aesthetic refuge. Among the most prominent artists working in this realm is Refik Anadol, whose Synthetic Dreams series at a first glance may appear as carefully composed works of a landscape painter. However, at a closer look nodal connections between points in rendered space provide a hint at the use of algorithmic processes. These attractive landscapes are quantum AI data paintings created from a data set consisting of 200 million raw images of landscapes from around the world, with each image having been computed with a unique quantum bit string (“Synthetic Dreams”). Upon further contemplation, Anadol’s work begins to remind of the sublime Romantic landscapes, revamped through the application of AI that turned fascination with nature’s unboundedness into awe in the face of the unfathomable amounts of data used in creation of Anadol’s works. These creations can be seen as a reaction against the crypto art I call exhausted Dada, or a marketing approach that targets a different audience. In either case, Anadol revives aesthetic concern and aligns himself with the history of sublimity in art that dates back to the writings of Longinus, becoming of prime importance in the nineteenth-century Romantic painting, and finding new expressions in what is considered the technological sublime, which, according to David E. Nye. concentrates “on the triumph of machines… over space and time” (as quoted in Butler et al. 8). In relation to his Nature Dreams project, Anadol writes: “the exhibition’s eponymous, sublime AI Data Sculpture, Nature Dreams utilizes over 300 million publicly available photographs of nature collected between 2018- 2021 at Refik Anadol Studio” (“Machine Hallucinations Nature Dreams”). From this short description it is evident that Anadol’s primary focus is on the sublimity of large sets of data. There is an issue with that approach: since experiencing the sublime involves loss of rational thinking (Longinus 1.4), these artworks cease the viewer’s ability to interrogate cultural adaptation of AI technology and stay within the realm of decorative ornamentations, demanding an intervention akin to that brought about by the historical avant-garde. Conclusions I hope that this brief analysis demonstrates the mechanisms by which the strains of Dada entered the vocabulary of crypto artists. It is probably also noticeable that I equate the nihilist project of the exhausted Dada found in such works as Hirst’s Cryptocurrency with a dead end similar to so many other dead ends in art history—one only needs to remember that the death of painting was announced a myriad of times, and yet it is still alive. Each announcement of its death was followed by its radiant return. It could be that using art as a visual package for monetary value, a death statement to art’s capacity to affect human lives, will ignite artists to affirm art’s power to challenge, inspire, and enrich. References Assia, Yoni et al. “Colored Coins Whitepaper.” 2012-13. <https://docs.google.com/document/d/1AnkP_cVZTCMLIzw4DvsW6M8Q2JC0lIzrTLuoWu2z1BE/edit>. Breton, André. “Three Dada Manifestoes, before 1924.” The Dada Painters and Poets: An Anthology, Ed. Robert Motherwell, Cambridge, Mass: Belknap Press of Harvard UP, 1989. 197–206. Butler, Rebecca P., and Benjamin J. Butler. “Examples of the American Technological Sublime.” TechTrends 57.1 (2013): 9–10. Craft, Catherine Anne. Constellations of Past and Present: (Neo-) Dada, the Avant- Garde, and the New York Art World, 1951-1965. 1996. PhD dissertation. University of Texas at Austin. Cieplak-Mayr von Baldegg, Kasia. “Creativity Is Hustle: Make Something Every Day.” The Atlantic, 7 Oct. 2011. 12 July 2021 <https://www.theatlantic.com/video/archive/2011/10/creativity-is-hustle-make-something-every-day/246377/#slide15>. Danto, Arthur Coleman. The Abuse of Beauty: Aesthetics and the Concept of Art. Chicago, Ill: Open Court, 2006. Dash, Anil. “NFTs Weren’t Supposed to End like This.” The Atlantic, 2 Apr. 2021. 16 Apr. 2022 <https://www.theatlantic.com/ideas/archive/2021/04/nfts-werent-supposed-end-like/618488/>. Dickie, George. “Defining Art.” American Philosophical Quarterly 6.3 (1969): 253–256. Dooley, John F. History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. Cham: Springer, 2018. Elder, R. Bruce. Dada, Surrealism, and the Cinematic Effect. Waterloo: Wilfried Laurier UP, 2015. Elger, Dietmar, and Uta Grosenick. Dadaism. Köln: Taschen, 2004. Flam, Jack. “Foreword”. The Dada Painters and Poets: An Anthology. Ed. Robert Motherwell. Cambridge, Mass: Belknap Press of Harvard UP, 1989. xi–xiv. Finucane, B.P. Creating with Blockchain Technology: The ‘Provably Rare’ Possibilities of Crypto Art. 2018. Master’s thesis. University of British Columbia. Haber, Stuart, and W. Scott Stornetta. “How to Time-Stamp a Digital Document.” Journal of Cryptology 3.2 (1991): 99–111. Hapgood, Susan, and Jennifer Rittner. “Neo-Dada: Redefining Art, 1958-1962.” Performing Arts Journal 17.1 (1995): 63–70. Kastrenakes, Jacob. “Beeple Sold an NFT for $69 million: Through a First-of-Its-Kind Auction at Christie’s.” The Verge, 11 Mar. 2021. 14 July 2021 <https://www.theverge.com/2021/3/11/22325054/beeple-christies-nft-sale-cost-everydays-69-million>. Longinus. On the Sublime. Lewiston/Queenston: Edwin Mellen, 1987. Mankind, “What Are PFP NFTs”. YouTube. 2 Feb. 2022 <https://www.youtube.com/watch?v=Drh_fAV4XNM>. “Machine Hallucinations.” Refik Anadol. 20 Jan. 2022 <https://refikanadol.com/works/machine-hallucination/>. “Machine Hallucinations Nature Dreams.” Refik Anadol. 18 Apr. 2022 <https://refikanadol.com/works/machine-hallucinations-nature-dreams/>. Molesworth, Helen. “From Dada to Neo-Dada and Back Again.” October 105 (2003): 177–181. “Monas”. OpenSea. 17 Feb. 2022 <https://opensea.io/collection/monas>. Museum of Crypto Art. 23 Jan. 2022 <https://museumofcryptoart.com/>. Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System.” 2008. <https://bitcoin.org/bitcoin.pdf>. Richter, Hans. Dada: Art and Anti-Art. London: Thames and Hudson, 2016. Rhizome. “Seven on Seven 2019.” rhizome.org, 26 Mar. 2019. 16 Apr. 2022 <https://rhizome.org/editorial/2019/mar/26/announcing-seven-on-seven-2019-participants-details/>. “Synthetic Dreams.” OpenSea. 23 Jan. 2022 <https://opensea.io/collection/synthetic-dreams>. “The Currency.” OpenSea. 15 Feb. 2022 <https://opensea.io/collection/thecurrency>. “The Non-Fungible Token Bible: Everything You Need to Know about NFTs.” OpenSea Blog, 10 Jan. 2020. 10 June 2021 <https://blog.opensea.io/guides/non-fungible-tokens/>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography