Linkable and traceable anonymous authentication with fine-grained access control

Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user's identity in a privacy-preserving way. If enough privacy is provided, malicious users may misuse privacy. Accountability is necessary to avoid abusing anonymity. Previous anonymous authentication schemes can not hold the basic requirements of public linking and tracing while further ensuring access control simultaneously.

Phys.org > Computer Sciences Linkable and traceable anonymous authentication with fine-grained access control

For more open and equitable public discussions on social media, try 'meronymity'

Have you ever felt reluctant to share ideas during a meeting because you feared judgment from senior colleagues? You're not alone. Research has shown this pervasive issue can lead to a lack of diversity in public discourse, especially when junior members of a community don't speak up because they feel intimidated.

Phys.org > Computer Sciences For more open and equitable public discussions on social media, try 'meronymity'

Researchers develop energy-efficient probabilistic computer by combining CMOS with stochastic nanomagnet

Researchers at Tohoku University and the University of California, Santa Barbara, have unveiled a probabilistic computer prototype. Manufacturable with a near-future technology, the prototype combines a complementary metal-oxide semiconductor (CMOS) circuit with a limited number of stochastic nanomagnets, creating a heterogeneous probabilistic computer.

Phys.org > Computer Sciences Researchers develop energy-efficient probabilistic computer by combining CMOS with stochastic nanomagnet