YAMEI

LIAO

DESIGN

creative

Design for

impact

Amorphous

"IBM Quantum Design Jam"

Timeline

2022

Oct

1 Week


Industry · Tool

Touch Designer

IBM Qiskit Toolkit

After Effect


Roles

Ideation

Motion Designer

Visual Designer/

Prototyper

Team Size

3

Overview

Encrypted Metaverse Identity

Premise: Our digital identity is usually lack of connection to the physical identity, yet our physical identity information (biometrics) could be vulnerable on the Internet.

We propose that Quantum Cryptography has the power to replace modern encryption and safeguard future sensitive data as we enter Web3.

Our approach is to encrypt our biometrics using both quantum cryptography and visual representation, allowing us to extend our one-of-a-kind identity in the metaverse

Overview

Encrypted Metaverse Identity

Premise: Our digital identity is usually lack of connection to the physical identity, yet our physical identity information (biometrics) could be vulnerable on the Internet.

We propose that Quantum Cryptography has the power to replace modern encryption and safeguard future sensitive data as we enter Web3.

Our approach is to encrypt our biometrics using both quantum cryptography and visual representation, allowing us to extend our one-of-a-kind identity in the metaverse

About the Challenge

Quantum Design Jam Brief

The Quantum Design Jam, hosted by The New School Innovation Center in collaboration with the IBM Skills Academy and IBM Quantum team, marked a pioneering initiative. It united designers from The Parsons School of Design with experts in IBM Quantum technologies.


This unique event centered around two primary themes: Art & Design and Music, with a profound exploration of the convergence between the creative arts and quantum physics.



X

Prototype Demonstration
Prototype Demonstration

Learning Process

Quantum Computing

What is Quantum Computing

Quantum computing is a rapidly-emerging technology that harnesses the laws of quantum mechanics, like entanglement, superposition, etc. to solve problems too complex for classical computers.

What is Quantum Cryptography

Quantum cryptography is a method of encryption that uses the naturally occurring properties of quantum mechanics to secure and transmit data in a way that cannot be hacked. The one method we learned is called Quantum Key Distribution. 

Quantum Key Distribution is based on the principles of quantum physics not mathematics. The best known example of quantum cryptography is quantum key distribution. In QKD a quantum key is generated by modifying the properties of photons. It implements a cryptographic protocol that makes use of the fact that measuring a qubit can change its state. The QKD setup has a transmitter (Alice) and a receiver (Bob). Alice dispatches encoded photons on a dedicated quantum channel, while bob decodes these photons using a single photon detector. Both the devices run a series of tests to ensure that encoded photons weren’t tampered with in route. Only after the authentication is complete, a quantum key derived. Transimitter Alice then encrypts the data using this key and send it over a standard communication chanel to Bob, who then uses the quantum key to decrypt the data.

While a hacker can still intercept the quantum encrypted information and clone it, the absence of a quantum key makes the information secure. Any attempt to eavesdrop the quantum Channel would change the quantum state of photons, leaving the chance to detect an intrusion and stop the interception.

Implementation Process

Biometric Data Generation

We studied quantum cryptography, key distribution, and quantum circuit from the Qiskit Textbook. Also, we found a limited number of qubits we could demonstrate on the quantum composer, so we used python and were able to follow the steps to generate a shared security key. Then used the key to encrypt our biometric data, in this case, a set of binary fingerprint data. The encoded data became the material to build the patterns for garments.

Step #1 Choose Biometrics Binary Data

Step #2 Generate Shared Secret Keygen

Step #3 Encode the Binary Data

colorful mountain and meadow scenery with clouds, birds, and grass

Design

Visual Inspiration

As for visual reference, we are inspired by Rei Kawakubo and Iris Van Herpen’s work. We admire the free-form and unconventional designs that we believe could empower us to be whoever we want. And that is what we want to bring to the metaverse.

colorful mountain and meadow scenery with clouds, birds, and grass

Design

Visual Inspiration

As for visual reference, we are inspired by Rei Kawakubo and Iris Van Herpen’s work. We admire the free-form and unconventional designs that we believe could empower us to be whoever we want. And that is what we want to bring to the metaverse.

Prototyping

Visual Exploration

We use Mixamo to apply animation to our 3D digital fashion model, and uploaded the encrypted binary biodata we generated to Touch Designer and mapped it on our digital garment to create digital patterns. We explored different forms and colors as we explored the extendibility of one's identity.

Prototype Demonstration
Prototype Demonstration

Going Forward

Future Steps

Continue learning about Quantum concepts like Quantum Key Distribution and Quantum Cryptography.

Interested in learning more about how Quantum Cryptography and Quantum Key Distribution can ensure that users have a safe and enjoyable space for self-expression in the future digital world.

Furthermore, we are eager to empower users by granting them the authority to customize their own digital fashion through an online platform.

Going Forward

Future Steps

Continue learning about Quantum concepts like Quantum Key Distribution and Quantum Cryptography.

Interested in learning more about how Quantum Cryptography and Quantum Key Distribution can ensure that users have a safe and enjoyable space for self-expression in the future digital world.

Furthermore, we are eager to empower users by granting them the authority to customize their own digital fashion through an online platform.

Going Forward

Future Steps

Continue learning about Quantum concepts like Quantum Key Distribution and Quantum Cryptography.

Interested in learning more about how Quantum Cryptography and Quantum Key Distribution can ensure that users have a safe and enjoyable space for self-expression in the future digital world.

Furthermore, we are eager to empower users by granting them the authority to customize their own digital fashion through an online platform.

  • UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·

    UI & UX Designer · XR Designer · Creative Designer ·

    ·