1,800 research outputs found
Holographic quantum error-correcting codes: Toy models for the bulk/boundary correspondence
We propose a family of exactly solvable toy models for the AdS/CFT
correspondence based on a novel construction of quantum error-correcting codes
with a tensor network structure. Our building block is a special type of tensor
with maximal entanglement along any bipartition, which gives rise to an
isometry from the bulk Hilbert space to the boundary Hilbert space. The entire
tensor network is an encoder for a quantum error-correcting code, where the
bulk and boundary degrees of freedom may be identified as logical and physical
degrees of freedom respectively. These models capture key features of
entanglement in the AdS/CFT correspondence; in particular, the Ryu-Takayanagi
formula and the negativity of tripartite information are obeyed exactly in many
cases. That bulk logical operators can be represented on multiple boundary
regions mimics the Rindler-wedge reconstruction of boundary operators from bulk
operators, realizing explicitly the quantum error-correcting features of
AdS/CFT recently proposed by Almheiri et. al in arXiv:1411.7041.Comment: 40 Pages + 25 Pages of Appendices. 38 figures. Typos and
bibliographic amendments and minor correction
Normal Factor Graphs and Holographic Transformations
This paper stands at the intersection of two distinct lines of research. One
line is "holographic algorithms," a powerful approach introduced by Valiant for
solving various counting problems in computer science; the other is "normal
factor graphs," an elegant framework proposed by Forney for representing codes
defined on graphs. We introduce the notion of holographic transformations for
normal factor graphs, and establish a very general theorem, called the
generalized Holant theorem, which relates a normal factor graph to its
holographic transformation. We show that the generalized Holant theorem on the
one hand underlies the principle of holographic algorithms, and on the other
hand reduces to a general duality theorem for normal factor graphs, a special
case of which was first proved by Forney. In the course of our development, we
formalize a new semantics for normal factor graphs, which highlights various
linear algebraic properties that potentially enable the use of normal factor
graphs as a linear algebraic tool.Comment: To appear IEEE Trans. Inform. Theor
Security in Locally Repairable Storage
In this paper we extend the notion of {\em locally repairable} codes to {\em
secret sharing} schemes. The main problem that we consider is to find optimal
ways to distribute shares of a secret among a set of storage-nodes
(participants) such that the content of each node (share) can be recovered by
using contents of only few other nodes, and at the same time the secret can be
reconstructed by only some allowable subsets of nodes. As a special case, an
eavesdropper observing some set of specific nodes (such as less than certain
number of nodes) does not get any information. In other words, we propose to
study a locally repairable distributed storage system that is secure against a
{\em passive eavesdropper} that can observe some subsets of nodes.
We provide a number of results related to such systems including upper-bounds
and achievability results on the number of bits that can be securely stored
with these constraints.Comment: This paper has been accepted for publication in IEEE Transactions of
Information Theor
Arithmetic completely regular codes
In this paper, we explore completely regular codes in the Hamming graphs and
related graphs. Experimental evidence suggests that many completely regular
codes have the property that the eigenvalues of the code are in arithmetic
progression. In order to better understand these "arithmetic completely regular
codes", we focus on cartesian products of completely regular codes and products
of their corresponding coset graphs in the additive case. Employing earlier
results, we are then able to prove a theorem which nearly classifies these
codes in the case where the graph admits a completely regular partition into
such codes (e.g, the cosets of some additive completely regular code).
Connections to the theory of distance-regular graphs are explored and several
open questions are posed.Comment: 26 pages, 1 figur
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity
protection in cryptographic circuits. We consider a white-box scenario with a
powerful, yet limited attacker. A concise metric for the level of probing and
fault security is introduced, which is directly related to the capabilities of
a realistic attacker. In order to investigate the interrelation of probing and
fault security we introduce a common mathematical framework based on the
formalism of information and coding theory. The framework unifies the known
linear masking schemes. We proof a central theorem about the properties of
linear codes which leads to optimal secret sharing schemes. These schemes
provide the lower bound for the number of masks needed to counteract an
attacker with a given strength. The new formalism reveals an intriguing duality
principle between the problems of probing and fault security, and provides a
unified view on privacy and integrity protection using error detecting codes.
Finally, we introduce a new class of linear tamper-resistant codes. These are
eligible to preserve security against an attacker mounting simultaneous probing
and fault attacks
- …