3,657 research outputs found

    Quantum gravity effects on Ho\v{r}ava-Lifshitz black hole

    Full text link
    In this paper, we would like to obtain quantum gravity effects by using Ho\v{r}ava-Lifshitz black hole. We consider logarithmic corrected thermodynamics quantities and investigate the effects of logarithmic correction term. Logarithmic correction comes from thermal fluctuation and may be interpreted as quantum loop corrections. As black hole is a gravitational system, hence we can investigate quantum gravity effect. We find such effects on the black hole stability and obtain domain of correction coefficient.Comment: 22 pages, Accepted for publication in NP

    A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

    Get PDF
    There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any “proving algorithm” that has a sufficiently high success probability. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters [Lecture Notes in Comput. Sci. 5350, Springer (2008), 90–107] under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes

    Relating Gribov-Zwanziger theory to effective Yang-Mills theory

    Full text link
    We consider the Gribov-Zwanziger (GZ) theory with appropriate horizon term which exhibits the nilpotent BRST invariance. This infinitesimal BRST transformation has been generalized by allowing the parameter to be finite and field dependent (FFBRST). By constructing appropriate finite field dependent parameter we show that the generating functional of GZ theory with horizon term is related to that of Yang-Mills (YM) theory through FFBRST transformation.Comment: 14 pages, No figure, to appear in Europhysics Lette
    corecore