589 research outputs found

    Chiral rings and GSO projection in Orbifolds

    Full text link
    The GSO projection in the twisted sector of orbifold background is sometimes subtle and incompatible descriptions are found in literatures. Here, from the equivalence of partition functions in NSR and GS formalisms, we give a simple rule of GSO projection for the chiral rings of string theory in \C^r/\Z_n, r=1,2,3r=1,2,3. Necessary constructions of chiral rings are given by explicit mode analysis.Comment: 24 page

    Macroscopic and Microscopic Entropy of Near-Extremal Spinning Black Holes

    Get PDF
    A seven parameter family of five-dimensional black hole solutions depending on mass, two angular momenta, three charges and the asymptotic value of a scalar field is constructed. The entropy is computed as a function of these parameters both from the Bekenstein-Hawking formula and from the degeneracies of the corresponding D-brane states in string theory. The expressions agree at and to leading order away from extremality.Comment: 7 pages, harvma

    General Static Solutions of 2-dimensional Einstein-Dilaton-Maxwell-Scalar Theories

    Get PDF
    General static solutions of effectively 2-dimensional Einstein-Dilaton-Maxwell-Scalar theories are obtained. Our model action includes a class of 2-d dilaton gravity theories coupled with a U(1)U(1) gauge field and a massless scalar field. Therefore it also describes the spherically symmetric reduction of dd-dimensional Einstein-Scalar-Maxwell theories. The properties of the analytic solutions are briefly discussed.Comment: 16 pages, Latex fil

    A Quantum Bousso Bound

    Get PDF
    The Bousso bound requires that one quarter the area of a closed codimension two spacelike surface exceeds the entropy flux across a certain lightsheet terminating on the surface. The bound can be violated by quantum effects such as Hawking radiation. It is proposed that at the quantum level the bound be modified by adding to the area the quantum entanglement entropy across the surface. The validity of this quantum Bousso bound is proven in a two-dimensional large N dilaton gravity theory.Comment: 17 page

    On The Universality Class Of Little String Theories

    Get PDF
    We propose that Little String Theories in six dimensions are quasilocal quantum field theories. Such field theories obey a modification of Wightman axioms which allows Wightman functions (i.e. vacuum expectation values of products of fundamental fields) to grow exponentially in momentum space. Wightman functions of quasilocal fields in x-space violate microlocality at short distances. With additional assumptions about the ultraviolet behavior of quasilocal fields, one can define approximately local observables associated to big enough compact regions. The minimum size of such a region can be interpreted as the minimum distance which observables can probe. We argue that for Little String Theories this distance is of order {\sqrt N}/M_s.Comment: 25 pages, late

    Evaporation of a two-dimensional charged black hole

    Get PDF
    We construct a dilatonic two-dimensional model of a charged black hole. The classical solution is a static charged black hole, characterized by two parameters, mm and qq, representing the black hole's mass and charge. Then we study the semiclassical effects, and calculate the evaporation rate of both mm and qq, as a function of these two quantities. Analyzing this dynamical system, we find two qualitatively different regimes, depending on the electromagnetic coupling constant gAg_{A}. If the latter is greater than a certain critical value, the charge-to-mass ratio decays to zero upon evaporation. On the other hand, for gAg_{A} smaller than the critical value, the charge-to-mass ratio approaches a non-zero constant that depends on gAg_{A} but not on the initial values of mm and qq.Comment: Latex, 30 pages, accepted for publication in Phys. Rev.

    The Stress-Energy Tensor in Soluble Models of Spherically Symmetric Charged Black Hole Evaporation

    Get PDF
    We study the decay of a near-extremal black hole in AdS2_2, related to the near-horizon region of 3+1-dimensional Reissner-Nordstr\"om spacetime, following Fabbri, Navarro, and Navarro-Salas. Back-reaction is included in a semiclassical approximation. Calculations of the stress-energy tensor of matter coupled to the physical spacetime for an affine null observer demonstrate that the black hole evaporation proceeds smoothly and the near-extremal black hole evolves back to an extremal ground state, until this approximation breaks down.Comment: 19 pages, 14 figure

    Hawking Spectrum and High Frequency Dispersion

    Get PDF
    We study the spectrum of created particles in two-dimensional black hole geometries for a linear, hermitian scalar field satisfying a Lorentz non-invariant field equation with higher spatial derivative terms that are suppressed by powers of a fundamental momentum scale k0k_0. The preferred frame is the ``free-fall frame" of the black hole. This model is a variation of Unruh's sonic black hole analogy. We find that there are two qualitatively different types of particle production in this model: a thermal Hawking flux generated by ``mode conversion" at the black hole horizon, and a non-thermal spectrum generated via scattering off the background into negative free-fall frequency modes. This second process has nothing to do with black holes and does not occur for the ordinary wave equation because such modes do not propagate outside the horizon with positive Killing frequency. The horizon component of the radiation is astonishingly close to a perfect thermal spectrum: for the smoothest metric studied, with Hawking temperature TH0.0008k0T_H\simeq0.0008k_0, agreement is of order (TH/k0)3(T_H/k_0)^3 at frequency ω=TH\omega=T_H, and agreement to order TH/k0T_H/k_0 persists out to ω/TH45\omega/T_H\simeq 45 where the thermal number flux is O(1020O(10^{-20}). The flux from scattering dominates at large ω\omega and becomes many orders of magnitude larger than the horizon component for metrics with a ``kink", i.e. a region of high curvature localized on a static worldline outside the horizon. This non-thermal flux amounts to roughly 10\% of the total luminosity for the kinkier metrics considered. The flux exhibits oscillations as a function of frequency which can be explained by interference between the various contributions to the flux.Comment: 32 pages, plain latex, 16 figures included using psfi

    Accelerated Levi-Civita-Bertotti-Robinson Metric in D-Dimensions

    Get PDF
    A conformally flat accelerated charge metric is found in an arbitrary dimension DD. It is a solution of the Einstein-Maxwell-null fluid with a cosmological constant in D4D \ge 4 dimensions. When the acceleration is zero our solution reduces to the Levi-Civita-Bertotti-Robinson metric. We show that the charge loses its energy, for all dimensions, due to the acceleration.Comment: Latex File, 12 page

    TAuth: Verifying timed security protocols

    Get PDF
    Quantitative timing is often explicitly used in systems for better security, e.g., the credentials for automatic website logon often has limited lifetime. Verifying timing relevant security protocols in these systems is very challenging as timing adds another dimension of complexity compared with the untimed protocol verification. In our previous work, we proposed an approach to check the correctness of the timed authentication in security protocols with fixed timing constraints. However, a more difficult question persists, i.e., given a particular protocol design, whether the protocol has security flaws in its design or it can be configured secure with proper parameter values? In this work, we answer this question by proposing a parameterized verification framework, where the quantitative parameters in the protocols can be intuitively specified as well as automatically analyzed. Given a security protocol, our verification algorithm either produces the secure constraints of the parameters, or constructs an attack that works for any parameter values. The correctness of our algorithm is formally proved. We implement our method into a tool called PTAuth and evaluate it with several security protocols. Using PTAuth, we have successfully found a timing attack in Kerberos V which is unreported before.No Full Tex
    corecore