12,492 research outputs found
Continuous-variable quantum authentication of physical unclonable keys
We propose a scheme for authentication of physical keys that are materialized
by optical multiple-scattering media. The authentication relies on the optical
response of the key when probed by randomly selected coherent states of light,
and the use of standard wavefront-shaping techniques that direct the scattered
photons coherently to a specific target mode at the output. The quadratures of
the electromagnetic field of the scattered light at the target mode are
analysed using a homodyne detection scheme, and the acceptance or rejection of
the key is decided upon the outcomes of the measurements. The proposed scheme
can be implemented with current technology and offers collision resistance and
robustness against key cloning.Comment: 15 pages, 7 figure
Revealing the unseen: how to expose cloud usage while protecting user privacy
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud operator, we'd like to expose the utilization of our physical infrastructure to stop this wasteful effort. Mindful that such exposure can be used maliciously for gaining insight into other user's workloads, in this position paper we argue for the need for an approach that balances openness of the cloud overall with privacy for each tenant inside of it. We believe that this approach can be instantiated via a novel combination of several security and privacy technologies. We discuss the potential benefits, implications of transparency for cloud systems and users, and technical challenges/possibilities.Accepted manuscrip
A Symbol of Uniqueness: The Cluster Bootstrap for the 3-Loop MHV Heptagon
Seven-particle scattering amplitudes in planar super-Yang-Mills theory are
believed to belong to a special class of generalised polylogarithm functions
called heptagon functions. These are functions with physical branch cuts whose
symbols may be written in terms of the 42 cluster A-coordinates on Gr(4,7).
Motivated by the success of the hexagon bootstrap programme for constructing
six-particle amplitudes we initiate the systematic study of the symbols of
heptagon functions. We find that there is exactly one such symbol of weight six
which satisfies the MHV last-entry condition and is finite in the collinear limit. This unique symbol is both dihedral and parity-symmetric,
and remarkably its collinear limit is exactly the symbol of the three-loop
six-particle MHV amplitude, although none of these properties were assumed a
priori. It must therefore be the symbol of the three-loop seven-particle MHV
amplitude. The simplicity of its construction suggests that the n-gon bootstrap
may be surprisingly powerful for n>6.Comment: 30 pages, 3 ancillary files, v3: minor corrections, including a typo
in (33
- …
