31,136 research outputs found
Lightweight Security for Network Coding
Under the emerging network coding paradigm, intermediate nodes in the network
are allowed not only to store and forward packets but also to process and mix
different data flows. We propose a low-complexity cryptographic scheme that
exploits the inherent security provided by random linear network coding and
offers the advantage of reduced overhead in comparison to traditional
end-to-end encryption of the entire data. Confidentiality is achieved by
protecting (or "locking") the source coefficients required to decode the
encoded data, without preventing intermediate nodes from running their standard
network coding operations. Our scheme can be easily combined with existing
techniques that counter active attacks.Comment: Proc. of the IEEE International Conference on Communications (ICC
2008), Beijing, China, May 200
Quantum Black Hole Entropy, Localization and the Stringy Exclusion Principle
Supersymmetric localization has lead to remarkable progress in computing
quantum corrections to BPS black hole entropy. The program has been successful
especially for computing perturbative corrections to the Bekenstein-Hawking
area formula. In this work, we consider non-perturbative corrections related to
polar states in the Rademacher expansion, which describes the entropy in the
microcanonical ensemble. We propose that these non-perturbative effects can be
identified with a new family of saddles in the localization of the quantum
entropy path integral. We argue that these saddles, which are euclidean
geometries, arise after turning on singular fluxes
in M-theory on a Calabi-Yau. They cease to exist after a certain amount of
flux, resulting in a finite number of geometries; the bound on that number is
in precise agreement with the stringy exclusion principle. Localization of
supergravity on these backgrounds gives rise to a finite tail of Bessel
functions in agreement with the Rademacher expansion. As a check of our
proposal, we test our results against well-known microscopic formulas for
one-eighth and one-quarter BPS black holes in and
string theory respectively, finding agreement. Our method
breaks down precisely when mock-modular effects are expected in the entropy of
one-quarter BPS dyons and we comment upon this. Furthermore, we mention
possible applications of these results, including an exact formula for the
entropy of four dimensional black holes.Comment: 66 page
TASI lectures on AdS/CFT
We introduce the AdS/CFT correspondence as a natural extension of QFT in a
fixed AdS background. We start by reviewing some general concepts of CFT,
including the embedding space formalism. We then consider QFT in a fixed AdS
background and show that one can define boundary operators that enjoy very
similar properties as in a CFT, except for the lack of a stress tensor.
Including a dynamical metric in AdS generates a boundary stress tensor and
completes the CFT axioms. We also discuss some applications of the bulk
geometric intuition to strongly coupled QFT. Finally, we end with a review of
the main properties of Mellin amplitudes for CFT correlation functions and
their uses in the context of AdS/CFT.Comment: 63 pages, 7 figure
- …