53 research outputs found
R-Parity Violation at the LHC
We investigate the phenomenology of the MSSM extended by a single R-parity
violating coupling at the unification scale. For all R-parity violating
couplings, we discuss the evolution of the particle spectra through the
renormalization group equations and the nature of the lightest supersymmetric
particle (LSP) within the CMSSM, as an example of a specific complete
supersymmetric model. We use the nature of the LSP to classify the possible
signatures. For each possible scenario we present in detail the current LHC
bounds on the supersymmetric particle masses, typically obtained using
simplified models. From this we determine the present coverage of R-parity
violating models at the LHC. We find several gaps, in particular for a
stau-LSP, which is easily obtained in R-parity violating models. Using the
program CheckMATE we recast existing LHC searches to set limits on the
parameters of all R-parity violating CMSSMs. We find that virtually all of them
are either more strongly constrained or similarly constrained in comparison to
the R-parity conserving CMSSM, including the models. For
each R-parity violating CMSSM we then give the explicit lower mass bounds on
all relevant supersymmetric particles.Comment: 43 pages, 13 tables, 17 figures; updated Figs. 11-17 and Tab. 12
including NLO corrections; version accepted for publication in EPJ
Cryptographic techniques for privacy and access control in cloud-based applications
Digitization is one of the key challenges for todayâs industries and society. It affects more and more business areas and also user data and, in particular, sensitive information. Due to its sensitivity, it is important to treat personal information as secure and private as possible yet enabling cloud-based software to use that information when requested by the user. In this thesis, we focus on the privacy-preserving outsourcing and sharing of data, the querying of outsourced protected data, and the usage of personal information as an access control mechanism for rating platforms, which should be protected from coercion attacks. In those three categories, we present cryptographic techniques and protocols that push the state of the art. In particular, we first present multi-client oblivious RAM (ORAM), which augments standard ORAM with selective data sharing through access control, confidentiality, and integrity. Second, we investigate on recent work in frequency-hiding order-preserving encryption and show that the state of the art misses rigorous treatment, allowing for simple attacks against the security of the existing scheme. As a remedy, we show how to fix the security definition and that the existing scheme, slightly adapted, fulfills it. Finally, we design and develop a coercion-resistant rating platform. Coercion-resistance has been dealt with mainly in the context of electronic voting yet also affects other areas of digital life such as rating platforms.Die Digitalisierung ist eine der gröĂten Herausforderungen fĂŒr Industrie und Gesellschaft. Neben vielen GeschĂ€ftsbereichen betrifft diese auch, insbesondere sensible, Nutzerdaten. Daher sollten persönliche Informationen so gut wie möglich gesichert werden. Zugleich brauchen Cloud-basierte Software-Anwendungen, die der Nutzer verwenden möchte, Zugang zu diesen Daten. Diese Dissertation fokussiert sich auf das sichere Auslagern und Teilen von Daten unter Wahrung der PrivatsphĂ€re, auf das Abfragen von geschĂŒtzten, ausgelagerten Daten und auf die Nutzung persönlicher Informationen als Zugangsberechtigung fĂŒr erpressungsresistente Bewertungsplattformen. Zu diesen drei Themen prĂ€sentieren wir kryptographische Techniken und Protokolle, die den Stand der Technik voran treiben. Der erste Teil stellt Multi-Client Oblivious RAM (ORAM) vor, das ORAM durch die Möglichkeit, Daten unter Wahrung von Vertraulichkeit und IntegritĂ€t mit anderen Nutzern zu teilen, erweitert. Der zweite Teil befasst sich mit Freuquency-hiding Order-preserving Encryption. Wir zeigen, dass dem Stand der Technik eine formale Betrachtung fehlt, was zu Angriffen fĂŒhrt. Um Abhilfe zu schaffen, verbessern wir die Sicherheitsdefinition und beweisen, dass das existierende VerschlĂŒsselungsschema diese durch minimale Ănderung erfĂŒllt. AbschlieĂend entwickeln wir ein erpressungsresistentes Bewertungsportal. Erpressungsresistenz wurde bisher hauptsĂ€chlich im Kontext von elektronischen Wahlen betrachtet
Ion beam analysis of microcrystalline quartz artifacts from the Reed Mound Site, Delaware County, Oklahoma
Ion beam analysis (IBA) has been a powerful, non-destructive tool for archaeological research worldwide for over four decades, yet its full potential is seldom realized in North American archaeology. Herein the potential of particle induced X-ray emission spectrometry (PIXE) as a tool for future Ozarks chert provenance studies is evaluated based on its ability to facilitate (1) discrimination of Ozarks chert materials from different geological formations and (2) identification of discrete groups of artifacts from the same geological formation. In addition, PIXE was also used to evaluate the elemental heterogeneity of Ozarks chert materials. Thirty chert (microcrystalline quartz) artifacts were visually sorted and classified according to macroscopic features characteristic of certain chert resources from particular Ozarks geological formations. The elemental concentrations obtained from PIXE analysis underwent multivariate statistical analyses in order to gain insight from the data. The results indicate that PIXE could be a useful tool for assigning Ozarks chert materials to their respective geological formations, and possibly for determining regional or sub-regional provenance
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Cloud storage has rapidly become a cornerstone of many IT infrastructures, constituting a seamless solution for the backup, synchronization, and sharing of large amounts of data. Putting user data in the direct control of cloud service providers, however, raises security and privacy concerns related to the integrity of outsourced data, the accidental or intentional leakage of sensitive information, the profiling of user activities and so on. Furthermore, even if the cloud provider is trusted, users having access to outsourced files might be malicious and misbehave. These concerns are particularly serious in sensitive applications like personal health records and credit score systems.
To tackle this problem, we present GORAM, a cryptographic system that protects the secrecy and integrity of outsourced data with respect to both an untrusted server and malicious clients, guarantees the anonymity and unlinkability of accesses to such data, and allows the data owner to share outsourced data with other clients, selectively granting them read and write permissions. GORAM is the first system to achieve such a wide range of security and privacy properties for outsourced storage. In the process of designing an efficient construction, we developed two new, generally applicable cryptographic schemes, namely, batched zero-knowledge proofs of shuffle and an accountability technique based on chameleon signatures, which we consider of independent interest. We implemented GORAM in Amazon Elastic Compute Cloud (EC2) and ran a performance evaluation demonstrating the scalability and efficiency of our construction
A novel and well-defined benchmarking method for second generation read mapping
Background Second generation sequencing technologies yield DNA sequence data
at ultra high-throughput. Common to most biological applications is a mapping
of the reads to an almost identical or highly similar reference genome. The
assessment of the quality of read mapping results is not straightforward and
has not been formalized so far. Hence, it has not been easy to compare
different read mapping approaches in a unified way and to determine which
program is the best for what task. Results We present a new benchmark method,
called Rabema (Read Alignment BEnchMArk), for read mappers. It consists of a
strict definition of the read mapping problem and of tools to evaluate the
result of arbitrary read mappers supporting the SAM output format. Conclusions
We show the usefulness of the benchmark program by performing a comparison of
popular read mappers. The tools supporting the benchmark are licensed under
the GPL and available from http://www.seqan.de/projects/rabema.html
Recommended from our members
Intermixing-Driven Surface and Bulk Ferromagnetism in the Quantum Anomalous Hall Candidate MnBi6Te10
The recent realizations of the quantum anomalous Hall effect (QAHE) in MnBi2Te4 and MnBi4Te7 benchmark the (MnBi2Te4)(Bi2Te3)n family as a promising hotbed for further QAHE improvements. The family owes its potential to its ferromagnetically (FM) ordered MnBi2Te4 septuple layers (SLs). However, the QAHE realization is complicated in MnBi2Te4 and MnBi4Te7 due to the substantial antiferromagnetic (AFM) coupling between the SLs. An FM state, advantageous for the QAHE, can be stabilized by interlacing the SLs with an increasing number n of Bi2Te3 quintuple layers (QLs). However, the mechanisms driving the FM state and the number of necessary QLs are not understood, and the surface magnetism remains obscure. Here, robust FM properties in MnBi6Te10 (n = 2) with Tc â 12 K are demonstrated and their origin is established in the Mn/Bi intermixing phenomenon by a combined experimental and theoretical study. The measurements reveal a magnetically intact surface with a large magnetic moment, and with FM properties similar to the bulk. This investigation thus consolidates the MnBi6Te10 system as perspective for the QAHE at elevated temperatures
Author Correction: Non-local effect of impurity states on the exchange coupling mechanism in magnetic topological insulators
A Correction to this paper has been published: https://doi.org/10.1038/s41535-021-00314-
Energy Estimation of Cosmic Rays with the Engineering Radio Array of the Pierre Auger Observatory
The Auger Engineering Radio Array (AERA) is part of the Pierre Auger
Observatory and is used to detect the radio emission of cosmic-ray air showers.
These observations are compared to the data of the surface detector stations of
the Observatory, which provide well-calibrated information on the cosmic-ray
energies and arrival directions. The response of the radio stations in the 30
to 80 MHz regime has been thoroughly calibrated to enable the reconstruction of
the incoming electric field. For the latter, the energy deposit per area is
determined from the radio pulses at each observer position and is interpolated
using a two-dimensional function that takes into account signal asymmetries due
to interference between the geomagnetic and charge-excess emission components.
The spatial integral over the signal distribution gives a direct measurement of
the energy transferred from the primary cosmic ray into radio emission in the
AERA frequency range. We measure 15.8 MeV of radiation energy for a 1 EeV air
shower arriving perpendicularly to the geomagnetic field. This radiation energy
-- corrected for geometrical effects -- is used as a cosmic-ray energy
estimator. Performing an absolute energy calibration against the
surface-detector information, we observe that this radio-energy estimator
scales quadratically with the cosmic-ray energy as expected for coherent
emission. We find an energy resolution of the radio reconstruction of 22% for
the data set and 17% for a high-quality subset containing only events with at
least five radio stations with signal.Comment: Replaced with published version. Added journal reference and DO
Measurement of the Radiation Energy in the Radio Signal of Extensive Air Showers as a Universal Estimator of Cosmic-Ray Energy
We measure the energy emitted by extensive air showers in the form of radio
emission in the frequency range from 30 to 80 MHz. Exploiting the accurate
energy scale of the Pierre Auger Observatory, we obtain a radiation energy of
15.8 \pm 0.7 (stat) \pm 6.7 (sys) MeV for cosmic rays with an energy of 1 EeV
arriving perpendicularly to a geomagnetic field of 0.24 G, scaling
quadratically with the cosmic-ray energy. A comparison with predictions from
state-of-the-art first-principle calculations shows agreement with our
measurement. The radiation energy provides direct access to the calorimetric
energy in the electromagnetic cascade of extensive air showers. Comparison with
our result thus allows the direct calibration of any cosmic-ray radio detector
against the well-established energy scale of the Pierre Auger Observatory.Comment: Replaced with published version. Added journal reference and DOI.
Supplemental material in the ancillary file
- âŠ