28,562 research outputs found

    Lightweight Security for Network Coding

    Full text link
    Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows. We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of reduced overhead in comparison to traditional end-to-end encryption of the entire data. Confidentiality is achieved by protecting (or "locking") the source coefficients required to decode the encoded data, without preventing intermediate nodes from running their standard network coding operations. Our scheme can be easily combined with existing techniques that counter active attacks.Comment: Proc. of the IEEE International Conference on Communications (ICC 2008), Beijing, China, May 200

    TASI lectures on AdS/CFT

    Full text link
    We introduce the AdS/CFT correspondence as a natural extension of QFT in a fixed AdS background. We start by reviewing some general concepts of CFT, including the embedding space formalism. We then consider QFT in a fixed AdS background and show that one can define boundary operators that enjoy very similar properties as in a CFT, except for the lack of a stress tensor. Including a dynamical metric in AdS generates a boundary stress tensor and completes the CFT axioms. We also discuss some applications of the bulk geometric intuition to strongly coupled QFT. Finally, we end with a review of the main properties of Mellin amplitudes for CFT correlation functions and their uses in the context of AdS/CFT.Comment: 63 pages, 7 figure

    Quantum Black Hole Entropy, Localization and the Stringy Exclusion Principle

    Full text link
    Supersymmetric localization has lead to remarkable progress in computing quantum corrections to BPS black hole entropy. The program has been successful especially for computing perturbative corrections to the Bekenstein-Hawking area formula. In this work, we consider non-perturbative corrections related to polar states in the Rademacher expansion, which describes the entropy in the microcanonical ensemble. We propose that these non-perturbative effects can be identified with a new family of saddles in the localization of the quantum entropy path integral. We argue that these saddles, which are euclidean AdS2×S1×S2AdS_2\times S^1\times S^2 geometries, arise after turning on singular fluxes in M-theory on a Calabi-Yau. They cease to exist after a certain amount of flux, resulting in a finite number of geometries; the bound on that number is in precise agreement with the stringy exclusion principle. Localization of supergravity on these backgrounds gives rise to a finite tail of Bessel functions in agreement with the Rademacher expansion. As a check of our proposal, we test our results against well-known microscopic formulas for one-eighth and one-quarter BPS black holes in N=8\mathcal{N}=8 and N=4\mathcal{N}=4 string theory respectively, finding agreement. Our method breaks down precisely when mock-modular effects are expected in the entropy of one-quarter BPS dyons and we comment upon this. Furthermore, we mention possible applications of these results, including an exact formula for the entropy of four dimensional N=2\mathcal{N}=2 black holes.Comment: 66 page
    • …
    corecore