177 research outputs found
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
An `obfuscation' for encrypted computing is quantified exactly here, leading
to an argument that security against polynomial-time attacks has been achieved
for user data via the deliberately `chaotic' compilation required for security
properties in that environment. Encrypted computing is the emerging science and
technology of processors that take encrypted inputs to encrypted outputs via
encrypted intermediate values (at nearly conventional speeds). The aim is to
make user data in general-purpose computing secure against the operator and
operating system as potential adversaries. A stumbling block has always been
that memory addresses are data and good encryption means the encrypted value
varies randomly, and that makes hitting any target in memory problematic
without address decryption, yet decryption anywhere on the memory path would
open up many easily exploitable vulnerabilities. This paper `solves (chaotic)
compilation' for processors without address decryption, covering all of ANSI C
while satisfying the required security properties and opening up the field for
the standard software tool-chain and infrastructure. That produces the argument
referred to above, which may also hold without encryption.Comment: 31 pages. Version update adds "Chaotic" in title and throughout
paper, and recasts abstract and Intro and other sections of the text for
better access by cryptologists. To the same end it introduces the polynomial
time defense argument explicitly in the final section, having now set that
denouement out in the abstract and intr
Empirical Patterns in Google Scholar Citation Counts
Scholarly impact may be metricized using an author's total number of
citations as a stand-in for real worth, but this measure varies in
applicability between disciplines. The detail of the number of citations per
publication is nowadays mapped in much more detail on the Web, exposing certain
empirical patterns. This paper explores those patterns, using the citation data
from Google Scholar for a number of authors.Comment: 6 pages, 8 figures, submitted to Cyberpatterns 201
Open Source Verification under a Cloud
An experiment in providing volunteer cloud computing support for automated audits of open source code is described here, along with the supporting theory. Certification and the distributed and piecewise nature of the underlying verification computation are among the areas formalised in the theory part.
The eventual aim of this research is to provide a means for open source developers who seek formally backed certification for their project to run fully automated analyses on their own source code. In order to ensure that the results are not tampered with, the computation is anonymized and shared with an ad-hoc network of volunteer CPUs for incremental completion. Each individual computation is repeated many times at different sites, and sufficient accounting data is generated to allow each computation to be refuted
Quantum critical behavior in strongly interacting Rydberg gases
We study the appearance of correlated many-body phenomena in an ensemble of
atoms driven resonantly into a strongly interacting Rydberg state. The ground
state of the Hamiltonian describing the driven system exhibits a second order
quantum phase transition. We derive the critical theory for the quantum phase
transition and show that it describes the properties of the driven Rydberg
system in the saturated regime. We find that the suppression of Rydberg
excitations known as blockade phenomena exhibits an algebraic scaling law with
a universal exponent.Comment: 4 pages, 3 figures, published versio
An Obfuscating Compiler
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows formally as well as practically that that may be arranged on a platform with the appropriate machine code architecture, given the obfuscating compiler described
- …