-
Addressing the P2P Bootstrap Problem for Small Networks
Authors:
David Isaac Wolinsky,
Pierre St. Juste,
P. Oscar Boykin,
Renato Figueiredo
Abstract:
P2P overlays provide a framework for building distributed applications consisting of few to many resources with features including self-configuration, scalability, and resilience to node failures. Such systems have been successfully adopted in large-scale services for content delivery networks, file sharing, and data storage. In small-scale systems, they can be useful to address privacy concerns…
▽ More
P2P overlays provide a framework for building distributed applications consisting of few to many resources with features including self-configuration, scalability, and resilience to node failures. Such systems have been successfully adopted in large-scale services for content delivery networks, file sharing, and data storage. In small-scale systems, they can be useful to address privacy concerns and for network applications that lack dedicated servers. The bootstrap problem, finding an existing peer in the overlay, remains a challenge to enabling these services for small-scale P2P systems. In large networks, the solution to the bootstrap problem has been the use of dedicated services, though creating and maintaining these systems requires expertise and resources, which constrain their usefulness and make them unappealing for small-scale systems. This paper surveys and summarizes requirements that allow peers potentially constrained by network connectivity to bootstrap small-scale overlays through the use of existing public overlays. In order to support bootstrap**, a public overlay must support the following requirements: a method for reflection in order to obtain publicly reachable addresses, so peers behind network address translators and firewalls can receive incoming connection requests; communication relaying to share public addresses and communicate when direct communication is not feasible; and rendezvous for discovering remote peers, when the overlay lacks stable membership. After presenting a survey of various public overlays, we identify two overlays that match the requirements: XMPP overlays, such as Google Talk and Live Journal Talk, and Brunet, a structured overlay based upon Symphony. We present qualitative experiences with prototypes that demonstrate the ability to bootstrap small-scale private structured overlays from public Brunet or XMPP infrastructures.
△ Less
Submitted 13 April, 2010;
originally announced April 2010.
-
Towards Social Profile Based Overlays
Authors:
David Isaac Wolinsky,
Pierre St. Juste,
P. Oscar Boykin,
Renato Figueiredo
Abstract:
Online social networking has quickly become one of the most common activities of Internet users. As social networks evolve, they encourage users to share more information, requiring the users, in turn, to place more trust into social networks. Peer-to-peer (P2P) overlays provide an environment that can return ownership of information, trust, and control to the users, away from centralized third-…
▽ More
Online social networking has quickly become one of the most common activities of Internet users. As social networks evolve, they encourage users to share more information, requiring the users, in turn, to place more trust into social networks. Peer-to-peer (P2P) overlays provide an environment that can return ownership of information, trust, and control to the users, away from centralized third-party social networks.
In this paper, we present a novel concept, social profile overlays, which enable users to share their profile only with trusted peers in a scalable, reliable, and private manner. Each user's profile consists of a unique private, secure overlay, where members of that overlay have a friendship with the overlay owner. Profile data is made available without regard to the online state of the profile owner through the use of the profile overlay's distributed data store. Privacy and security are enforced through the use of a public key infrastructure (PKI), where the role of certificate authority (CA) is handled by the overlay owner and each member of the overlay has a CA-signed certificate. All members of the social network join a common public or directory overlay facilitating friend discovery and bootstrap connections into profile overlays. We define interfaces and present tools that can be used to implement this system, as well as explore some of the challenges related to it.
△ Less
Submitted 3 February, 2010;
originally announced February 2010.
-
On the Design and Implementation of Structured P2P VPNs
Authors:
David Isaac Wolinsky,
Linton Abraham,
Kyungyong Lee,
Yonggang Liu,
Jiangyan Xu,
P. Oscar Boykin,
Renato Figueiredo
Abstract:
Centralized Virtual Private Networks (VPNs) when used in distributed systems have performance constraints as all traffic must traverse through a central server. In recent years, there has been a paradigm shift towards the use of P2P in VPNs to alleviate pressure placed upon the central server by allowing participants to communicate directly with each other, relegating the server to handling sess…
▽ More
Centralized Virtual Private Networks (VPNs) when used in distributed systems have performance constraints as all traffic must traverse through a central server. In recent years, there has been a paradigm shift towards the use of P2P in VPNs to alleviate pressure placed upon the central server by allowing participants to communicate directly with each other, relegating the server to handling session management and supporting NAT traversal using relays when necessary. Another, less common, approach uses unstructured P2P systems to remove all centralization from the VPN. These approaches currently lack the depth in security options provided by other VPN solutions, and their scalability constraints have not been well studied.
In this paper, we propose and implement a novel VPN architecture, which uses a structured P2P system for peer discovery, session management, NAT traversal, and autonomic relay selection and a central server as a partially-automated public key infrastructure (PKI) via a user-friendly web interface. Our model also provides the first design and implementation of a P2P VPN with full tunneling support, whereby all non-P2P based Internet traffic routes through a trusted third party and does so in a way that is more secure than existing full tunnel techniques. To verify our model, we evaluate our reference implementation by comparing it quantitatively to other VPN technologies focusing on latency, bandwidth, and memory usage. We also discuss some of our experiences with develo**, maintaining, and deploying a P2P VPN.
△ Less
Submitted 14 January, 2010;
originally announced January 2010.
-
Virtual Private Overlays: Secure Group Commounication in NAT-Constrained Environments
Authors:
David Isaac Wolinsky,
Kyungyong Lee,
Tae Woong Choi,
P. Oscar Boykin,
Renato Figueiredo
Abstract:
Structured P2P overlays provide a framework for building distributed applications that are self-configuring, scalable, and resilient to node failures. Such systems have been successfully adopted in large-scale Internet services such as content delivery networks and file sharing; however, widespread adoption in small/medium scales has been limited due in part to security concerns and difficulty b…
▽ More
Structured P2P overlays provide a framework for building distributed applications that are self-configuring, scalable, and resilient to node failures. Such systems have been successfully adopted in large-scale Internet services such as content delivery networks and file sharing; however, widespread adoption in small/medium scales has been limited due in part to security concerns and difficulty bootstrap** in NAT-constrained environments. Nonetheless, P2P systems can be designed to provide guaranteed lookup times, NAT traversal, point-to-point overlay security, and distributed data stores. In this paper we propose a novel way of creating overlays that are both secure and private and a method to bootstrap them using a public overlay. Private overlay nodes use the public overlay's distributed data store to discover each other, and the public overlay's connections to assist with NAT hole punching and as relays providing STUN and TURN NAT traversal techniques. The security framework utilizes groups, which are created and managed by users through a web based user interface. Each group acts as a Public Key Infrastructure (PKI) relying on the use of a centrally-managed web site providing an automated Certificate Authority (CA). We present a reference implementation which has been used in a P2P VPN (Virtual Private Network). To evaluate our contributions, we apply our techniques to an overlay network modeler, event-driven simulations using simulated time delays, and deployment in the PlanetLab wide-area testbed.
△ Less
Submitted 14 January, 2010;
originally announced January 2010.
-
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education
Authors:
Renato Figueiredo,
P. Oscar Boykin,
Jose A. B. Fortes,
Tao Li,
Jie-Kwon Peir,
David Wolinsky,
Lizy John,
David Kaeli,
David Lilja,
Sally McKee,
Gokhan Memik,
Alain Roy,
Gary Tyson
Abstract:
This paper introduces Archer, a community-based computing resource for computer architecture research and education. The Archer infrastructure integrates virtualization and batch scheduling middleware to deliver high-throughput computing resources aggregated from resources distributed across wide-area networks and owned by different participating entities in a seamless manner. The paper discusse…
▽ More
This paper introduces Archer, a community-based computing resource for computer architecture research and education. The Archer infrastructure integrates virtualization and batch scheduling middleware to deliver high-throughput computing resources aggregated from resources distributed across wide-area networks and owned by different participating entities in a seamless manner. The paper discusses the motivations leading to the design of Archer, describes its core middleware components, and presents an analysis of the functionality and performance of a prototype wide-area deployment running a representative computer architecture simulation workload.
△ Less
Submitted 10 July, 2008;
originally announced July 2008.
-
A Symphony Conducted by Brunet
Authors:
P. Oscar Boykin,
Jesse S. A. Bridgewater,
Joseph S. Kong,
Kamen M. Lozev,
Behnam A. Rezaei,
Vwani P. Roychowdhury
Abstract:
We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep…
▽ More
We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep $k \le \log N$ shortcut connections and to route to any other node with a short average delay of $O(\frac{1}{k}\log^2 N)$. %This provides a continuous trade-off between node degree and routing latency. We present experimental results taken from several PlanetLab deployments of size up to 1060 nodes. These succes sful deployments represent some of the largest PlanetLab deployments of P2P overlays found in the literature, and show our implementation's robustness to massive node dynamics in a WAN environment.
△ Less
Submitted 25 September, 2007;
originally announced September 2007.
-
Comparison of Image Similarity Queries in P2P Systems
Authors:
Wolfgang Mueller,
P. Oscar Boykin,
Nima Sarshar,
Vwani P. Roychowdhury
Abstract:
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary t…
▽ More
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary to support such applications. Toward this end, we consider an image search application which supports queries based on image similarity metrics, such as color histogram intersection, and discuss why in this setting, standard DHT approaches are not directly applicable. We then study the feasibility of implementing such an image search system on two different unstructured P2P systems: power-law topology with percolation search, and an optimized super-node topology using structured broadcasts. We examine the average and maximum values for node bandwidth, storage and processing requirements in the percolation and super-node models, and show that current high-end computers and high-speed links have sufficient resources to enable deployments of large-scale complex image search systems.
△ Less
Submitted 29 June, 2006;
originally announced June 2006.
-
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing
Authors:
Arijit Ganguly,
Abhishek Agrawal,
P. Oscar Boykin,
Renato Figueiredo
Abstract:
Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc. In this work, we introduce IPOP, a system for creating virtual IP networks on top of a P2P overlay. IPOP enables seamless access to Grid resources spanning multiple domains by aggregating them into a virtual IP network that is c…
▽ More
Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc. In this work, we introduce IPOP, a system for creating virtual IP networks on top of a P2P overlay. IPOP enables seamless access to Grid resources spanning multiple domains by aggregating them into a virtual IP network that is completely isolated from the physical network. The virtual IP network provided by IPOP supports deployment of existing IP-based protocols over a robust, self-configuring P2P overlay. We present implementation details as well as experimental measurement results taken from LAN, WAN, and Planet-Lab tests.
△ Less
Submitted 22 March, 2006;
originally announced March 2006.
-
Finite Percolation at a Multiple of the Threshold
Authors:
Nima Sarshar,
Patrick Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
Bond percolation on infinite heavy-tailed power-law random networks lacks a proper phase transition; or one may say, there is a phase transition at {\em zero percolation probability}. Nevertheless, a finite size percolation threshold $q_c(N)$, where $N$ is the network size, can be defined. For such heavy-tailed networks, one can choose a percolation probability $q(N)=ρq_c(N)$ such that…
▽ More
Bond percolation on infinite heavy-tailed power-law random networks lacks a proper phase transition; or one may say, there is a phase transition at {\em zero percolation probability}. Nevertheless, a finite size percolation threshold $q_c(N)$, where $N$ is the network size, can be defined. For such heavy-tailed networks, one can choose a percolation probability $q(N)=ρq_c(N)$ such that $\displaystyle \lim_{N\to \infty}(q-q_c(N)) =0$, and yet $ρ$ is arbitrarily large (such a scenario does not exist for networks with non-zero percolation threshold). We find that the critical behavior of random power-law networks is best described in terms of $ρ$ as the order parameter, rather than $q$. This paper makes the notion of the phase transition of the size of the largest connected component at $ρ=1$ precise. In particular, using a generating function based approach, we show that for $ρ>1$, and the power-law exponent, $2\leq τ<3$, the largest connected component scales as $\sim N^{1-1/τ}$, while for $0<ρ<1$ the scaling is at most $\sim N^{\frac{2-τ}τ}$; here, the maximum degree of any node, $k_{max}$, has been assumed to scale as N^{1/τ}$. In general, our approach yields that for large $N$, $ρ\gg 1$, $2\leq τ<3$, and $k_{max} \sim N^{1/τ}$, the largest connected component scales as $\sim ρ^{1/(3-τ)}N^{1-1/τ}$.Thus, for any fixed but large N, we recover, and make it precise, a recent result that computed a scaling behavior of $q^{1/(3-τ)}$ for "small $q$". We also provide large-scale simulation results validating some of these scaling predictions, and discuss applications of these scaling results to supporting efficient unstructured queries in peer-to-peer networks.
△ Less
Submitted 9 February, 2006; v1 submitted 10 January, 2006;
originally announced January 2006.
-
A Proof of the Security of Quantum Key Distribution
Authors:
Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury
Abstract:
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
△ Less
Submitted 17 November, 2005;
originally announced November 2005.
-
Mutually Unbiased Bases and Orthogonal Decompositions of Lie Algebras
Authors:
P. Oscar Boykin,
Meera Sitharam,
Pham Huu Tiep,
Pawel Wocjan
Abstract:
We establish a connection between the problem of constructing maximal collections of mutually unbiased bases (MUBs) and an open problem in the theory of Lie algebras. More precisely, we show that a collection of m MUBs in K^n gives rise to a collection of m Cartan subalgebras of the special linear Lie algebra sl_n(K) that are pairwise orthogonal with respect to the Killing form, where K=R or K=C…
▽ More
We establish a connection between the problem of constructing maximal collections of mutually unbiased bases (MUBs) and an open problem in the theory of Lie algebras. More precisely, we show that a collection of m MUBs in K^n gives rise to a collection of m Cartan subalgebras of the special linear Lie algebra sl_n(K) that are pairwise orthogonal with respect to the Killing form, where K=R or K=C. In particular, a complete collection of MUBs in C^n gives rise to a so-called orthogonal decomposition (OD) of sl_n(C). The converse holds if the Cartan subalgebras in the OD are also *-closed, i.e., closed under the adjoint operation. In this case, the Cartan subalgebras have unitary bases, and the above correspondence becomes equivalent to a result relating collections of MUBs to collections of maximal commuting classes of unitary error bases, i.e., orthogonal unitary matrices.
It is a longstanding conjecture that ODs of sl_n(C) can only exist if n is a prime power. This corroborates further the general belief that a complete collection of MUBs can only exist in prime power dimensions. The connection to ODs of sl_n(C) potentially allows the application of known results on (partial) ODs of sl_n(C) to MUBs.
△ Less
Submitted 10 June, 2005;
originally announced June 2005.
-
Let Your CyberAlter Ego Share Information and Manage Spam
Authors:
Joseph S. Kong,
P. Oscar Boykin,
Behnam A. Rezaei,
Nima Sarshar,
Vwani P. Roychowdhury
Abstract:
Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to p…
▽ More
Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to possess many of the same complex features that characterize its real counterparts, including scale-free degree distributions, low diameter, and extensive connectivity. We show that these topological features make the latent networks particularly suitable for explorations and management via local-only messaging protocols. {\em Cyber}alter egos can communicate via their direct links (i.e., using only their own address books) and set up a highly decentralized and scalable message passing network that can allow large-scale sharing of information and data. As one particular example of such collaborative systems, we provide a design of a spam filtering system, and our large-scale simulations show that the system achieves a spam detection rate close to 100%, while the false positive rate is kept around zero. This system has several advantages over other recent proposals (i) It uses an already existing network, created by the same social dynamics that govern our daily lives, and no dedicated peer-to-peer (P2P) systems or centralized server-based systems need be constructed; (ii) It utilizes a percolation search algorithm that makes the query-generated traffic scalable; (iii) The network has a built in trust system (just as in social networks) that can be used to thwart malicious attacks; iv) It can be implemented right now as a plugin to popular email programs, such as MS Outlook, Eudora, and Sendmail.
△ Less
Submitted 7 May, 2005; v1 submitted 4 April, 2005;
originally announced April 2005.
-
Reversible Fault-Tolerant Logic
Authors:
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
It is now widely accepted that the CMOS technology implementing irreversible logic will hit a scaling limit beyond 2016, and that the increased power dissipation is a major limiting factor. Reversible computing can potentially require arbitrarily small amounts of energy. Recently several nano-scale devices which have the potential to scale, and which naturally perform reversible logic, have emer…
▽ More
It is now widely accepted that the CMOS technology implementing irreversible logic will hit a scaling limit beyond 2016, and that the increased power dissipation is a major limiting factor. Reversible computing can potentially require arbitrarily small amounts of energy. Recently several nano-scale devices which have the potential to scale, and which naturally perform reversible logic, have emerged. This paper addresses several fundamental issues that need to be addressed before any nano-scale reversible computing systems can be realized, including reliability and performance trade-offs and architecture optimization. Many nano-scale devices will be limited to only near neighbor interactions, requiring careful optimization of circuits. We provide efficient fault-tolerant (FT) circuits when restricted to both 2D and 1D. Finally, we compute bounds on the entropy (and hence, heat) generated by our FT circuits and provide quantitative estimates on how large can we make our circuits before we lose any advantage over irreversible computing.
△ Less
Submitted 4 April, 2005;
originally announced April 2005.
-
Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks
Authors:
Behnam A. Rezaei,
Nima Sarshar,
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
Susceptibility of scale free Power Law (PL) networks to attacks has been traditionally studied in the context of what may be termed as {\em instantaneous attacks}, where a randomly selected set of nodes and edges are deleted while the network is kept {\em static}. In this paper, we shift the focus to the study of {\em progressive} and instantaneous attacks on {\em reactive} grown and random PL n…
▽ More
Susceptibility of scale free Power Law (PL) networks to attacks has been traditionally studied in the context of what may be termed as {\em instantaneous attacks}, where a randomly selected set of nodes and edges are deleted while the network is kept {\em static}. In this paper, we shift the focus to the study of {\em progressive} and instantaneous attacks on {\em reactive} grown and random PL networks, which can respond to attacks and take remedial steps. In the process, we present several techniques that managed networks can adopt to minimize the damages during attacks, and also to efficiently recover from the aftermath of successful attacks. For example, we present (i) compensatory dynamics that minimize the damages inflicted by targeted progressive attacks, such as linear-preferential deletions of nodes in grown PL networks; the resulting dynamic naturally leads to the emergence of networks with PL degree distributions with exponential cutoffs; (ii) distributed healing algorithms that can scale the maximum degree of nodes in a PL network using only local decisions, and (iii) efficient means of creating giant connected components in a PL network that has been fragmented by attacks on a large number of high-degree nodes. Such targeted attacks are considered to be a major vulnerability of PL networks; however, our results show that the introduction of only a small number of random edges, through a {\em reverse percolation} process, can restore connectivity, which in turn allows restoration of other topological properties of the original network. Thus, the scale-free nature of the networks can itself be effectively utilized for protection and recovery purposes.
△ Less
Submitted 11 May, 2005; v1 submitted 7 April, 2005;
originally announced April 2005.
-
Real Mutually Unbiased Bases
Authors:
P. Oscar Boykin,
Meera Sitharam,
Mohamad Tarifi,
Pawel Wocjan
Abstract:
We tabulate bounds on the optimal number of mutually unbiased bases in R^d. For most dimensions d, it can be shown with relatively simple methods that either there are no real orthonormal bases that are mutually unbiased or the optimal number is at most either 2 or 3. We discuss the limitations of these methods when applied to all dimensions, shedding some light on the difficulty of obtaining ti…
▽ More
We tabulate bounds on the optimal number of mutually unbiased bases in R^d. For most dimensions d, it can be shown with relatively simple methods that either there are no real orthonormal bases that are mutually unbiased or the optimal number is at most either 2 or 3. We discuss the limitations of these methods when applied to all dimensions, shedding some light on the difficulty of obtaining tight bounds for the remaining dimensions that have the form d=16n^2, where n can be any number. We additionally give a simpler, alternative proof that there can be at most d/2+1 real mutually unbiased bases in dimension d instead of invoking the known results on extremal Euclidean line sets by Cameron and Seidel, Delsarte, and Calderbank et al.
△ Less
Submitted 13 September, 2005; v1 submitted 3 February, 2005;
originally announced February 2005.
-
Functionality Encoded In Topology? Discovering Macroscopic Regulatory Modules from Large-Scale Protein-DNA Interaction Networks
Authors:
Riccardo Boscolo,
Behnam A. Rezaei,
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
The promise of discovering a functional blueprint of a cellular system from large-scale and high-throughput sequence and experimental data is predicated on the belief that the same top-down investigative approach that proved successful in other biological problems (e.g. DNA sequencing) will be as effective when it comes to inferring more complex intracellular processes. The results in this paper…
▽ More
The promise of discovering a functional blueprint of a cellular system from large-scale and high-throughput sequence and experimental data is predicated on the belief that the same top-down investigative approach that proved successful in other biological problems (e.g. DNA sequencing) will be as effective when it comes to inferring more complex intracellular processes. The results in this paper address this fundamental issue in the specific context of transcription regulatory networks. Although simple recurring regulatory motifs have been identified in the past, due to the size and complexity of the connectivity structure, the subdivision of such networks into larger, and possibly inter-connected, regulatory modules is still under investigation. Specifically, it is unclear whether functionally well-characterized transcriptional sub-networks can be identified by solely analyzing the connectivity structure of the overall network topology. In this paper, we show that transcriptional regulatory networks can be systematically partitioned into communities whose members are consistently functionally related. We applied the partitioning method to the transcriptional regulatory networks of the yeast Saccharomyces cerevisiae; the resulting communities of gene and transcriptional regulators can be associated to distinct functional units, such as amino acid metabolism, cell cycle regulation, protein biosynthesis and localization, DNA replication and maintenance, lipid catabolism, stress response and so on. Moreover, the observation of inter-community connectivity patterns provides a valuable tool for elucidating the inter-dependency between the discovered regulatory modules.
△ Less
Submitted 1 March, 2005; v1 submitted 30 January, 2005;
originally announced January 2005.
-
Information vs. Disturbance in Dimension D
Authors:
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
We show that for Eve to get information in one basis about a state, she must cause errors in all bases that are mutually unbiased to that basis. Our result holds in any dimension. We also show that this result holds for all functions of messages that are encrypted with a key.
We show that for Eve to get information in one basis about a state, she must cause errors in all bases that are mutually unbiased to that basis. Our result holds in any dimension. We also show that this result holds for all functions of messages that are encrypted with a key.
△ Less
Submitted 3 December, 2004;
originally announced December 2004.
-
Threshold Error Penalty for Fault Tolerant Computation with Nearest Neighbour Communication
Authors:
T. Szkopek,
P. O. Boykin,
H. Fan,
V. Roychowdhury,
E. Yablonovitch,
G. Simms,
M. Gyure,
B. Fong
Abstract:
The error threshold for fault tolerant quantum computation with concatenated encoding of qubits is penalized by internal communication overhead. Many quantum computation proposals rely on nearest-neighbour communication, which requires excess gate operations. For a qubit stripe with a width of L+1 physical qubits implementing L levels of concatenation, we find that the error threshold of 2.1x10^…
▽ More
The error threshold for fault tolerant quantum computation with concatenated encoding of qubits is penalized by internal communication overhead. Many quantum computation proposals rely on nearest-neighbour communication, which requires excess gate operations. For a qubit stripe with a width of L+1 physical qubits implementing L levels of concatenation, we find that the error threshold of 2.1x10^-5 without any communication burden is reduced to 1.2x10^-7 when gate errors are the dominant source of error. This ~175X penalty in error threshold translates to an ~13X penalty in the amplitude and timing of gate operation control pulses.
△ Less
Submitted 8 September, 2005; v1 submitted 15 November, 2004;
originally announced November 2004.
-
Balanced Overlay Networks (BON): Decentralized Load Balancing via Self-Organized Random Networks
Authors:
Jesse S. A. Bridgewater,
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node's available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-o…
▽ More
We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node's available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-organized, with each node managing its in-degree and local connectivity via random-walk sampling. Assignment of incoming jobs to nodes with the most free resources is also accomplished by sampling the nodes via short random walks. Extensive simulations show that the resulting highly dynamic and self-organized graph structure can efficiently balance computational load throughout large-scale networks. These simulations cover a wide spectrum of cases, including significant heterogeneity in available computing resources and high burstiness in incoming load. We provide analytical results that prove BON's scalability for truly large-scale networks: in particular we show that under certain ideal conditions, the network structure converges to Erdos-Renyi (ER) random graphs; our simulation results, however, show that the algorithm does much better, and the structures seem to approach the ideal case of d-regular random graphs. We also make a connection between highly-loaded BONs and the well-known ball-bin randomized load balancing framework.
△ Less
Submitted 16 January, 2006; v1 submitted 15 November, 2004;
originally announced November 2004.
-
A Statistical Mechanical Load Balancer for the Web
Authors:
Jesse S. A. Bridgewater,
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
The maximum entropy principle from statistical mechanics states that a closed system attains an equilibrium distribution that maximizes its entropy. We first show that for graphs with fixed number of edges one can define a stochastic edge dynamic that can serve as an effective thermalization scheme, and hence, the underlying graphs are expected to attain their maximum-entropy states, which turn…
▽ More
The maximum entropy principle from statistical mechanics states that a closed system attains an equilibrium distribution that maximizes its entropy. We first show that for graphs with fixed number of edges one can define a stochastic edge dynamic that can serve as an effective thermalization scheme, and hence, the underlying graphs are expected to attain their maximum-entropy states, which turn out to be Erdos-Renyi (ER) random graphs. We next show that (i) a rate-equation based analysis of node degree distribution does indeed confirm the maximum-entropy principle, and (ii) the edge dynamic can be effectively implemented using short random walks on the underlying graphs, leading to a local algorithm for the generation of ER random graphs. The resulting statistical mechanical system can be adapted to provide a distributed and local (i.e., without any centralized monitoring) mechanism for load balancing, which can have a significant impact in increasing the efficiency and utilization of both the Internet (e.g., efficient web mirroring), and large-scale computing infrastructure (e.g., cluster and grid computing).
△ Less
Submitted 6 January, 2005; v1 submitted 5 October, 2004;
originally announced October 2004.
-
Scalable Percolation Search in Power Law Networks
Authors:
Nima Sarshar,
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
We introduce a scalable searching algorithm for finding nodes and contents in random networks with Power-Law (PL) and heavy-tailed degree distributions. The network is searched using a probabilistic broadcast algorithm, where a query message is relayed on each edge with probability just above the bond percolation threshold of the network. We show that if each node caches its directory via a shor…
▽ More
We introduce a scalable searching algorithm for finding nodes and contents in random networks with Power-Law (PL) and heavy-tailed degree distributions. The network is searched using a probabilistic broadcast algorithm, where a query message is relayed on each edge with probability just above the bond percolation threshold of the network. We show that if each node caches its directory via a short random walk, then the total number of {\em accessible contents exhibits a first-order phase transition}, ensuring very high hit rates just above the percolation threshold. In any random PL network of size, $N$, and exponent, $2 \leq τ< 3$, the total traffic per query scales sub-linearly, while the search time scales as $O(\log N)$. In a PL network with exponent, $τ\approx 2$, {\em any content or node} can be located in the network with {\em probability approaching one} in time $O(\log N)$, while generating traffic that scales as $O(\log^2 N)$, if the maximum degree, $k_{max}$, is unconstrained, and as $O(N^{{1/2}+ε})$ (for any $ε>0$) if $ k_{max}=O(\sqrt{N})$. Extensive large-scale simulations show these scaling laws to be precise. We discuss how this percolation search algorithm can be directly adapted to solve the well-known scaling problem in unstructured Peer-to-Peer (P2P) networks. Simulations of the protocol on sample large-scale subnetworks of existing P2P services show that overall traffic can be reduced by almost two-orders of magnitude, without any significant loss in search performance.
△ Less
Submitted 7 June, 2004;
originally announced June 2004.
-
Personal Email Networks: An Effective Anti-Spam Tool
Authors:
P. Oscar Boykin,
Vwani Roychowdhury
Abstract:
We provide an automated graph theoretic method for identifying individual users' trusted networks of friends in cyberspace. We routinely use our social networks to judge the trustworthiness of outsiders, i.e., to decide where to buy our next car, or to find a good mechanic for it. In this work, we show that an email user may similarly use his email network, constructed solely from sender and rec…
▽ More
We provide an automated graph theoretic method for identifying individual users' trusted networks of friends in cyberspace. We routinely use our social networks to judge the trustworthiness of outsiders, i.e., to decide where to buy our next car, or to find a good mechanic for it. In this work, we show that an email user may similarly use his email network, constructed solely from sender and recipient information available in the email headers, to distinguish between unsolicited commercial emails, commonly called "spam", and emails associated with his circles of friends. We exploit the properties of social networks to construct an automated anti-spam tool which processes an individual user's personal email network to simultaneously identify the user's core trusted networks of friends, as well as subnetworks generated by spams. In our empirical studies of individual mail boxes, our algorithm classified approximately 53% of all emails as spam or non-spam, with 100% accuracy. Some of the emails are left unclassified by this network analysis tool. However, one can exploit two of the following useful features. First, it requires no user intervention or supervised training; second, it results in no false negatives i.e., spam being misclassified as non-spam, or vice versa. We demonstrate that these two features suggest that our algorithm may be used as a platform for a comprehensive solution to the spam problem when used in concert with more sophisticated, but more cumbersome, content-based filters.
△ Less
Submitted 4 February, 2004;
originally announced February 2004.
-
Information Security and Quantum Mechanics: Security of Quantum Protocols
Authors:
P. Oscar Boykin
Abstract:
The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution…
▽ More
The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.
△ Less
Submitted 28 October, 2002;
originally announced October 2002.
-
Algorithmic Cooling and Scalable NMR Quantum Computers
Authors:
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury,
Farrokh Vatan,
Rutger Vrijen
Abstract:
We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxilia…
▽ More
We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxiliary bits could be implemented using spins that rapidly get into thermal equilibrium with the environment, e.g., electron spins.
Cooling spins to a very low temperature without cooling the environment could lead to a breakthrough in nuclear magnetic resonance experiments, and our ``spin-refrigerating'' method suggests that this is possible.
The scaling of NMR ensemble computers is probably the main obstacle to building useful quantum computing devices, and our spin-refrigerating method suggests that this problem can be resolved.
△ Less
Submitted 18 June, 2001;
originally announced June 2001.
-
A new proof for the existence of mutually unbiased bases
Authors:
Somshubhro Bandyopadhyay,
P. Oscar Boykin,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
We develop a strong connection between maximally commuting bases of orthogonal unitary matrices and mutually unbiased bases. A necessary condition of the existence of mutually unbiased bases for any finite dimension is obtained. Then a constructive proof of the existence of mutually unbiased bases for dimensions which are power of a prime is presented. It is also proved that in any dimension d t…
▽ More
We develop a strong connection between maximally commuting bases of orthogonal unitary matrices and mutually unbiased bases. A necessary condition of the existence of mutually unbiased bases for any finite dimension is obtained. Then a constructive proof of the existence of mutually unbiased bases for dimensions which are power of a prime is presented. It is also proved that in any dimension d the number of mutually unbiased bases is at most d+1. An explicit representation of mutually unbiased observables in terms of Pauli matrices are provided for d=2^m.
△ Less
Submitted 7 September, 2001; v1 submitted 29 March, 2001;
originally announced March 2001.
-
Optimal Encryption of Quantum Bits
Authors:
P. Oscar Boykin,
Vwani Roychowdhury
Abstract:
We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows for generalizations of many classical cryptographic protocols to quantum data. We show that the encrypted state gives no information without the…
▽ More
We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows for generalizations of many classical cryptographic protocols to quantum data. We show that the encrypted state gives no information without the secret classical data, and that 2n random classical bits are the minimum necessary for informationally secure quantum encryption. Moreover, the quantum operations are shown to have a surprising structure in a canonical inner product space. This quantum encryption protocol is a generalization of the classical one time pad concept. A connection is made between quantum encryption and quantum teleportation, and this allows for a new proof of optimality of teleportation.
△ Less
Submitted 20 March, 2000; v1 submitted 16 March, 2000;
originally announced March 2000.
-
A Proof of the Security of Quantum Key Distribution
Authors:
Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury
Abstract:
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
△ Less
Submitted 10 December, 1999;
originally announced December 1999.
-
Algorithms on Ensemble Quantum Computers
Authors:
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms…
▽ More
In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms for universal fault--tolerant computation, Shor's factorization algorithm (which can be extended to any algorithm computing an NP function), and some search algorithms to enable processing them on ensemble quantum computers.
△ Less
Submitted 21 July, 1999;
originally announced July 1999.
-
On Universal and Fault-Tolerant Quantum Computing
Authors:
P. Oscar Boykin,
Tal Mor,
Matthew Pulver,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set is necessary to perform quantum computation in a realistic noisy environment. The new basis consists of two single-qubit gates (Hadamard and ${σ_z}^{1/4}$), and one double-qubit gate (Controlled-NOT). Since the set consisting of Controlled-NOT and Hadamard gates is not universal, the new ba…
▽ More
A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set is necessary to perform quantum computation in a realistic noisy environment. The new basis consists of two single-qubit gates (Hadamard and ${σ_z}^{1/4}$), and one double-qubit gate (Controlled-NOT). Since the set consisting of Controlled-NOT and Hadamard gates is not universal, the new basis achieves universality by including only one additional elementary (in the sense that it does not include angles that are irrational multiples of $π$) single-qubit gate, and hence, is potentially the simplest universal basis that one can construct. We also provide an alternative proof of universality for the only other known class of universal and fault-tolerant basis proposed by Shor and by Kitaev.
△ Less
Submitted 15 June, 1999;
originally announced June 1999.