-
Ring Elements of Stable Range One
Authors:
Dinesh Khurana,
T. Y. Lam
Abstract:
A ring element $\,a\in R\,$ is said to be of {\it right stable range one\/} if, for any $\,t\in R$, $\,aR+tR=R\,$ implies that $\,a+t\,b\,$ is a unit in $\,R\,$ for some $\,b\in R$. Similarly, $\,a\in R\,$ is said to be of {\it left stable range one\/} if $\,R\,a+R\,t=R\,$ implies that $\,a+b't\,$ is a unit in $\,R\,$ for some $\,b'\in R$. In the last two decades, it has often been speculated that…
▽ More
A ring element $\,a\in R\,$ is said to be of {\it right stable range one\/} if, for any $\,t\in R$, $\,aR+tR=R\,$ implies that $\,a+t\,b\,$ is a unit in $\,R\,$ for some $\,b\in R$. Similarly, $\,a\in R\,$ is said to be of {\it left stable range one\/} if $\,R\,a+R\,t=R\,$ implies that $\,a+b't\,$ is a unit in $\,R\,$ for some $\,b'\in R$. In the last two decades, it has often been speculated that these two notions are actually the same for any $\,a\in R$. In \S3 of this paper, we will prove that this is indeed the case. The key to the proof of this new symmetry result is a certain ``Super Jacobson's Lemma'', which generalizes Jacobson's classical lemma stating that, for any $\,a,b\in R$, $\,1-ab\,$ is a unit in $\,R\,$ iff so is $\,1-ba$. Our proof for the symmetry result above has led to a new generalization of a classical determinantal identity of Sylvester, which will be published separately in [KL$_3$]. In §\S4-5, a detailed study is offered for stable range one ring elements that are unit-regular or nilpotent, while \S6 examines the behavior of stable range one elements via their classical Peirce decompositions. The paper ends with a more concrete \S7 on integral matrices of stable range one, followed by a final \S8 with a few open questions.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Commitments from Quantum One-Wayness
Authors:
Dakshita Khurana,
Kabir Tomer
Abstract:
One-way functions are central to classical cryptography. They are both necessary for the existence of non-trivial classical cryptosystems, and sufficient to realize meaningful primitives including commitments, pseudorandom generators and digital signatures. At the same time, a mounting body of evidence suggests that assumptions even weaker than one-way functions may suffice for many cryptographic…
▽ More
One-way functions are central to classical cryptography. They are both necessary for the existence of non-trivial classical cryptosystems, and sufficient to realize meaningful primitives including commitments, pseudorandom generators and digital signatures. At the same time, a mounting body of evidence suggests that assumptions even weaker than one-way functions may suffice for many cryptographic tasks of interest in a quantum world, including bit commitments and secure multi-party computation. This work studies one-way state generators [Morimae-Yamakawa, CRYPTO 2022], a natural quantum relaxation of one-way functions. Given a secret key, a one-way state generator outputs a hard to invert quantum state. A fundamental question is whether this type of quantum one-wayness suffices to realize quantum cryptography. We obtain an affirmative answer to this question, by proving that one-way state generators with pure state outputs imply quantum bit commitments and secure multiparty computation. Along the way, we build an intermediate primitive with classical outputs, which we call a (quantum) one-way puzzle. Our main technical contribution is a proof that one-way puzzles imply quantum bit commitments.
△ Less
Submitted 29 January, 2024; v1 submitted 17 October, 2023;
originally announced October 2023.
-
Unclonable Non-Interactive Zero-Knowledge
Authors:
Ruta Jawale,
Dakshita Khurana
Abstract:
A non-interactive ZK (NIZK) proof enables verification of NP statements without revealing secrets about them. However, an adversary that obtains a NIZK proof may be able to clone this proof and distribute arbitrarily many copies of it to various entities: this is inevitable for any proof that takes the form of a classical string. In this paper, we ask whether it is possible to rely on quantum info…
▽ More
A non-interactive ZK (NIZK) proof enables verification of NP statements without revealing secrets about them. However, an adversary that obtains a NIZK proof may be able to clone this proof and distribute arbitrarily many copies of it to various entities: this is inevitable for any proof that takes the form of a classical string. In this paper, we ask whether it is possible to rely on quantum information in order to build NIZK proof systems that are impossible to clone.
We define and construct unclonable non-interactive zero-knowledge proofs (of knowledge) for NP. Besides satisfying the zero-knowledge and proof of knowledge properties, these proofs additionally satisfy unclonability. Very roughly, this ensures that no adversary can split an honestly generated proof of membership of an instance $x$ in an NP language $\mathcal{L}$ and distribute copies to multiple entities that all obtain accepting proofs of membership of $x$ in $\mathcal{L}$. Our result has applications to unclonable signatures of knowledge, which we define and construct in this work; these non-interactively prevent replay attacks.
△ Less
Submitted 12 October, 2023; v1 submitted 10 October, 2023;
originally announced October 2023.
-
A New Determinantal Formula for Three Matrices
Authors:
Dinesh Khurana,
T. Y. Lam
Abstract:
For any three $\,n\times n\,$ matrices $\,A,B,X\,$ over a commutative ring $\,S$, we prove that $\,{\rm det}\,(A+B-AXB)={\rm det}\,(A+B-BXA) \in S$. This apparently new formula may be regarded as a ``ternary generalization'' of Sylvester's classical determinantal formula $\,{\rm det}\,(I_n-AB)={\rm det}\,(I_n-BA)\,$ for any pair of $\,n\times n\,$ matrices $\,A,B\,$ over $\,S$.
For any three $\,n\times n\,$ matrices $\,A,B,X\,$ over a commutative ring $\,S$, we prove that $\,{\rm det}\,(A+B-AXB)={\rm det}\,(A+B-BXA) \in S$. This apparently new formula may be regarded as a ``ternary generalization'' of Sylvester's classical determinantal formula $\,{\rm det}\,(I_n-AB)={\rm det}\,(I_n-BA)\,$ for any pair of $\,n\times n\,$ matrices $\,A,B\,$ over $\,S$.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)
Authors:
James Bartusek,
Dakshita Khurana,
Akshayaram Srinivasan
Abstract:
Can a sender non-interactively transmit one of two strings to a receiver without knowing which string was received? Does there exist minimally-interactive secure multiparty computation that only makes (black-box) use of symmetric-key primitives? We provide affirmative answers to these questions in a model where parties have access to shared EPR pairs, thus demonstrating the cryptographic power of…
▽ More
Can a sender non-interactively transmit one of two strings to a receiver without knowing which string was received? Does there exist minimally-interactive secure multiparty computation that only makes (black-box) use of symmetric-key primitives? We provide affirmative answers to these questions in a model where parties have access to shared EPR pairs, thus demonstrating the cryptographic power of this resource.
First, we construct a one-shot (i.e., single message) string oblivious transfer (OT) protocol with random receiver bit in the shared EPR pairs model, assuming the (sub-exponential) hardness of LWE. Building on this, we show that {\em secure teleportation through quantum channels} is possible. Specifically, given the description of any quantum operation $Q$, a sender with (quantum) input $ρ$ can send a single classical message that securely transmits $Q(ρ)$ to a receiver. That is, we realize an ideal quantum channel that takes input $ρ$ from the sender and provably delivers $Q(ρ)$ to the receiver without revealing any other information. This immediately gives a number of applications in the shared EPR pairs model: (1) non-interactive secure computation of unidirectional \emph{classical} randomized functionalities, (2) NIZK for QMA from standard (sub-exponential) hardness assumptions, and (3) a non-interactive \emph{zero-knowledge} state synthesis protocol.
Next, we construct a two-round (round-optimal) secure multiparty computation protocol for classical functionalities in the shared EPR pairs model that is \emph{unconditionally-secure} in the (quantum-accessible) random oracle model.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Weakening Assumptions for Publicly-Verifiable Deletion
Authors:
James Bartusek,
Dakshita Khurana,
Giulio Malavolta,
Alexander Poremba,
Michael Walter
Abstract:
We develop a simple compiler that generically adds publicly-verifiable deletion to a variety of cryptosystems. Our compiler only makes use of one-way functions (or one-way state generators, if we allow the public verification key to be quantum). Previously, similar compilers either relied on the use of indistinguishability obfuscation (Bartusek et. al., ePrint:2023/265) or almost-regular one-way f…
▽ More
We develop a simple compiler that generically adds publicly-verifiable deletion to a variety of cryptosystems. Our compiler only makes use of one-way functions (or one-way state generators, if we allow the public verification key to be quantum). Previously, similar compilers either relied on the use of indistinguishability obfuscation (Bartusek et. al., ePrint:2023/265) or almost-regular one-way functions (Bartusek, Khurana and Poremba, arXiv:2303.08676).
△ Less
Submitted 9 October, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
Publicly-Verifiable Deletion via Target-Collapsing Functions
Authors:
James Bartusek,
Dakshita Khurana,
Alexander Poremba
Abstract:
We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled ima…
▽ More
We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled image.
We show that target-collapsing hashes enable publicly-verifiable deletion (PVD), proving conjectures from [Poremba, ITCS'23] and demonstrating that the Dual-Regev encryption (and corresponding fully homomorphic encryption) schemes support PVD under the LWE assumption. We further build on this framework to obtain a variety of primitives supporting publicly-verifiable deletion from weak cryptographic assumptions, including:
- Commitments with PVD assuming the existence of injective one-way functions, or more generally, almost-regular one-way functions. Along the way, we demonstrate that (variants of) target-collapsing hashes can be built from almost-regular one-way functions.
- Public-key encryption with PVD assuming trapdoored variants of injective (or almost-regular) one-way functions. We also demonstrate that the encryption scheme of [Hhan, Morimae, and Yamakawa, Eurocrypt'23] based on pseudorandom group actions has PVD.
- $X$ with PVD for $X \in \{$attribute-based encryption, quantum fully-homomorphic encryption, witness encryption, time-revocable encryption$\}$, assuming $X$ and trapdoored variants of injective (or almost-regular) one-way functions.
△ Less
Submitted 9 October, 2023; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Smooth Anosov Katok Diffeomorphisms With Generic Measure
Authors:
Divya Khurana
Abstract:
We construct a plethora of Anosov-Katok diffeomorphisms with non-ergodic generic measures and various other mixing and topological properties. We also construct an explicit collection of the set containing the generic points of the system with interesting values of its Hausdorff dimension.
We construct a plethora of Anosov-Katok diffeomorphisms with non-ergodic generic measures and various other mixing and topological properties. We also construct an explicit collection of the set containing the generic points of the system with interesting values of its Hausdorff dimension.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Consistent Multiclass Algorithms for Complex Metrics and Constraints
Authors:
Harikrishna Narasimhan,
Harish G. Ramaswamy,
Shiv Kumar Tavker,
Drona Khurana,
Praneeth Netrapalli,
Shivani Agarwal
Abstract:
We present consistent algorithms for multiclass learning with complex performance metrics and constraints, where the objective and constraints are defined by arbitrary functions of the confusion matrix. This setting includes many common performance metrics such as the multiclass G-mean and micro F1-measure, and constraints such as those on the classifier's precision and recall and more recent meas…
▽ More
We present consistent algorithms for multiclass learning with complex performance metrics and constraints, where the objective and constraints are defined by arbitrary functions of the confusion matrix. This setting includes many common performance metrics such as the multiclass G-mean and micro F1-measure, and constraints such as those on the classifier's precision and recall and more recent measures of fairness discrepancy. We give a general framework for designing consistent algorithms for such complex design goals by viewing the learning problem as an optimization problem over the set of feasible confusion matrices. We provide multiple instantiations of our framework under different assumptions on the performance metrics and constraints, and in each case show rates of convergence to the optimal (feasible) classifier (and thus asymptotic consistency). Experiments on a variety of multiclass classification tasks and fairness-constrained problems show that our algorithms compare favorably to the state-of-the-art baselines.
△ Less
Submitted 18 October, 2022; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Sensing of magnetic field effects in radical-pair reactions using a quantum sensor
Authors:
Deepak Khurana,
Rasmus H. Jensen,
Rakshyakar Giri,
Juanita Bocquel,
Ulrik L. Andersen,
Kirstine Berg-Sørensen,
Alexander Huck
Abstract:
Magnetic field effects (MFE) in certain chemical reactions have been well established in the last five decades and are attributed to the evolution of transient radical-pairs whose spin dynamics are determined by local and external magnetic fields. The majority of existing experimental techniques used to probe these reactions only provide ensemble averaged reaction parameters and spin chemistry, hi…
▽ More
Magnetic field effects (MFE) in certain chemical reactions have been well established in the last five decades and are attributed to the evolution of transient radical-pairs whose spin dynamics are determined by local and external magnetic fields. The majority of existing experimental techniques used to probe these reactions only provide ensemble averaged reaction parameters and spin chemistry, hindering the observation of the potential presence of quantum coherent phenomena at the single molecule scale. Here, considering a single nitrogen vacancy (NV) centre as quantum sensor, we investigate the prospects and requirements for detection of MFEs on the spin dynamics of radical-pairs at the scale of single and small ensemble of molecules. We employ elaborate and realistic models of radical-pairs, considering its coupling to the local spin environment and the sensor. For two model systems, we derive signals of MFE detectable even in the weak coupling regime between radical-pair and NV quantum sensor, and observe that the dynamics of certain populations, as well as coherence elements, of the density matrix of the radical pair are directly detectable. Our investigations will provide important guidelines for potential detection of spin chemistry of bio-molecules at the single molecule scale, required to witness the hypothesised importance of quantum coherence in biological processes.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
A New Framework for Quantum Oblivious Transfer
Authors:
Amit Agarwal,
James Bartusek,
Dakshita Khurana,
Nishant Kumar
Abstract:
We present a new template for building oblivious transfer from quantum information that we call the "fixed basis" framework. Our framework departs from prior work (eg., Crepeau and Kilian, FOCS '88) by fixing the correct choice of measurement basis used by each player, except for some hidden trap qubits that are intentionally measured in a conjugate basis. We instantiate this template in the quant…
▽ More
We present a new template for building oblivious transfer from quantum information that we call the "fixed basis" framework. Our framework departs from prior work (eg., Crepeau and Kilian, FOCS '88) by fixing the correct choice of measurement basis used by each player, except for some hidden trap qubits that are intentionally measured in a conjugate basis. We instantiate this template in the quantum random oracle model (QROM) to obtain simple protocols that implement, with security against malicious adversaries:
1. Non-interactive random-input bit OT in a model where parties share EPR pairs a priori.
2. Two-round random-input bit OT without setup, obtained by showing that the protocol above remains secure even if the (potentially malicious) OT receiver sets up the EPR pairs.
3. Three-round chosen-input string OT from BB84 states without entanglement or setup. This improves upon natural variations of the CK88 template that require at least five rounds.
Along the way, we develop technical tools that may be of independent interest. We prove that natural functions like XOR enable seedless randomness extraction from certain quantum sources of entropy. We also use idealized (i.e. extractable and equivocal) bit commitments, which we obtain by proving security of simple and efficient constructions in the QROM.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
Charge stability and charge-state-based spin readout of shallow nitrogen-vacancy centers in diamond
Authors:
Rakshyakar Giri,
Rasmus H. Jensen,
Deepak Khurana,
Juanita Bocquel,
Ilya P. Radko,
Johannes Lang,
Christian Osterkamp,
Fedor Jelezko,
Kirstine Berg-Sorensen,
Ulrik L. Andersen,
Alexander Huck
Abstract:
Spin-based applications of the negatively charged nitrogen-vacancy (NV) center in diamonds require efficient spin readout. One approach is the spin-to-charge conversion (SCC), relying on map** the spin states onto the neutral (NV$^0$) and negative (NV$^-$) charge states followed by a subsequent charge readout. With high charge-state stability, SCC enables extended measurement times, increasing p…
▽ More
Spin-based applications of the negatively charged nitrogen-vacancy (NV) center in diamonds require efficient spin readout. One approach is the spin-to-charge conversion (SCC), relying on map** the spin states onto the neutral (NV$^0$) and negative (NV$^-$) charge states followed by a subsequent charge readout. With high charge-state stability, SCC enables extended measurement times, increasing precision and minimizing noise in the readout compared to the commonly used fluorescence detection. Nano-scale sensing applications, however, require shallow NV centers within a few $\si{\nano \meter}$ distance from the surface where surface related effects might degrade the NV charge state. In this article, we investigate the charge state initialization and stability of single NV centers implanted $\approx \SI{5}{\nano \meter}$ below the surface of a flat diamond plate. We demonstrate the SCC protocol on four shallow NV centers suitable for nano-scale sensing, obtaining a reduced readout noise of 5--6 times the spin-projection noise limit. We investigate the general applicability of SCC for shallow NV centers and observe a correlation between NV charge-state stability and readout noise. Coating the diamond with glycerol improves both charge initialization and stability. Our results reveal the influence of the surface-related charge environment on the NV charge properties and motivate further investigations to functionalize the diamond surface with glycerol or other materials for charge-state stabilization and efficient spin-state readout of shallow NV centers suitable for nano-scale sensing.
△ Less
Submitted 10 November, 2023; v1 submitted 30 August, 2022;
originally announced August 2022.
-
Cryptography with Certified Deletion
Authors:
James Bartusek,
Dakshita Khurana
Abstract:
We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion. These primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources.
- For X \in {public-key, attribute-bas…
▽ More
We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion. These primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources.
- For X \in {public-key, attribute-based, fully-homomorphic, witness, timed-release}, our compiler converts any (post-quantum) X encryption to X encryption with certified deletion. In addition, we compile statistically-binding commitments to statistically-binding commitments with certified everlasting hiding. As a corollary, we also obtain statistically-sound zero-knowledge proofs for QMA with certified everlasting zero-knowledge assuming statistically-binding commitments.
- We also obtain a strong form of everlasting security for two-party and multi-party computation in the dishonest majority setting. While simultaneously achieving everlasting security against all parties in this setting is known to be impossible, we introduce everlasting security transfer (EST). This enables any one party (or a subset of parties) to dynamically and certifiably information-theoretically delete other participants' data after protocol execution. We construct general-purpose secure computation with EST assuming statistically-binding commitments, which can be based on one-way functions or pseudorandom quantum states.
We obtain our results by develo** a novel proof technique to argue that a bit b has been information-theoretically deleted from an adversary's view once they output a valid deletion certificate, despite having been previously information-theoretically determined by the ciphertext they held in their view. This technique may be of independent interest.
△ Less
Submitted 20 April, 2023; v1 submitted 4 July, 2022;
originally announced July 2022.
-
Approximate smoothness in normed linear spaces
Authors:
Jacek Chmieliński,
Divya Khurana,
Debmalya Sain
Abstract:
We introduce the notion of approximate smoothness in a normed linear space. We characterize this property and show the connections between smoothness and approximate smoothness for some spaces. As an application, we consider in particular the Birkhoff-James orthogonality and its right-additivity under the assumption of approximate smoothness.
We introduce the notion of approximate smoothness in a normed linear space. We characterize this property and show the connections between smoothness and approximate smoothness for some spaces. As an application, we consider in particular the Birkhoff-James orthogonality and its right-additivity under the assumption of approximate smoothness.
△ Less
Submitted 6 November, 2022; v1 submitted 24 September, 2021;
originally announced September 2021.
-
Statistical Guarantees for Fairness Aware Plug-In Algorithms
Authors:
Drona Khurana,
Srinivasan Ravichandran,
Sparsh Jain,
Narayanan Unny Edakunni
Abstract:
A plug-in algorithm to estimate Bayes Optimal Classifiers for fairness-aware binary classification has been proposed in (Menon & Williamson, 2018). However, the statistical efficacy of their approach has not been established. We prove that the plug-in algorithm is statistically consistent. We also derive finite sample guarantees associated with learning the Bayes Optimal Classifiers via the plug-i…
▽ More
A plug-in algorithm to estimate Bayes Optimal Classifiers for fairness-aware binary classification has been proposed in (Menon & Williamson, 2018). However, the statistical efficacy of their approach has not been established. We prove that the plug-in algorithm is statistically consistent. We also derive finite sample guarantees associated with learning the Bayes Optimal Classifiers via the plug-in algorithm. Finally, we propose a protocol that modifies the plug-in approach, so as to simultaneously guarantee fairness and differential privacy with respect to a binary feature deemed sensitive.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Star-topology Registers: NMR and Quantum Information Perspectives
Authors:
T S Mahesh,
Deepak Khurana,
Krithika V R,
Sreejith G J,
C S Sudheer Kumar
Abstract:
Quantum control of large spin registers is crucial for many applications ranging from spectroscopy to quantum information. A key factor that determines the efficiency of a register for implementing a given information processing task is its network topology. One particular type, called star-topology, involves a central qubit uniformly interacting with a set of ancillary qubits. A particular advant…
▽ More
Quantum control of large spin registers is crucial for many applications ranging from spectroscopy to quantum information. A key factor that determines the efficiency of a register for implementing a given information processing task is its network topology. One particular type, called star-topology, involves a central qubit uniformly interacting with a set of ancillary qubits. A particular advantage of the star-topology quantum registers is in the efficient preparation of large entangled states, called NOON states, and their generalized variants. Thanks to the robust generation of such correlated states, spectral simplicity, ease of polarization transfer from ancillary qubits to the central qubit, as well as the availability of large spin-clusters, the star-topology registers have been utilized for several interesting applications over the last few years. Here we review some recent progress with the star-topology registers, particularly via nuclear magnetic resonance methods.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Local approximate symmetry of Birkhoff-James orthogonality in normed linear spaces
Authors:
Jacek Chmieliński,
Divya Khurana,
Debmalya Sain
Abstract:
Two different notions of approximate Birkhoff-James orthogonality in nor\-med linear spaces have been introduced by Dragomir and Chmie\-liń\-ski. In the present paper we consider a global and a local approximate symmetry of the Birkhoff-James orthogonality related to each of the two definitions. We prove that the considered orthogonality is approximately symmetric in the sense of Dragomir in all f…
▽ More
Two different notions of approximate Birkhoff-James orthogonality in nor\-med linear spaces have been introduced by Dragomir and Chmie\-liń\-ski. In the present paper we consider a global and a local approximate symmetry of the Birkhoff-James orthogonality related to each of the two definitions. We prove that the considered orthogonality is approximately symmetric in the sense of Dragomir in all finite-dimensional Banach spaces. For the other case, we prove that for finite-dimensional polyhedral Banach spaces, the approximate symmetry of the orthogonality is equivalent to some newly introduced geometric property. Our investigations complement and extend the scope of some recent results on a global approximate symmetry of the Birkhoff-James orthogonality.
△ Less
Submitted 15 December, 2020;
originally announced December 2020.
-
One-Way Functions Imply Secure Computation in a Quantum World
Authors:
James Bartusek,
Andrea Coladangelo,
Dakshita Khurana,
Fermi Ma
Abstract:
We prove that quantum-hard one-way functions imply simulation-secure quantum oblivious transfer (QOT), which is known to suffice for secure computation of arbitrary quantum functionalities. Furthermore, our construction only makes black-box use of the quantum-hard one-way function.
Our primary technical contribution is a construction of extractable and equivocal quantum bit commitments based on…
▽ More
We prove that quantum-hard one-way functions imply simulation-secure quantum oblivious transfer (QOT), which is known to suffice for secure computation of arbitrary quantum functionalities. Furthermore, our construction only makes black-box use of the quantum-hard one-way function.
Our primary technical contribution is a construction of extractable and equivocal quantum bit commitments based on the black-box use of quantum-hard one-way functions in the standard model. Instantiating the Crépeau-Kilian (FOCS 1988) framework with these commitments yields simulation-secure QOT.
△ Less
Submitted 13 August, 2021; v1 submitted 26 November, 2020;
originally announced November 2020.
-
On The Round Complexity of Secure Quantum Computation
Authors:
James Bartusek,
Andrea Coladangelo,
Dakshita Khurana,
Fermi Ma
Abstract:
We construct the first constant-round protocols for secure quantum computation in the two-party (2PQC) and multi-party (MPQC) settings with security against malicious adversaries. Our protocols are in the common random string (CRS) model.
- Assuming two-message oblivious transfer (OT), we obtain (i) three-message 2PQC, and (ii) five-round MPQC with only three rounds of online (input-dependent) c…
▽ More
We construct the first constant-round protocols for secure quantum computation in the two-party (2PQC) and multi-party (MPQC) settings with security against malicious adversaries. Our protocols are in the common random string (CRS) model.
- Assuming two-message oblivious transfer (OT), we obtain (i) three-message 2PQC, and (ii) five-round MPQC with only three rounds of online (input-dependent) communication; such OT is known from quantum-hard Learning with Errors (QLWE).
- Assuming sub-exponential hardness of QLWE, we obtain (i) three-round 2PQC with two online rounds and (ii) four-round MPQC with two online rounds.
- When only one (out of two) parties receives output, we achieve minimal interaction (two messages) from two-message OT; classically, such protocols are known as non-interactive secure computation (NISC), and our result constitutes the first maliciously-secure quantum NISC. Additionally assuming reusable malicious designated-verifier NIZK arguments for NP (MDV-NIZKs), we give the first MDV-NIZK for QMA that only requires one copy of the quantum witness.
Finally, we perform a preliminary investigation into two-round secure quantum computation where each party must obtain output. On the negative side, we identify a broad class of simulation strategies that suffice for classical two-round secure computation that are unlikely to work in the quantum setting. Next, as a proof-of-concept, we show that two-round secure quantum computation exists with respect to a quantum oracle.
△ Less
Submitted 13 August, 2021; v1 submitted 23 November, 2020;
originally announced November 2020.
-
Norm derivatives and geometry of bilinear operators
Authors:
Divya Khurana,
Debmalya Sain
Abstract:
We study the norm derivatives in the context of Birkhoff-James orthogonality in real Banach spaces. As an application of this, we obtain a complete characterization of the left-symmetric points and the right-symmetric points in a real Banach space in terms of the norm derivatives. We obtain a complete characterization of strong Birkhoff-James orthogonality in $\ell_1^n$ and $\ell_\infty^n$ spaces.…
▽ More
We study the norm derivatives in the context of Birkhoff-James orthogonality in real Banach spaces. As an application of this, we obtain a complete characterization of the left-symmetric points and the right-symmetric points in a real Banach space in terms of the norm derivatives. We obtain a complete characterization of strong Birkhoff-James orthogonality in $\ell_1^n$ and $\ell_\infty^n$ spaces. We also obtain a complete characterization of the orthogonality relation defined by the norm derivatives in terms of some newly introduced variation of Birkhoff-James orthogonality. We further study Birkhoff-James orthogonality, approximate Birkhoff-James orthogonality, smoothness and norm attainment of bounded bilinear operators between Banach spaces.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
FairXGBoost: Fairness-aware Classification in XGBoost
Authors:
Srinivasan Ravichandran,
Drona Khurana,
Bharath Venkatesh,
Narayanan Unny Edakunni
Abstract:
Highly regulated domains such as finance have long favoured the use of machine learning algorithms that are scalable, transparent, robust and yield better performance. One of the most prominent examples of such an algorithm is XGBoost. Meanwhile, there is also a growing interest in building fair and unbiased models in these regulated domains and numerous bias-mitigation algorithms have been propos…
▽ More
Highly regulated domains such as finance have long favoured the use of machine learning algorithms that are scalable, transparent, robust and yield better performance. One of the most prominent examples of such an algorithm is XGBoost. Meanwhile, there is also a growing interest in building fair and unbiased models in these regulated domains and numerous bias-mitigation algorithms have been proposed to this end. However, most of these bias-mitigation methods are restricted to specific model families such as logistic regression or support vector machine models, thus leaving modelers with a difficult decision of choosing between fairness from the bias-mitigation algorithms and scalability, transparency, performance from algorithms such as XGBoost. We aim to leverage the best of both worlds by proposing a fair variant of XGBoost that enjoys all the advantages of XGBoost, while also matching the levels of fairness from the state-of-the-art bias-mitigation algorithms. Furthermore, the proposed solution requires very little in terms of changes to the original XGBoost library, thus making it easy for adoption. We provide an empirical analysis of our proposed method on standard benchmark datasets used in the fairness community.
△ Less
Submitted 7 October, 2020; v1 submitted 3 September, 2020;
originally announced September 2020.
-
Post-Quantum Multi-Party Computation
Authors:
Amit Agarwal,
James Bartusek,
Vipul Goyal,
Dakshita Khurana,
Giulio Malavolta
Abstract:
We initiate the study of multi-party computation for classical functionalities (in the plain model) with security against malicious polynomial-time quantum adversaries. We observe that existing techniques readily give a polynomial-round protocol, but our main result is a construction of *constant-round* post-quantum multi-party computation. We assume mildly super-polynomial quantum hardness of lea…
▽ More
We initiate the study of multi-party computation for classical functionalities (in the plain model) with security against malicious polynomial-time quantum adversaries. We observe that existing techniques readily give a polynomial-round protocol, but our main result is a construction of *constant-round* post-quantum multi-party computation. We assume mildly super-polynomial quantum hardness of learning with errors (LWE), and polynomial quantum hardness of an LWE-based circular security assumption. Along the way, we develop the following cryptographic primitives that may be of independent interest:
1. A spooky encryption scheme for relations computable by quantum circuits, from the quantum hardness of an LWE-based circular security assumption. This yields the first quantum multi-key fully-homomorphic encryption scheme with classical keys.
2. Constant-round zero-knowledge secure against multiple parallel quantum verifiers from spooky encryption for relations computable by quantum circuits. To enable this, we develop a new straight-line non-black-box simulation technique against *parallel* verifiers that does not clone the adversary's state. This forms the heart of our technical contribution and may also be relevant to the classical setting.
3. A constant-round post-quantum non-malleable commitment scheme, from the mildly super-polynomial quantum hardness of LWE.
△ Less
Submitted 20 November, 2020; v1 submitted 22 May, 2020;
originally announced May 2020.
-
Unambiguous measurement of information scrambling in a hierarchical star-topology system
Authors:
Deepak Khurana,
V. R. Krithika,
T. S. Mahesh
Abstract:
We investigate the scrambling of information in a hierarchical star-topology system using out-of-time-ordered correlation (OTOC) functions. The system consists of a central qubit directly interacting with a set of satellite qubits, which in turn interact with a second layer of satellite qubits. This particular topology not only allows convenient preparation and filtering of multiple quantum cohere…
▽ More
We investigate the scrambling of information in a hierarchical star-topology system using out-of-time-ordered correlation (OTOC) functions. The system consists of a central qubit directly interacting with a set of satellite qubits, which in turn interact with a second layer of satellite qubits. This particular topology not only allows convenient preparation and filtering of multiple quantum coherences between the central qubit and the first layer but also to engineer scrambling in a controlled manner. Hence, it provides us with an opportunity to experimentally study scrambling of information localized in multi-spin correlations via the construction of relevant OTOCs. Since the measurement of OTOC requires a time evolution, the non-scrambling processes such as decoherence and certain experimental errors create an ambiguity. Therefore, the unambiguous quantification of information scrambling requires suppressing contributions from decoherence to the OTOC dynamics. To this end, we propose and experimentally demonstrate a constant time protocol which is able to filter contribution exclusively from information scrambling.
△ Less
Submitted 6 June, 2019;
originally announced June 2019.
-
Weight-partially greedy bases and weight-Property $(A)$
Authors:
Divya Khurana
Abstract:
In this paper, motivated by the notion of $w$-Property $(A)$ defined in [2], we introduce the notions of $w$-left Property $(A)$ and $w$-right Property $(A)$. We also introduce the notions of $w$-partially greedy basis (using a characterization of partially greedy basis from [4]) and $w$-reverse partially greedy basis. The main aim of this paper is to study $(i)$ some characterizations of $w$-part…
▽ More
In this paper, motivated by the notion of $w$-Property $(A)$ defined in [2], we introduce the notions of $w$-left Property $(A)$ and $w$-right Property $(A)$. We also introduce the notions of $w$-partially greedy basis (using a characterization of partially greedy basis from [4]) and $w$-reverse partially greedy basis. The main aim of this paper is to study $(i)$ some characterizations of $w$-partially greedy and $w$-reverse partially greedy basis $(ii)$ conditions on the weight sequences when $w$-left Property $(A)$ and (or) $w$-right Property $(A)$ implies $w$-Property $(A)$.
△ Less
Submitted 13 September, 2018;
originally announced September 2018.
-
Commutators and Anti-Commutators of Idempotents in Rings
Authors:
Dinesh Khurana,
T. Y. Lam
Abstract:
We show that a ring $\,R\,$ has two idempotents $\,e,e'\,$ with an invertible commutator $\,ee'-e'e\,$ if and only if $\,R \cong {\mathbb M}_2(S)\,$ for a ring $\,S\,$ in which $\,1\,$ is a sum of two units. In this case, the "anti-commutator" $\,ee'+e'e\,$ is automatically invertible, so we study also the broader class of rings having such an invertible anti-commutator. Simple artinian rings…
▽ More
We show that a ring $\,R\,$ has two idempotents $\,e,e'\,$ with an invertible commutator $\,ee'-e'e\,$ if and only if $\,R \cong {\mathbb M}_2(S)\,$ for a ring $\,S\,$ in which $\,1\,$ is a sum of two units. In this case, the "anti-commutator" $\,ee'+e'e\,$ is automatically invertible, so we study also the broader class of rings having such an invertible anti-commutator. Simple artinian rings $\,R\,$ (along with other related classes of matrix rings) with one of the above properties are completely determined. In this study, we also arrive at various new criteria for {\it general\} $\,2\times 2\,$ matrix rings. For instance, $R\,$ is such a matrix ring if and only if it has an invertible commutator $\,er-re\,$ where $\,e^2=e$.
△ Less
Submitted 7 August, 2018;
originally announced August 2018.
-
Experimental emulation of quantum non-Markovian dynamics and coherence protection in the presence of information backflow
Authors:
Deepak Khurana,
Bijay Kumar Agarwalla,
T. S. Mahesh
Abstract:
We experimentally emulate, in a controlled fashion, the non-Markovian dynamics of a pure dephasing spin-boson model at zero temperature. Specifically, we use a randomized set of external radio-frequency fields to engineer a desired noise power-spectrum to effectively realize a non-Markovian environment for a single NMR qubit. The information backflow, characteristic to the non-Markovianity, is cap…
▽ More
We experimentally emulate, in a controlled fashion, the non-Markovian dynamics of a pure dephasing spin-boson model at zero temperature. Specifically, we use a randomized set of external radio-frequency fields to engineer a desired noise power-spectrum to effectively realize a non-Markovian environment for a single NMR qubit. The information backflow, characteristic to the non-Markovianity, is captured in the nonmonotonicity of the decoherence function and von Neumann entropy of the system. Using such emulated non-Markovian environments, we experimentally study the efficiency of the Carr-Purcell-Meiboom-Gill dynamical decoupling (DD) sequence to inhibit the loss of coherence. Using the filter function formalism, we design optimized DD sequences that maximize coherence protection for non-Markovian environments and study their efficiencies experimentally. Finally, we discuss DD-assisted tuning of the effective non-Markovianity.
△ Less
Submitted 14 February, 2019; v1 submitted 28 May, 2018;
originally announced May 2018.
-
Characterizations of almost greedy and partially greedy bases
Authors:
S. J. Dilworth,
Divya Khurana
Abstract:
We shall present new characterizations of partially greedy and almost greedy bases. A new class of basis (which we call reverse partially greedy basis) arises naturally from these characterizations of partially greedy bases. We also give characterizations for $1$-partially greedy and $1$-reverse partially greedy bases.
We shall present new characterizations of partially greedy and almost greedy bases. A new class of basis (which we call reverse partially greedy basis) arises naturally from these characterizations of partially greedy bases. We also give characterizations for $1$-partially greedy and $1$-reverse partially greedy bases.
△ Less
Submitted 17 May, 2018;
originally announced May 2018.
-
Natural Language Processing: State of The Art, Current Trends and Challenges
Authors:
Diksha Khurana,
Aditya Koli,
Kiran Khatter,
Sukhdev Singh
Abstract:
Natural language processing (NLP) has recently gained much attention for representing and analysing human language computationally. It has spread its applications in various fields such as machine translation, email spam detection, information extraction, summarization, medical, and question answering etc. The paper distinguishes four phases by discussing different levels of NLP and components of…
▽ More
Natural language processing (NLP) has recently gained much attention for representing and analysing human language computationally. It has spread its applications in various fields such as machine translation, email spam detection, information extraction, summarization, medical, and question answering etc. The paper distinguishes four phases by discussing different levels of NLP and components of Natural Language Generation (NLG) followed by presenting the history and evolution of NLP, state of the art presenting the various applications of NLP and current trends and challenges.
△ Less
Submitted 17 August, 2017;
originally announced August 2017.
-
Bang-Bang Optimal Control of Large Spin Systems: Enhancement of $^{13}$C-$^{13}$C Singlet-Order at Natural Abundance
Authors:
Deepak Khurana,
T. S. Mahesh
Abstract:
Using a Bang-Bang optimal control (BB) technique, we transfer polarization from abundant high-$γ$ nuclei directly to singlet order. This approach is analogous to algorithmic cooling (AC) procedure used in quantum state purification. Specifically, we apply this method for enhancing the singlet order in a natural abundant $^{13}$C-$^{13}$C spin pair using a set of nine equivalent protons of an 11-sp…
▽ More
Using a Bang-Bang optimal control (BB) technique, we transfer polarization from abundant high-$γ$ nuclei directly to singlet order. This approach is analogous to algorithmic cooling (AC) procedure used in quantum state purification. Specifically, we apply this method for enhancing the singlet order in a natural abundant $^{13}$C-$^{13}$C spin pair using a set of nine equivalent protons of an 11-spin system. Compared to the standard method not involving polarization transfer, we find an enhancement of singlet order by about three times. In addition, since the singlet magnetization is contributed by the faster relaxing protons, the recycle delay is halved. Thus effectively we observe a sensitivity enhancement by 4.2 times or a reduction in the overall experimental time by a factor of 18. We also discuss a possible extension of AC, known as heat-bath algorithmic cooling (HBAC).
△ Less
Submitted 30 June, 2017; v1 submitted 8 June, 2017;
originally announced June 2017.
-
Strong Algorithmic Cooling in Large Star-Topology Quantum Registers
Authors:
Varad R. Pande,
Gaurav Bhole,
Deepak Khurana,
T. S. Mahesh
Abstract:
Cooling the qubit into a pure initial state is crucial for realizing fault-tolerant quantum information processing. Here we envisage a star-topology arrangement of reset and computation qubits for this purpose. The reset qubits cool or purify the computation qubit by transferring its entropy to a heat-bath with the help of a heat-bath algorithmic cooling procedure. By combining standard NMR method…
▽ More
Cooling the qubit into a pure initial state is crucial for realizing fault-tolerant quantum information processing. Here we envisage a star-topology arrangement of reset and computation qubits for this purpose. The reset qubits cool or purify the computation qubit by transferring its entropy to a heat-bath with the help of a heat-bath algorithmic cooling procedure. By combining standard NMR methods with powerful quantum control techniques, we cool central qubits of two large star topology systems, with 13 and 37 spins respectively. We obtain polarization enhancements by a factor of over 24, and an associated reduction in the spin temperature from 298 K down to 12 K. Exploiting the enhanced polarization of computation qubit, we prepare combination-coherences of orders up to 15. By benchmarking the decay of these coherences we investigate the underlying noise process. Further, we also cool a pair of computation qubits and subsequently prepare them in an effective pure-state.
△ Less
Submitted 30 July, 2017; v1 submitted 16 February, 2017;
originally announced February 2017.
-
Spectral investigation of the noise influencing multi-qubit states
Authors:
Deepak Khurana,
Govind Unnikrishnan,
T. S. Mahesh
Abstract:
Characterizing and understanding noise affecting quantum states has immense benefits in spectroscopy as well as in realizing quantum devices. Transverse relaxation times under a set of dynamical decoupling (DD) sequences with varying interpulse delays were earlier used for obtaining the noise spectral densities of single-qubit coherences. In this work, using a pair of homonuclear spins and NMR tec…
▽ More
Characterizing and understanding noise affecting quantum states has immense benefits in spectroscopy as well as in realizing quantum devices. Transverse relaxation times under a set of dynamical decoupling (DD) sequences with varying interpulse delays were earlier used for obtaining the noise spectral densities of single-qubit coherences. In this work, using a pair of homonuclear spins and NMR techniques, we experimentally characterize noise in certain decoherence-free subspaces. We also explore the noise of similar states in a heteronuclear spin pair. Further, using a 10-qubit system, we investigate noise profiles of various multiqubit coherences and study the scaling of noise with respect to the coherence order. Finally, using the experimentally obtained noise spectrum of the 10-qubit NOON state, we predict the performance of a Uhrig DD sequence and verify it experimentally.
△ Less
Submitted 4 January, 2017; v1 submitted 15 August, 2016;
originally announced August 2016.
-
Unit-Regularity of Regular Nilpotent Elements
Authors:
Dinesh Khurana
Abstract:
Let $a$ be a regular element of a ring $R$. If either $K:=\rm{r}_R(a)$ has the exchange property or every power of $a$ is regular, then we prove that for every positive integer $n$ there exist decompositions $$ R_R = K \oplus X_n \oplus Y_n = E_n \oplus X_n \oplus aY_n,$$ where $Y_n \subseteq a^nR$ and $E_n \cong R/aR$. As applications we get easier proofs of the results that a strongly $π$-regula…
▽ More
Let $a$ be a regular element of a ring $R$. If either $K:=\rm{r}_R(a)$ has the exchange property or every power of $a$ is regular, then we prove that for every positive integer $n$ there exist decompositions $$ R_R = K \oplus X_n \oplus Y_n = E_n \oplus X_n \oplus aY_n,$$ where $Y_n \subseteq a^nR$ and $E_n \cong R/aR$. As applications we get easier proofs of the results that a strongly $π$-regular ring has stable range one and also that a strongly $π$-regular element whose every power is regular is unit-regular.
△ Less
Submitted 23 December, 2015; v1 submitted 26 September, 2015;
originally announced September 2015.
-
The Galactic Magnetic Field and UHECR Optics
Authors:
Glennys R. Farrar,
Nafiun Awal,
Deepak Khurana,
Michael Sutherland
Abstract:
A good model of the Galactic magnetic field is crucial for estimating the Galactic contribution in dark matter and CMB-cosmology studies, determining the sources of UHECRs, and also modeling the transport of Galactic CRs since the halo field provides an important escape route for by diffusion along its field lines. We briefly review the observational foundations of the Jansson-Farrar 2012 model fo…
▽ More
A good model of the Galactic magnetic field is crucial for estimating the Galactic contribution in dark matter and CMB-cosmology studies, determining the sources of UHECRs, and also modeling the transport of Galactic CRs since the halo field provides an important escape route for by diffusion along its field lines. We briefly review the observational foundations of the Jansson-Farrar 2012 model for the large scale structure of the GMF, underscoring the robust evidence for a N-to-S directed, spiraling halo field. New results on the lensing effect of the GMF on UHECRs are presented, displaying multiple images and dramatic magnification and demagnification that varies with source direction and CR rigidity.
△ Less
Submitted 19 August, 2015;
originally announced August 2015.
-
Ordinal Indices of small subspaces of $L_p$
Authors:
S. Dutta,
D. Khurana
Abstract:
We calculate ordinal $L_p$ index defined in "An ordinal L_p index for Banach spaces with an application to complemented subspaces of L_p" authored by J. Bourgain, H. P. Rosenthal and G. Schechtman, for Rosenthal's space $X_p$, $\ell_p$ and $\ell_2$. We show a subspace of $L_p$ $(2 < p < \infty)$ non isomorphic to $\ell_2$ embeds in $\ell_p$ if and only if its ordinal index is minimum possible. We…
▽ More
We calculate ordinal $L_p$ index defined in "An ordinal L_p index for Banach spaces with an application to complemented subspaces of L_p" authored by J. Bourgain, H. P. Rosenthal and G. Schechtman, for Rosenthal's space $X_p$, $\ell_p$ and $\ell_2$. We show a subspace of $L_p$ $(2 < p < \infty)$ non isomorphic to $\ell_2$ embeds in $\ell_p$ if and only if its ordinal index is minimum possible. We also give a sufficient condition for a $\mathcal{L}_p$ subspace of $\ell_p\oplus\ell_2$ to be isomorphic to $X_p$.
△ Less
Submitted 1 February, 2015; v1 submitted 8 September, 2014;
originally announced September 2014.
-
Ordinal indices for complemented subspaces of l_p
Authors:
S. Dutta,
D. Khurana
Abstract:
We provide complete isomorphic invariance of a class of translation invariant complemented subspaces of L_p constructed by Bourgain, Rosenthal and Schechtman. We compute ordinal L_p-indices for this class. We further show that the isometric index of a tree subspace over a well founded tree is an invariance for the order of the tree. Finally we provide a dichotomy for the subspaces of L_p with smal…
▽ More
We provide complete isomorphic invariance of a class of translation invariant complemented subspaces of L_p constructed by Bourgain, Rosenthal and Schechtman. We compute ordinal L_p-indices for this class. We further show that the isometric index of a tree subspace over a well founded tree is an invariance for the order of the tree. Finally we provide a dichotomy for the subspaces of L_p with small ordinal indices.
△ Less
Submitted 10 October, 2014; v1 submitted 18 May, 2014;
originally announced May 2014.
-
A quantum-trace determinantal formula for matrix commutators, and applications
Authors:
Dinesh Khurana,
T. Y. Lam,
Noam Shomron
Abstract:
In this paper, we establish a determinantal formula for 2 x 2 matrix commutators [X,Y] = XY - YX over a commutative ring, using (among other invariants) the quantum traces of X and Y. Special forms of this determinantal formula include a "trace version", and a "supertrace version". Some applications of these formulas are given to the study of value sets of binary quadratic forms, the factorizat…
▽ More
In this paper, we establish a determinantal formula for 2 x 2 matrix commutators [X,Y] = XY - YX over a commutative ring, using (among other invariants) the quantum traces of X and Y. Special forms of this determinantal formula include a "trace version", and a "supertrace version". Some applications of these formulas are given to the study of value sets of binary quadratic forms, the factorization of 2 x 2 integral matrices, and the solution of certain simultaneous diophantine equations over commutative rings.
△ Less
Submitted 29 March, 2010;
originally announced March 2010.
-
Searching for Galactic White Dwarf Binaries in Mock LISA Data using an F-Statistic Template Bank
Authors:
John T. Whelan,
Reinhard Prix,
Deepak Khurana
Abstract:
We describe an F-statistic search for continuous gravitational waves from galactic white-dwarf binaries in simulated LISA Data. Our search method employs a hierarchical template-grid based exploration of the parameter space. In the first stage, candidate sources are identified in searches using different simulated laser signal combinations (known as TDI variables). Since each source generates a…
▽ More
We describe an F-statistic search for continuous gravitational waves from galactic white-dwarf binaries in simulated LISA Data. Our search method employs a hierarchical template-grid based exploration of the parameter space. In the first stage, candidate sources are identified in searches using different simulated laser signal combinations (known as TDI variables). Since each source generates a primary maximum near its true "Doppler parameters" (intrinsic frequency and sky position) as well as numerous secondary maxima of the F-statistic in Doppler parameter space, a search for multiple sources needs to distinguish between true signals and secondary maxima associated with other, "louder" signals. Our method does this by applying a coincidence test to reject candidates which are not found at nearby parameter space positions in searches using each of the three TDI variables. For signals surviving the coincidence test, we perform a fully coherent search over a refined parameter grid to provide an accurate parameter estimation for the final candidates. Suitably tuned, the pipeline is able to extract 1989 true signals with only 5 false alarms. The use of the rigid adiabatic approximation allows recovery of signal parameters with errors comparable to statistical expectations, although there is still some systematic excess with respect to statistical errors expected from Gaussian noise. An experimental iterative pipeline with seven rounds of signal subtraction and re-analysis of the residuals allows us to increase the number of signals recovered to a total of 3419 with 29 false alarms.
△ Less
Submitted 7 January, 2010; v1 submitted 26 August, 2009;
originally announced August 2009.
-
A short proof of Grinshpon's theorem
Authors:
Dinesh Khurana
Abstract:
Grinshpon has proved that if $S$ is a commutative subring of a ring $R$ and $A\in M_n(S)$ is invertible in $M_n(R)$, then $det(A)$ is invertible in $R$. We give a very short proof of the result.
Grinshpon has proved that if $S$ is a commutative subring of a ring $R$ and $A\in M_n(S)$ is invertible in $M_n(R)$, then $det(A)$ is invertible in $R$. We give a very short proof of the result.
△ Less
Submitted 6 April, 2009;
originally announced April 2009.
-
Group Rings that are Additively Generated by Idempotents and Units
Authors:
Dinesh Khurana,
Chanchal Kumar
Abstract:
We study clean group rings and also the group rings whose every element is a sum of two units. We also prove that if R is an Abelian exchange ring and G is a locally finite group, then the group ring RG has stable range one.
We study clean group rings and also the group rings whose every element is a sum of two units. We also prove that if R is an Abelian exchange ring and G is a locally finite group, then the group ring RG has stable range one.
△ Less
Submitted 6 April, 2009;
originally announced April 2009.
-
The Mock LISA Data Challenges: from Challenge 1B to Challenge 3
Authors:
Stanislav Babak,
John G. Baker,
Matthew J. Benacquista,
Neil J. Cornish,
Jeff Crowder,
Shane L. Larson,
Eric Plagnol,
Edward K. Porter,
Michele Vallisneri,
Alberto Vecchio,
Keith Arnaud,
Leor Barack,
Arkadiusz Błaut,
Curt Cutler,
Stephen Fairhurst,
Jonathan Gair,
Xuefei Gong,
Ian Harry,
Deepak Khurana,
Andrzej Królak,
Ilya Mandel,
Reinhard Prix,
B. S. Sathyaprakash,
Pavlin Savov,
Yu Shang
, et al. (5 additional authors not shown)
Abstract:
The Mock LISA Data Challenges are a programme to demonstrate and encourage the development of LISA data-analysis capabilities, tools and techniques. At the time of this workshop, three rounds of challenges had been completed, and the next was about to start. In this article we provide a critical analysis of entries to the latest completed round, Challenge 1B. The entries confirm the consolidatio…
▽ More
The Mock LISA Data Challenges are a programme to demonstrate and encourage the development of LISA data-analysis capabilities, tools and techniques. At the time of this workshop, three rounds of challenges had been completed, and the next was about to start. In this article we provide a critical analysis of entries to the latest completed round, Challenge 1B. The entries confirm the consolidation of a range of data-analysis techniques for Galactic and massive--black-hole binaries, and they include the first convincing examples of detection and parameter estimation of extreme--mass-ratio inspiral sources. In this article we also introduce the next round, Challenge 3. Its data sets feature more realistic waveform models (e.g., Galactic binaries may now chirp, and massive--black-hole binaries may precess due to spin interactions), as well as new source classes (bursts from cosmic strings, isotropic stochastic backgrounds) and more complicated nonsymmetric instrument noise.
△ Less
Submitted 15 April, 2009; v1 submitted 12 June, 2008;
originally announced June 2008.
-
Improved search for galactic white dwarf binaries in Mock LISA Data Challenge 1B using an F-statistic template bank
Authors:
John T. Whelan,
Reinhard Prix,
Deepak Khurana
Abstract:
We report on our F-statistic search for white-dwarf binary signals in the Mock LISA Data Challenge 1B (MLDC1B). We focus in particular on the improvements in our search pipeline since MLDC1, namely refinements in the search pipeline and the use of a more accurate detector response (rigid adiabatic approximation). The search method employs a hierarchical template-grid based exploration of the par…
▽ More
We report on our F-statistic search for white-dwarf binary signals in the Mock LISA Data Challenge 1B (MLDC1B). We focus in particular on the improvements in our search pipeline since MLDC1, namely refinements in the search pipeline and the use of a more accurate detector response (rigid adiabatic approximation). The search method employs a hierarchical template-grid based exploration of the parameter space, using a coincidence step to distinguish between primary (``true'') and secondary maxima, followed by a final (multi-TDI) ``zoom'' stage to provide an accurate parameter estimation of the final candidates.
△ Less
Submitted 27 June, 2008; v1 submitted 14 May, 2008;
originally announced May 2008.
-
Some Characterizations of VNL Rings
Authors:
Harpreet K. Grover,
Dinesh Khurana
Abstract:
A ring R is said to be VNL if for any a in R, either a or 1-a is (von Neumann) regular. The class of VNL rings lies properly between the exchange rings and (von Neumann) regular rings. We characterize abelian VNL rings. We also characterize and classify arbitrary VNL rings without infinite set of orthogonal idempotents; and also the VNL rings having primitive idempotent e such that eRe is not a…
▽ More
A ring R is said to be VNL if for any a in R, either a or 1-a is (von Neumann) regular. The class of VNL rings lies properly between the exchange rings and (von Neumann) regular rings. We characterize abelian VNL rings. We also characterize and classify arbitrary VNL rings without infinite set of orthogonal idempotents; and also the VNL rings having primitive idempotent e such that eRe is not a division ring. We prove that a semiperfect ring R is VNL if and only if for any right uni-modular row (a, b) in R^2, one of the a or b is regular in R. Formal triangular matrix rings that are VNL, are also characterized. As a corollary it is shown that an upper triangular matrix ring T_n(R) is VNL if and only if n=2 or 3 and R is a division ring.
△ Less
Submitted 16 January, 2008;
originally announced January 2008.
-
Black Hole Mergers and Unstable Circular Orbits
Authors:
Frans Pretorius,
Deepak Khurana
Abstract:
We describe recent numerical simulations of the merger of a class of equal mass, non-spinning, eccentric binary black hole systems in general relativity. We show that with appropriate fine-tuning of the initial conditions to a region of parameter space we denote the threshold of immediate merger, the binary enters a phase of close interaction in a near-circular orbit, stays there for an amount o…
▽ More
We describe recent numerical simulations of the merger of a class of equal mass, non-spinning, eccentric binary black hole systems in general relativity. We show that with appropriate fine-tuning of the initial conditions to a region of parameter space we denote the threshold of immediate merger, the binary enters a phase of close interaction in a near-circular orbit, stays there for an amount of time proportional to logarithmic distance from the threshold in parameter space, then either separates or merges to form a single Kerr black hole. To gain a better understanding of this phenomena we study an analogous problem in the evolution of equatorial geodesics about a central Kerr black hole. A similar threshold of capture exists for appropriate classes of initial conditions, and tuning to threshold the geodesics approach one of the unstable circular geodesics of the Kerr spacetime. Remarkably, with a natural map** of the parameters of the geodesic to that of the equal mass system, the scaling exponent describing the whirl phase of each system turns out to be quite similar. Armed with this lone piece of evidence that an approximate correspondence might exist between near-threshold evolution of geodesics and generic binary mergers, we illustrate how this information can be used to estimate the cross section and energy emitted in the ultra relativistic black hole scattering problem. This could eventually be of use in providing estimates for the related problem of parton collisions at the Large Hadron Collider in extra dimension scenarios where black holes are produced.
△ Less
Submitted 21 June, 2007; v1 submitted 14 February, 2007;
originally announced February 2007.