Spacetime Structure of Regular Accelerating Black Hole Pair in General Relativity
Authors:
M. M. Akbar,
C. P. Brewer,
S. M. Modumudi
Abstract:
We revisit the one-parameter generalization of the C-metric derived by Ernst, which solves the vacuum Einstein equations. Resolving conflicting claims in the literature, we determine the correct value of the parameter that ensures the regularity of the metric on the axis. This "regularized C-metric" describes a pair of accelerating black holes without the line source present in the original C-metr…
▽ More
We revisit the one-parameter generalization of the C-metric derived by Ernst, which solves the vacuum Einstein equations. Resolving conflicting claims in the literature, we determine the correct value of the parameter that ensures the regularity of the metric on the axis. This "regularized C-metric" describes a pair of accelerating black holes without the line source present in the original C-metric. Additionally, this generalization changes the Petrov type from D to I. We use the Gauss-Bonnet theorem to analyze the nodal singularities, the line source, and their relation to the horizon topology. Both the black hole and acceleration horizons are found to be embeddable in $\mathrm{E}^3$. We examine various geometric and asymptotic properties in detail using several coordinate systems and construct the corresponding 2D and 3D conformal diagrams. This process is more involved than for the original C-metric due to the presence of the exponential factors. These exponential factors also introduce curvature singularities at infinity, which obstructs asymptotic flatness. Contrary to Bonnor's expectation, we demonstrate why Bondi's algorithm for obtaining the standard Bondi form fails for the C-metric, despite its asymptotic flatness. We also show that Ernst's solution-generating prescription in boost-rotation symmetric coordinates is a symmetry of the wave equation.
△ Less
Submitted 17 March, 2025;
originally announced March 2025.
Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online
Authors:
Steven Adler,
Zoë Hitzig,
Shrey Jain,
Catherine Brewer,
Wayne Chang,
Renée DiResta,
Eddy Lazzarin,
Sean McGregor,
Wendy Seltzer,
Divya Siddarth,
Nouran Soliman,
Tobin South,
Connor Spelliscy,
Manu Sporny,
Varya Srivastava,
John Bailey,
Brian Christian,
Andrew Critch,
Ronnie Falcon,
Heather Flanagan,
Kim Hamilton Duffy,
Eric Ho,
Claire R. Leibowicz,
Srikanth Nadhamuni,
Alan Z. Rozenshtein
, et al. (7 additional authors not shown)
Abstract:
Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In this p…
▽ More
Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In this paper, we analyze the value of a new tool to address this challenge: "personhood credentials" (PHCs), digital credentials that empower users to demonstrate that they are real people -- not AIs -- to online services, without disclosing any personal information. Such credentials can be issued by a range of trusted institutions -- governments or otherwise. A PHC system, according to our definition, could be local or global, and does not need to be biometrics-based. Two trends in AI contribute to the urgency of the challenge: AI's increasing indistinguishability from people online (i.e., lifelike content and avatars, agentic activity), and AI's increasing scalability (i.e., cost-effectiveness, accessibility). Drawing on a long history of research into anonymous credentials and "proof-of-personhood" systems, personhood credentials give people a way to signal their trustworthiness on online platforms, and offer service providers new tools for reducing misuse by bad actors. In contrast, existing countermeasures to automated deception -- such as CAPTCHAs -- are inadequate against sophisticated AI, while stringent identity verification solutions are insufficiently private for many use-cases. After surveying the benefits of personhood credentials, we also examine deployment risks and design challenges. We conclude with actionable next steps for policymakers, technologists, and standards bodies to consider in consultation with the public.
△ Less
Submitted 17 January, 2025; v1 submitted 14 August, 2024;
originally announced August 2024.
On the Existence of Word-representable Line Graphs of Non-word-representable Graphs
Authors:
M M Akbar,
P D Akrobotu,
C P Brewer
Abstract:
An open question in the theory of word-representable graphs for the past decade has been whether the line graph of a non-word-representable graph is always non-word-representable. By formulating an appropriate optimization problem for the decision problem of 3-semi-transitive graphs, we show that the line graph of a non-word-representable graph can be word-representable. Using IBM's CPLEX solver,…
▽ More
An open question in the theory of word-representable graphs for the past decade has been whether the line graph of a non-word-representable graph is always non-word-representable. By formulating an appropriate optimization problem for the decision problem of 3-semi-transitive graphs, we show that the line graph of a non-word-representable graph can be word-representable. Using IBM's CPLEX solver, we demonstrate for several known word-representable and non-word-representable graphs that the line graph of a graph is 3-semi-transitive when there is a solution to the optimization problem. This results in an example where the line graph of a non-word-representable graph is both 3-semi-transitive and semi-transitive and thus is word-representable.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.