-
Rényi entropy of single-character CFTs on the torus
Authors:
Luis Alberto León Andonayre,
Rahul Poddar
Abstract:
We introduce a non-perturbative approach to calculate the Rényi entropy of a single interval on the torus for single-character (meromorphic) conformal field theories. Our prescription uses the Wrońskian method of Mathur, Mukhi and Sen, in which we construct differential equations for torus conformal blocks of the twist two-point function. As an illustrative example, we provide a detailed calculati…
▽ More
We introduce a non-perturbative approach to calculate the Rényi entropy of a single interval on the torus for single-character (meromorphic) conformal field theories. Our prescription uses the Wrońskian method of Mathur, Mukhi and Sen, in which we construct differential equations for torus conformal blocks of the twist two-point function. As an illustrative example, we provide a detailed calculation of the second Rényi entropy for the $\rm E_{8,1}$ WZW model. We find that the $\mathbb Z_2$ cyclic orbifold of a meromorphic CFT results in a four-character CFT which realizes the toric code modular tensor category. We show that the $\mathbb Z_2$ cyclic orbifold of the $\rm E_{8,1}$ WZW model yields a three-character CFT since two of the characters coincide. We find that the second Rényi entropy for the $\rm E_{8,1}$ WZW model has the universal logarithmic divergent behaviour in the decompactification limit of the torus as expected. Furthermore, we see that the $q$-expansion is UV finite, apart from the leading universal logarithmic divergence.
△ Less
Submitted 17 December, 2024; v1 submitted 29 November, 2024;
originally announced December 2024.
-
On The Triviality Of $m$-Modified Conformal Vector Fields
Authors:
Rahul Poddar,
Ramesh Sharma
Abstract:
We prove that a compact Riemannian manifold $M$ does not admit any non-trivial $m$-modified homothetic vector fields. In the corresponding case of an $m$-modified conformal vector field $V$, we establish an inequality that implies the triviality of $V$. Further, we demonstrate that an affine Killing $m$-modified conformal vector field on a non-compact Riemannian manifold $M$ must be trivial. Final…
▽ More
We prove that a compact Riemannian manifold $M$ does not admit any non-trivial $m$-modified homothetic vector fields. In the corresponding case of an $m$-modified conformal vector field $V$, we establish an inequality that implies the triviality of $V$. Further, we demonstrate that an affine Killing $m$-modified conformal vector field on a non-compact Riemannian manifold $M$ must be trivial. Finally, we show that an $m$-modified gradient conformal vector field is trivial under the assumptions of polynomial volume growth and convergence to zero at infinity.
△ Less
Submitted 11 September, 2024;
originally announced September 2024.
-
Extended Solitons of the Ambient Obstruction Flow
Authors:
Erin Griffin,
Rahul Poddar,
Ramesh Sharma,
William Wylie
Abstract:
In this paper we expand on the work of the first author on ambient obstruction solitons, which are self-similar solutions to the ambient obstruction flow. Our main result is to show that any closed ambient obstruction soliton is ambient obstruction flat and has constant scalar curvature. We show, in fact, that the first part of this result is true for a more general extended soliton equation where…
▽ More
In this paper we expand on the work of the first author on ambient obstruction solitons, which are self-similar solutions to the ambient obstruction flow. Our main result is to show that any closed ambient obstruction soliton is ambient obstruction flat and has constant scalar curvature. We show, in fact, that the first part of this result is true for a more general extended soliton equation where we allow an arbitrary conformal factor to be added to the equation. We discuss how this implies that, on a compact manifold, the ambient obstruction flow has no fixed points up to conformal diffeomorphism other than ambient obstruction flat metrics. These results are the consequence of a general integral inequality that can be applied to the solitons to any geometric flow. Additionally, we use these results to obtain a generalization of the Bourguignon-Ezin identity on a closed Riemannian manifold and study the converse problem on a closed extended $q$-soliton. We also study this extended equation further in the case of homogeneous and product metrics.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
A generalized Selberg zeta function for flat space cosmologies
Authors:
Arjun Bagchi,
Cynthia Keeler,
Victoria Martin,
Rahul Poddar
Abstract:
Flat space cosmologies (FSCs) are time dependent solutions of three-dimensional (3D) gravity with a vanishing cosmological constant. They can be constructed from a discrete quotient of empty 3D flat spacetime and are also called shifted-boost orbifolds. Using this quotient structure, we build a new and generalized Selberg zeta function for FSCs, and show that it is directly related to the scalar 1…
▽ More
Flat space cosmologies (FSCs) are time dependent solutions of three-dimensional (3D) gravity with a vanishing cosmological constant. They can be constructed from a discrete quotient of empty 3D flat spacetime and are also called shifted-boost orbifolds. Using this quotient structure, we build a new and generalized Selberg zeta function for FSCs, and show that it is directly related to the scalar 1-loop partition function. We then propose an extension of this formalism applicable to more general quotient manifolds $\mathcal M/\mathbb Z$, based on representation theory of fields propagating on this background. Our prescription constitutes a novel and expedient method for calculating regularized 1-loop determinants, without resorting to the heat kernel. We compute quasinormal modes in the FSC using the zeroes of a Selberg zeta function, and match them to known results.
△ Less
Submitted 1 April, 2024; v1 submitted 11 December, 2023;
originally announced December 2023.
-
$T \overline T$-Deformations of Holographic Warped CFTs
Authors:
Rahul Poddar
Abstract:
We explore $T \overline T$ deformations of Warped Conformal Field Theories (WCFTs) in two dimensions as examples of $T\overline T$ deformed non-relativistic quantum field theories. WCFTs are quantum field theories with a Virasoro$\times$U(1) Kac-Moody symmetry. We compute the deformed symmetry algebra of a $T\overline T$ deformed holographic WCFT, using the asymptotic symmetries of AdS$_3$ with…
▽ More
We explore $T \overline T$ deformations of Warped Conformal Field Theories (WCFTs) in two dimensions as examples of $T\overline T$ deformed non-relativistic quantum field theories. WCFTs are quantum field theories with a Virasoro$\times$U(1) Kac-Moody symmetry. We compute the deformed symmetry algebra of a $T\overline T$ deformed holographic WCFT, using the asymptotic symmetries of AdS$_3$ with $T \overline T$ deformed Compére, Song and Strominger (CSS) boundary conditions. The U(1) Kac-Moody symmetry survives provided one allows the boundary metric to transform under the asymptotic symmetry. The Virasoro sector remains but is now deformed and no longer chiral.
△ Less
Submitted 20 September, 2023; v1 submitted 24 May, 2023;
originally announced May 2023.
-
A Selberg zeta function for warped AdS$_3$ black holes
Authors:
Victoria L. Martin,
Rahul Poddar,
Agla Þórarinsdóttir
Abstract:
The Selberg zeta function and trace formula are powerful tools used to calculate kinetic operator spectra and quasinormal modes on hyperbolic quotient spacetimes. In this article, we extend this formalism to non-hyperbolic quotients by constructing a Selberg zeta function for warped AdS$_3$ black holes. We also consider the so-called self-dual solutions, which are of interest in connection to near…
▽ More
The Selberg zeta function and trace formula are powerful tools used to calculate kinetic operator spectra and quasinormal modes on hyperbolic quotient spacetimes. In this article, we extend this formalism to non-hyperbolic quotients by constructing a Selberg zeta function for warped AdS$_3$ black holes. We also consider the so-called self-dual solutions, which are of interest in connection to near-horizon extremal Kerr. We establish a map between the zeta function zeroes and the quasinormal modes on warped AdS$_3$ black hole backgrounds. In the process, we use a method involving conformal coordinates and the symmetry structure of the scalar Laplacian to construct a warped version of the hyperbolic half-space metric, which to our knowledge is new and may have interesting applications of its own, which we describe. We end by discussing several future directions for this work, such as computing 1-loop determinants (which govern quantum corrections) on the quotient spacetimes we consider, as well as adapting the formalism presented here to more generic orbifolds.
△ Less
Submitted 30 November, 2022; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Universal Correlators and Novel Cosets in 2d RCFT
Authors:
Sunil Mukhi,
Rahul Poddar
Abstract:
The two-character level-1 WZW models corresponding to Lie algebras in the Cvitanović-Deligne series $A_1,A_2,G_2,D_4,F_4,E_6,E_7$ have been argued to form coset pairs with respect to the meromorphic $E_{8,1}$ CFT. Evidence for this has taken the form of holomorphic bilinear relations between the characters. We propose that suitable 4-point functions of primaries in these models also obey bilinear…
▽ More
The two-character level-1 WZW models corresponding to Lie algebras in the Cvitanović-Deligne series $A_1,A_2,G_2,D_4,F_4,E_6,E_7$ have been argued to form coset pairs with respect to the meromorphic $E_{8,1}$ CFT. Evidence for this has taken the form of holomorphic bilinear relations between the characters. We propose that suitable 4-point functions of primaries in these models also obey bilinear relations that combine them into current correlators for $E_{8,1}$, and provide strong evidence that these relations hold in each case. Different cases work out due to special identities involving tensor invariants of the algebra or hypergeometric functions. In particular these results verify previous calculations of correlators for exceptional WZW models, which have rather subtle features. We also find evidence that the intermediate vertex operator algebras A$_{0.5}$ and E$_{7.5}$, as well as the three-character A$_{4,1}$ theory, also appear to satisfy the novel coset relation.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Authors:
Rishabh Poddar,
Sukrit Kalra,
Avishay Yanai,
Ryan Deng,
Raluca Ada Popa,
Joseph M. Hellerstein
Abstract:
Many organizations stand to benefit from pooling their data together in order to draw mutually beneficial insights -- e.g., for fraud detection across banks, better medical studies across hospitals, etc. However, such organizations are often prevented from sharing their data with each other by privacy concerns, regulatory hurdles, or business competition. We present Senate, a system that allows mu…
▽ More
Many organizations stand to benefit from pooling their data together in order to draw mutually beneficial insights -- e.g., for fraud detection across banks, better medical studies across hospitals, etc. However, such organizations are often prevented from sharing their data with each other by privacy concerns, regulatory hurdles, or business competition. We present Senate, a system that allows multiple parties to collaboratively run analytical SQL queries without revealing their individual data to each other. Unlike prior works on secure multi-party computation (MPC) that assume that all parties are semi-honest, Senate protects the data even in the presence of malicious adversaries. At the heart of Senate lies a new MPC decomposition protocol that decomposes the cryptographic MPC computation into smaller units, some of which can be executed by subsets of parties and in parallel, while preserving its security guarantees. Senate then provides a new query planning algorithm that decomposes and plans the cryptographic computation effectively, achieving a performance of up to 145$\times$ faster than the state-of-the-art.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Secure Collaborative Training and Inference for XGBoost
Authors:
Andrew Law,
Chester Leung,
Rishabh Poddar,
Raluca Ada Popa,
Chenyu Shi,
Octavian Sima,
Chaofan Yu,
Xingmeng Zhang,
Wenting Zheng
Abstract:
In recent years, gradient boosted decision tree learning has proven to be an effective method of training robust models. Moreover, collaborative learning among multiple parties has the potential to greatly benefit all parties involved, but organizations have also encountered obstacles in sharing sensitive data due to business, regulatory, and liability concerns.
We propose Secure XGBoost, a priv…
▽ More
In recent years, gradient boosted decision tree learning has proven to be an effective method of training robust models. Moreover, collaborative learning among multiple parties has the potential to greatly benefit all parties involved, but organizations have also encountered obstacles in sharing sensitive data due to business, regulatory, and liability concerns.
We propose Secure XGBoost, a privacy-preserving system that enables multiparty training and inference of XGBoost models. Secure XGBoost protects the privacy of each party's data as well as the integrity of the computation with the help of hardware enclaves. Crucially, Secure XGBoost augments the security of the enclaves using novel data-oblivious algorithms that prevent access side-channel attacks on enclaves induced via access pattern leakage.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Practical Volume-Based Attacks on Encrypted Databases
Authors:
Rishabh Poddar,
Stephanie Wang,
Jianan Lu,
Raluca Ada Popa
Abstract:
Recent years have seen an increased interest towards strong security primitives for encrypted databases (such as oblivious protocols), that hide the access patterns of query execution, and reveal only the volume of results. However, recent work has shown that even volume leakage can enable the reconstruction of entire columns in the database. Yet, existing attacks rely on a set of assumptions that…
▽ More
Recent years have seen an increased interest towards strong security primitives for encrypted databases (such as oblivious protocols), that hide the access patterns of query execution, and reveal only the volume of results. However, recent work has shown that even volume leakage can enable the reconstruction of entire columns in the database. Yet, existing attacks rely on a set of assumptions that are unrealistic in practice: for example, they (i) require a large number of queries to be issued by the user, or (ii) assume certain distributions on the queries or underlying data (e.g., that the queries are distributed uniformly at random, or that the database does not contain missing values).
In this work, we present new attacks for recovering the content of individual user queries, assuming no leakage from the system except the number of results and avoiding the limiting assumptions above. Unlike prior attacks, our attacks require only a single query to be issued by the user for recovering the keyword. Furthermore, our attacks make no assumptions about the distribution of issued queries or the underlying data. Instead, our key insight is to exploit the behavior of real-world applications.
We start by surveying 11 applications to identify two key characteristics that can be exploited by attackers: (i) file injection, and (ii) automatic query replay. We present attacks that leverage these two properties in concert with volume leakage, independent of the details of any encrypted database system. Subsequently, we perform an attack on the real Gmail web client by simulating a server-side adversary. Our attack on Gmail completes within a matter of minutes, demonstrating the feasibility of our techniques. We also present three ancillary attacks for situations when certain mitigation strategies are employed.
△ Less
Submitted 14 August, 2020;
originally announced August 2020.
-
Visor: Privacy-Preserving Video Analytics as a Cloud Service
Authors:
Rishabh Poddar,
Ganesh Ananthanarayanan,
Srinath Setty,
Stavros Volos,
Raluca Ada Popa
Abstract:
Video-analytics-as-a-service is becoming an important offering for cloud providers. A key concern in such services is privacy of the videos being analyzed. While trusted execution environments (TEEs) are promising options for preventing the direct leakage of private video content, they remain vulnerable to side-channel attacks.
We present Visor, a system that provides confidentiality for the use…
▽ More
Video-analytics-as-a-service is becoming an important offering for cloud providers. A key concern in such services is privacy of the videos being analyzed. While trusted execution environments (TEEs) are promising options for preventing the direct leakage of private video content, they remain vulnerable to side-channel attacks.
We present Visor, a system that provides confidentiality for the user's video stream as well as the ML models in the presence of a compromised cloud platform and untrusted co-tenants. Visor executes video pipelines in a hybrid TEE that spans both the CPU and GPU. It protects the pipeline against side-channel attacks induced by data-dependent access patterns of video modules, and also addresses leakage in the CPU-GPU communication channel. Visor is up to $1000\times$ faster than naïve oblivious solutions, and its overheads relative to a non-oblivious baseline are limited to $2\times$--$6\times$.
△ Less
Submitted 23 June, 2020; v1 submitted 16 June, 2020;
originally announced June 2020.
-
Rational CFT With Three Characters: The Quasi-Character Approach
Authors:
Sunil Mukhi,
Rahul Poddar,
Palash Singh
Abstract:
Quasi-characters are vector-valued modular functions having an integral, but not necessarily positive, q-expansion. Using modular differential equations, a complete classification has been provided in arXiv:1810.09472 for the case of two characters. These in turn generate all possible admissible characters, of arbitrary Wronskian index, in order two. Here we initiate a study of the three-character…
▽ More
Quasi-characters are vector-valued modular functions having an integral, but not necessarily positive, q-expansion. Using modular differential equations, a complete classification has been provided in arXiv:1810.09472 for the case of two characters. These in turn generate all possible admissible characters, of arbitrary Wronskian index, in order two. Here we initiate a study of the three-character case. We conjecture several infinite families of quasi-characters and show in examples that their linear combinations an generate admissible characters with arbitrarily large Wronskian index. The structure is completely different from the order two case, and the novel coset construction of arXiv:1602.01022 plays a key role in discovering the appropriate families. Using even unimodular lattices, we construct some explicit three-character CFT corresponding to the new admissible characters.
△ Less
Submitted 1 May, 2020; v1 submitted 5 February, 2020;
originally announced February 2020.
-
Contour Integrals and the Modular S-Matrix
Authors:
Sunil Mukhi,
Rahul Poddar,
Palash Singh
Abstract:
We investigate a conjecture to describe the characters of large families of RCFT's in terms of contour integrals of Feigin-Fuchs type. We provide a simple algorithm to determine the modular S-matrix for arbitrary numbers of characters as a sum over paths. Thereafter we focus on the case of 2, 3 and 4 characters, where agreement between the critical exponents of the integrals and the characters imp…
▽ More
We investigate a conjecture to describe the characters of large families of RCFT's in terms of contour integrals of Feigin-Fuchs type. We provide a simple algorithm to determine the modular S-matrix for arbitrary numbers of characters as a sum over paths. Thereafter we focus on the case of 2, 3 and 4 characters, where agreement between the critical exponents of the integrals and the characters implies that the conjecture is true. In these cases, we compute the modular S-matrix explicitly, verify that it agrees with expectations for known theories, and use it to compute degeneracies and multiplicities of primaries. We also compute S in an 8-character example to provide additional evidence for the original conjecture. On the way we note that the Verlinde formula provides interesting constraints on the critical exponents of RCFT in this context.
△ Less
Submitted 9 December, 2019;
originally announced December 2019.
-
Non-Invasive Glucose Monitoring Techniques: A review and current trends
Authors:
Raju Poddar,
Joseph Thomas Andrews,
Pratyoosh Shukla,
Pratima Sen
Abstract:
Diabetes mellitus is a complex group of syndromes that have in common a disturbance in the body's use of glucose, resulting in an elevated blood sugar. Once detected, sugar diabetes can be controlled by an appropriate regimen that should include diet therapy, a weight reduction program for those persons who are overweight, a program of exercise and insulin injections or oral drugs to lower blood…
▽ More
Diabetes mellitus is a complex group of syndromes that have in common a disturbance in the body's use of glucose, resulting in an elevated blood sugar. Once detected, sugar diabetes can be controlled by an appropriate regimen that should include diet therapy, a weight reduction program for those persons who are overweight, a program of exercise and insulin injections or oral drugs to lower blood glucose. Blood glucose monitoring by the patient and the physician is an important aspect in the control of the devastating complications (heart disease, blindness, kidney failure or amputations) due to the disease. Intensive therapy and frequent glucose testing has numerous benefits. With ever improving advances in diagnostic technology, the race for the next generation of bloodless, painless, accurate glucose instruments has begun. In this paper, we reviewed various methods, techniques and approaches successfully demonstrated for measuring or monitoring blood glucose. Invasive, minimally invasive and noninvasive techniques available in literature are summarised.
△ Less
Submitted 31 October, 2008;
originally announced October 2008.
-
Study of Correlation Between Glucose Concentration and Reduced Scattering Coefficients in Turbid media using Optical Coherence Tomography
Authors:
R Poddar,
S R Sharma,
P Sen,
J T Andrews
Abstract:
Noninvasive, non-contact and \textit{in vivo} monitoring of blood glucose is a long needed pathology tool for saving patients from recurring pain and hassle that can accompany conventional blood glucose testing methods. Optical coherence tomography known for its high axial resolution imaging modality is adopted in this article for monitoring glucose levels in tissue like media non-invasively. Ma…
▽ More
Noninvasive, non-contact and \textit{in vivo} monitoring of blood glucose is a long needed pathology tool for saving patients from recurring pain and hassle that can accompany conventional blood glucose testing methods. Optical coherence tomography known for its high axial resolution imaging modality is adopted in this article for monitoring glucose levels in tissue like media non-invasively. Making use of changes in reduced scattering coefficient due to the refractive-index mismatch between the extracellular fluid and the cellular membranes and armed with a theoretical model, we establish a correlation between the glucose concentration and reduced scattering coefficient. The scattering coefficients are extracted from the deconvoluted interference signal by using Monte-Carlo simulation with valid approximations. A program code using NI LabVIEW(^{TM}) is developed for automation of the experiment, data acquisition and analysis.
△ Less
Submitted 1 August, 2008;
originally announced August 2008.