Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim while providing no further information beyond the claim itself. The possibility of using such proofs to process classified and other sensitive physical data has attracted attention, especially in the field of nuclear arms control. Here we demonstrate a non-electronic fast neutron differential radiography technique using superheated emulsion detectors that can confirm that two objects are identical without revealing their geometry or composition. Such a technique could form the basis of a verification system that could confirm the authenticity of nuclear weapons without sharing any secret design information. More broadly, by demonstrating a ph...
This electronic version was submitted by the student author. The certified thesis is available in th...
Noninvasive material discrimination of an arbitrary object is applicable to a wide range of fields, ...
Classical sensor security relies on cryptographic algorithms executed on trusted hardware. This appr...
Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim ...
Future nuclear arms control agreements seeking reductions to both deployed and stockpiled nuclear wa...
This electronic version was submitted by the student author. The certified thesis is available in th...
Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential t...
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealin...
Arms control treaties are necessary to reduce the large stockpiles of the nuclear weapons that const...
Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential t...
Non-intrusive verification procedures by measuring nuclear radiation in situ are discussed. Radiatio...
Thesis: S.M., Massachusetts Institute of Technology, Department of Nuclear Science and Engineering, ...
In recent years, neutron detection with superheated emulsions has received renewed attention thanks ...
Material specific information from objects in absconditus for warhead dismantlement verification A ...
Measurements of the geometric configuration of objects and their material composition are needed for...
This electronic version was submitted by the student author. The certified thesis is available in th...
Noninvasive material discrimination of an arbitrary object is applicable to a wide range of fields, ...
Classical sensor security relies on cryptographic algorithms executed on trusted hardware. This appr...
Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim ...
Future nuclear arms control agreements seeking reductions to both deployed and stockpiled nuclear wa...
This electronic version was submitted by the student author. The certified thesis is available in th...
Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential t...
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealin...
Arms control treaties are necessary to reduce the large stockpiles of the nuclear weapons that const...
Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential t...
Non-intrusive verification procedures by measuring nuclear radiation in situ are discussed. Radiatio...
Thesis: S.M., Massachusetts Institute of Technology, Department of Nuclear Science and Engineering, ...
In recent years, neutron detection with superheated emulsions has received renewed attention thanks ...
Material specific information from objects in absconditus for warhead dismantlement verification A ...
Measurements of the geometric configuration of objects and their material composition are needed for...
This electronic version was submitted by the student author. The certified thesis is available in th...
Noninvasive material discrimination of an arbitrary object is applicable to a wide range of fields, ...
Classical sensor security relies on cryptographic algorithms executed on trusted hardware. This appr...