Skip to main content

Showing 1–20 of 20 results for author: Paterson, M B

.
  1. arXiv:2406.16805  [pdf, ps, other

    math.NT math.CO

    Beyond uniform cyclotomy

    Authors: Sophie Huczynska, Laura Johnson, Maura B. Paterson

    Abstract: Cyclotomy, the study of cyclotomic classes and cyclotomic numbers, is an area of number theory first studied by Gauss. It has natural applications in discrete mathematics and information theory. Despite this long history, there are significant limitations to what is known explicitly about cyclotomic numbers, which limits the use of cyclotomy in applications. The main explicit tool available is tha… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    MSC Class: 11T22; 05B10

  2. arXiv:2406.09075  [pdf, ps, other

    math.CO

    Strong External Difference Families and Classification of $α$-valuations

    Authors: Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson

    Abstract: One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    MSC Class: 05B10; 05C78

  3. arXiv:2310.02810  [pdf, ps, other

    math.CO cs.CR

    Circular external difference families, graceful labellings and cyclotomy

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: (Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products… ▽ More

    Submitted 27 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

    MSC Class: 05B10; 94A60; 05C78; 11T22

  4. arXiv:2104.11076  [pdf, ps, other

    cs.CR math.CO

    Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authenticati… ▽ More

    Submitted 24 August, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

    MSC Class: 94A62; 05B05; 05B10

  5. arXiv:1910.05572  [pdf, ps, other

    cs.CR math.CO

    On the equivalence of authentication codes and robust (2,2)-threshold schemes

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution att… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    MSC Class: 94A62; 05B05; 05B10

  6. arXiv:1903.11620  [pdf, ps, other

    math.CO

    Characterising bimodal collections of sets in finite groups

    Authors: Sophie Huczynska, Maura B. Paterson

    Abstract: A collection of disjoint subsets ${\cal A}=\{A_1,A_2,\dotsc,A_m\}$ of a finite abelian group is said to have the \emph{bimodal} property if, for any non-zero group element $δ$, either $δ$ never occurs as a difference between an element of $A_i$ and an element of some other set $A_j$, or else for every element $a_i$ in $A_i$ there is an element $a_j\in A_j$ for some $j\neq i$ such that $a_i-a_j=δ$.… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

  7. arXiv:1809.08138  [pdf, ps, other

    cs.DM

    Functional repair codes: a view from projective geometry

    Authors: Siaw-Lynn Ng, Maura B. Paterson

    Abstract: Storage codes are used to ensure reliable storage of data in distributed systems. Here we consider functional repair codes, where individual storage nodes that fail may be repaired efficiently and the ability to recover original data and to further repair failed nodes is preserved. There are two predominant approaches to repair codes: a coding theoretic approach and a vector space approach. We exp… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  8. arXiv:1805.01330  [pdf, ps, other

    math.CO

    Weighted external difference families and R-optimal AMD codes

    Authors: Sophie Huczynska, Maura B. Paterson

    Abstract: In this paper, we provide a mathematical framework for characterizing AMD codes that are R-optimal. We introduce a new combinatorial object, the reciprocally-weighted external difference family (RWEDF), which corresponds precisely to an R-optimal weak AMD code. This definition subsumes known examples of existing optimal codes, and also encompasses combinatorial objects not covered by previous defi… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

  9. arXiv:1611.05652  [pdf, other

    math.CO

    Existence and Non-Existence Results for Strong External Difference Families

    Authors: Sophie Huczynska, Maura B. Paterson

    Abstract: We consider strong external difference families (SEDFs); these are external difference families satisfying additional conditions on the patterns of external diferences that occur, and were first defined in the context of classifying optimal strong algebraic manipulation detection codes. We establish new necessary conditions for the existence of (n; m; k; lambda)-SEDFs; in particular giving a near-… ▽ More

    Submitted 17 November, 2016; originally announced November 2016.

  10. arXiv:1609.07027  [pdf, ps, other

    cs.IT cs.CR

    PIR schemes with small download complexity and low storage requirements

    Authors: Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson

    Abstract: In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there… ▽ More

    Submitted 4 December, 2018; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: 30 pages. Minor updates and corrections throughout, with updated bibliography

    MSC Class: 94A60

  11. arXiv:1603.02671  [pdf, other

    cs.CR

    Multi-prover Proof-of-Retrievability

    Authors: Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay

    Abstract: There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w… ▽ More

    Submitted 8 March, 2016; originally announced March 2016.

    Comments: 22 pages

  12. arXiv:1509.05255  [pdf, ps, other

    cs.DM math.CO

    Disjoint difference families and their applications

    Authors: S. -L. Ng, M. B. Paterson

    Abstract: Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families and the variations in priorities in constructions. We propose a definition of disjoint difference families that encompasses these variations and al… ▽ More

    Submitted 22 October, 2015; v1 submitted 17 September, 2015; originally announced September 2015.

  13. arXiv:1506.02711  [pdf, ps, other

    math.CO cs.CR

    Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

  14. arXiv:1403.1468  [pdf, ps, other

    cs.CR math.CO

    Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of th… ▽ More

    Submitted 6 March, 2014; originally announced March 2014.

  15. arXiv:1210.7756  [pdf, ps, other

    cs.CR math.CO

    A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

    Authors: Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay

    Abstract: There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w… ▽ More

    Submitted 29 October, 2012; originally announced October 2012.

  16. arXiv:1001.3850  [pdf, ps, other

    math.CO

    Yet Another Hat Game

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: Several different "hat games" have recently received a fair amount of attention. Typically, in a hat game, one or more players are required to correctly guess their hat colour when given some information about other players' hat colours. Some versions of these games have been motivated by research in complexity theory and have ties to well-known research problems in coding theory, and some varia… ▽ More

    Submitted 21 January, 2010; originally announced January 2010.

    Comments: 13 pages

    MSC Class: 05B99

  17. arXiv:0911.2384  [pdf, other

    math.CO

    Honeycomb arrays

    Authors: Simon R. Blackburn, Anastasia Panoui, Maura B. Paterson, Douglas R. Stinson

    Abstract: A honeycomb array is an analogue of a Costas array in the hexagonal grid; they were first studied by Golomb and Taylor in 1984. A recent result of Blackburn, Etzion, Martin and Paterson has shown that (in contrast to the situation for Costas arrays) there are only finitely many examples of honeycomb arrays, though their bound on the maximal size of a honeycomb array is too large to permit an exh… ▽ More

    Submitted 12 November, 2009; originally announced November 2009.

    Comments: 12 pages, 11 figures

    MSC Class: 05B10; 94C30

  18. arXiv:0910.4325  [pdf, ps, other

    cs.DM

    Putting Dots in Triangles

    Authors: Simon R. Blackburn, Maura B. Paterson, Douglas R. Stinson

    Abstract: Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that $N(n) = \lfloor \frac{2n+1}{3} \rfloor$. In this no… ▽ More

    Submitted 18 May, 2010; v1 submitted 22 October, 2009; originally announced October 2009.

    Comments: 10 pages Minor rephrasing: final version to submit to journal.

  19. arXiv:0811.3896  [pdf, ps, other

    math.CO

    Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks

    Authors: Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson

    Abstract: A distinct difference configuration is a set of points in $\mathbb{Z}^2$ with the property that the vectors (\emph{difference vectors}) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example. Motivated by an applic… ▽ More

    Submitted 8 October, 2009; v1 submitted 24 November, 2008; originally announced November 2008.

    Comments: 11 pages More application information added; biographies added

    MSC Class: 68R05; 94A60; 11B75; 05B30

  20. arXiv:0811.3832  [pdf, ps, other

    math.CO

    Two-Dimensional Patterns with Distinct Differences -- Constructions, Bounds, and Maximal Anticodes

    Authors: Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson

    Abstract: A two-dimensional grid with dots is called a \emph{configuration with distinct differences} if any two lines which connect two dots are distinct either in their length or in their slope. These configurations are known to have many applications such as radar, sonar, physical alignment, and time-position synchronization. Rather than restricting dots to lie in a square or rectangle, as previously s… ▽ More

    Submitted 8 October, 2009; v1 submitted 24 November, 2008; originally announced November 2008.

    Comments: 14 pages Changed definition of honeycomb array; biographies added

    MSC Class: 68R05; 94A60; 05B30