-
Beyond uniform cyclotomy
Authors:
Sophie Huczynska,
Laura Johnson,
Maura B. Paterson
Abstract:
Cyclotomy, the study of cyclotomic classes and cyclotomic numbers, is an area of number theory first studied by Gauss. It has natural applications in discrete mathematics and information theory. Despite this long history, there are significant limitations to what is known explicitly about cyclotomic numbers, which limits the use of cyclotomy in applications. The main explicit tool available is tha…
▽ More
Cyclotomy, the study of cyclotomic classes and cyclotomic numbers, is an area of number theory first studied by Gauss. It has natural applications in discrete mathematics and information theory. Despite this long history, there are significant limitations to what is known explicitly about cyclotomic numbers, which limits the use of cyclotomy in applications. The main explicit tool available is that of uniform cyclotomy, introduced by Baumert, Mills and Ward in 1982. In this paper, we present an extension of uniform cyclotomy which gives a direct method for evaluating all cyclotomic numbers over $GF(q^n)$ of order dividing $(q^n-1)/(q-1)$, for any prime power $q$ and $n \geq 2$, which does not use character theory nor direct calculation in the field. This allows the straightforward evaluation of many cyclotomic numbers for which other methods are unknown or impractical. Our methods exploit connections between cyclotomy, Singer difference sets and finite geometry.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Strong External Difference Families and Classification of $α$-valuations
Authors:
Donald L. Kreher,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all…
▽ More
One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all $(a^2+1, 2,a, 1)$-SEDFs in $\mathbb{Z}_{a^2+1}$ for $a \leq 14$ and we show that all these SEDFs are equivalent to $α$-valuations via affine transformations. Whether this holds for all $a > 14$ as well is an interesting open problem. We also study SEDFs in dihedral groups, where we show that two known constructions are equivalent.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Circular external difference families, graceful labellings and cyclotomy
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
(Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products…
▽ More
(Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products $C_n \boldsymbol{\cdot} K_{\ell}^c$, where $C_n$ denotes a cycle of length $n$. SCEDFs having more than two subsets do not exist. However, we can construct close approximations (more specifically, certain types of circular algebraic manipulation detection (AMD) codes) using the theory of cyclotomic numbers in finite fields.
△ Less
Submitted 27 October, 2023; v1 submitted 4 October, 2023;
originally announced October 2023.
-
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authenticati…
▽ More
A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authentication code. We show that all group-generated authentication codes have perfect secrecy, which allows us to demonstrate that algebraic manipulation detection codes can be considered to be a special case of an authentication code with perfect secrecy.
We also investigate splitting BIBDs that can be "equitably ordered". These splitting BIBDs yield authentication codes with splitting that also have perfect secrecy. We show that, while group generated BIBDs are inherently equitably ordered, the concept is applicable to more general splitting BIBDs. For various pairs $(k,c)$, we determine necessary and sufficient (or almost sufficient) conditions for the existence of $(v, k \times c,1)$-splitting BIBDs that can be equitably ordered. The pairs for which we can solve this problem are $(k,c) = (3,2), (4,2), (3,3)$ and $(3,4)$, as well as all cases with $k = 2$.
△ Less
Submitted 24 August, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution att…
▽ More
In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution attack." We study this attack and analyze it in the setting of "dual authentication codes." We also show how this viewpoint provides a nice way to prove properties and generalizations of some known constructions.
△ Less
Submitted 12 October, 2019;
originally announced October 2019.
-
Characterising bimodal collections of sets in finite groups
Authors:
Sophie Huczynska,
Maura B. Paterson
Abstract:
A collection of disjoint subsets ${\cal A}=\{A_1,A_2,\dotsc,A_m\}$ of a finite abelian group is said to have the \emph{bimodal} property if, for any non-zero group element $δ$, either $δ$ never occurs as a difference between an element of $A_i$ and an element of some other set $A_j$, or else for every element $a_i$ in $A_i$ there is an element $a_j\in A_j$ for some $j\neq i$ such that $a_i-a_j=δ$.…
▽ More
A collection of disjoint subsets ${\cal A}=\{A_1,A_2,\dotsc,A_m\}$ of a finite abelian group is said to have the \emph{bimodal} property if, for any non-zero group element $δ$, either $δ$ never occurs as a difference between an element of $A_i$ and an element of some other set $A_j$, or else for every element $a_i$ in $A_i$ there is an element $a_j\in A_j$ for some $j\neq i$ such that $a_i-a_j=δ$. This property arises in various familiar situations, such as the cosets of a fixed subgroup or in a group partition, and has applications to the construction of optimal algebraic manipulation detection (AMD) codes. In this paper, we obtain a structural characterisation for bimodal collections of sets.
△ Less
Submitted 27 March, 2019;
originally announced March 2019.
-
Functional repair codes: a view from projective geometry
Authors:
Siaw-Lynn Ng,
Maura B. Paterson
Abstract:
Storage codes are used to ensure reliable storage of data in distributed systems. Here we consider functional repair codes, where individual storage nodes that fail may be repaired efficiently and the ability to recover original data and to further repair failed nodes is preserved. There are two predominant approaches to repair codes: a coding theoretic approach and a vector space approach. We exp…
▽ More
Storage codes are used to ensure reliable storage of data in distributed systems. Here we consider functional repair codes, where individual storage nodes that fail may be repaired efficiently and the ability to recover original data and to further repair failed nodes is preserved. There are two predominant approaches to repair codes: a coding theoretic approach and a vector space approach. We explore the relationship between the two and frame the later in terms of projective geometry. We find that many of the constructions proposed in the literature can be seen to arise from natural and well-studied geometric objects, and that this perspective gives a framework that provides opportunities for generalisations and new constructions that can lead to greater flexibility in trade-offs between various desirable properties. We also frame the cut-set bound obtained from network coding in terms of projective geometry. We explore the notion of strictly functional repair codes, for which there exist nodes that cannot be replaced exactly. Currently only one known example is given in the literature, due to Hollmann and Poh. We examine this phenomenon from a projective geometry point of view, and discuss how strict functionality can arise. Finally, we consider the issue that the view of a repair code as a collection of sets of vector/projective subspaces is recursive in nature and makes it hard to visualise what a collection of nodes looks like and how one might approach a construction. Here we provide another view of using directed graphs that gives us non-recursive criteria for determining whether a family of collections of subspaces constitutes a function, exact, or strictly functional repair code, which may be of use in searching for new codes with desirable properties.
△ Less
Submitted 21 September, 2018;
originally announced September 2018.
-
Weighted external difference families and R-optimal AMD codes
Authors:
Sophie Huczynska,
Maura B. Paterson
Abstract:
In this paper, we provide a mathematical framework for characterizing AMD codes that are R-optimal. We introduce a new combinatorial object, the reciprocally-weighted external difference family (RWEDF), which corresponds precisely to an R-optimal weak AMD code. This definition subsumes known examples of existing optimal codes, and also encompasses combinatorial objects not covered by previous defi…
▽ More
In this paper, we provide a mathematical framework for characterizing AMD codes that are R-optimal. We introduce a new combinatorial object, the reciprocally-weighted external difference family (RWEDF), which corresponds precisely to an R-optimal weak AMD code. This definition subsumes known examples of existing optimal codes, and also encompasses combinatorial objects not covered by previous definitions in the literature. By develo** structural group-theoretic characterizations, we exhibit infinite families of new RWEDFs, and new construction methods for known objects such as near-complete EDFs. Examples of RWEDFs in non-abelian groups are also discussed.
△ Less
Submitted 3 May, 2018;
originally announced May 2018.
-
Existence and Non-Existence Results for Strong External Difference Families
Authors:
Sophie Huczynska,
Maura B. Paterson
Abstract:
We consider strong external difference families (SEDFs); these are external difference families satisfying additional conditions on the patterns of external diferences that occur, and were first defined in the context of classifying optimal strong algebraic manipulation detection codes. We establish new necessary conditions for the existence of (n; m; k; lambda)-SEDFs; in particular giving a near-…
▽ More
We consider strong external difference families (SEDFs); these are external difference families satisfying additional conditions on the patterns of external diferences that occur, and were first defined in the context of classifying optimal strong algebraic manipulation detection codes. We establish new necessary conditions for the existence of (n; m; k; lambda)-SEDFs; in particular giving a near-complete treatment of the lambda = 2 case. For the case m = 2, we obtain a structural characterization for partition type SEDFs (of maximum possible k and lambda), showing that these correspond to Paley partial difference sets. We also prove a version of our main result for generalized SEDFs, establishing non-trivial necessary conditions for their existence.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
PIR schemes with small download complexity and low storage requirements
Authors:
Simon R. Blackburn,
Tuvi Etzion,
Maura B. Paterson
Abstract:
In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there…
▽ More
In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there have been moves to consider more realistic models where the total storage of the set of servers, or the per server storage, should be minimised (possibly using techniques from distributed storage), and where the database is divided into $R$-bit records with $R>1$, and the user wishes to retrieve one record rather than one bit. When $R$ is large, downloads from the servers to the user dominate the communication complexity and so the aim is to minimise the total number of downloaded bits. Shah, Rashmi and Ramchandran show that at least $R+1$ bits must be downloaded from servers in the worst case, and provide PIR schemes meeting this bound. Sun and Jafar determine the best asymptotic download cost of a PIR scheme (as $R\rightarrow\infty$), where this cost is defined as the ratio of the message length $R$ and the total number of bits downloaded.
This paper provides various bounds on the download complexity of a PIR scheme, generalising those of Shah et al. to the case when the number $n$ of servers is bounded, and providing links with classical techniques due to Chor et al. The paper also provides a range of constructions for PIR schemes that are either simpler or perform better than previously known schemes, including explicit schemes that achieve the best asymptotic download complexity of Sun and Jafar with significantly lower upload complexity, and general techniques for constructing a scheme with good worst case download complexity from a scheme with good download complexity on average.
△ Less
Submitted 4 December, 2018; v1 submitted 22 September, 2016;
originally announced September 2016.
-
Multi-prover Proof-of-Retrievability
Authors:
Maura B. Paterson,
Douglas R. Stinson,
Jalaj Upadhyay
Abstract:
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w…
▽ More
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover the file given any "proving algorithm" that has a sufficiently high success probability. This forms the basis of \emph{proof-of-retrievability} ($\mathsf{PoR}$) systems.
In this paper, we study multiple server $\mathsf{PoR}$ systems. We formalize security definitions for two possible scenarios: (i) when a threshold of servers succeed with high enough probability (worst-case) and (ii) when the average of the success probability of all the servers is above a threshold (average-case). We also motivate the study of confidentiality of the outsourced message. We give $\mathsf{M}\mbox{-}\mathsf{PoR}$ schemes which are secure under both these security definitions and provide reasonable confidentiality guarantees even when there is no restriction on the computational power of the servers. We also show how classical statistical techniques used by Paterson, Stinson and Upadhyay (Journal of Mathematical Cryptology: 7(3)) can be extended to evaluate whether the responses of the provers are accurate enough to permit successful extraction. We also look at one specific instantiation of our construction when instantiated with the unconditionally secure version of the Shacham-Waters scheme (Asiacrypt, 2008). This scheme gives reasonable security and privacy guarantee. We show that, in the multi-server setting with computationally unbounded provers, one can overcome the limitation that the verifier needs to store as much secret information as the provers.
△ Less
Submitted 8 March, 2016;
originally announced March 2016.
-
Disjoint difference families and their applications
Authors:
S. -L. Ng,
M. B. Paterson
Abstract:
Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families and the variations in priorities in constructions. We propose a definition of disjoint difference families that encompasses these variations and al…
▽ More
Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families and the variations in priorities in constructions. We propose a definition of disjoint difference families that encompasses these variations and allows a comparison of the similarities and disparities. We then focus on two constructions of disjoint difference families arising from frequency hop** sequences and showed that they are in fact the same. We conclude with a discussion of the notion of equivalence for frequency hop** sequences and for disjoint difference families.
△ Less
Submitted 22 October, 2015; v1 submitted 17 September, 2015;
originally announced September 2015.
-
Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is…
▽ More
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is an interesting problem in its own right.
△ Less
Submitted 8 June, 2015;
originally announced June 2015.
-
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of th…
▽ More
We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of this type to be secure. We also consider the problem of minimizing the storage requirements of such a scheme; we are interested in the total storage as well as the maximum storage required by any user. Minimizing the total storage is NP-hard, whereas minimizing the maximum storage required by a user can be computed in polynomial time.
△ Less
Submitted 6 March, 2014;
originally announced March 2014.
-
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Authors:
Maura B. Paterson,
Douglas R. Stinson,
Jalaj Upadhyay
Abstract:
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w…
▽ More
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any "proving algorithm" that has a sufficiently high success probability.
This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes.
△ Less
Submitted 29 October, 2012;
originally announced October 2012.
-
Yet Another Hat Game
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
Several different "hat games" have recently received a fair amount of attention. Typically, in a hat game, one or more players are required to correctly guess their hat colour when given some information about other players' hat colours. Some versions of these games have been motivated by research in complexity theory and have ties to well-known research problems in coding theory, and some varia…
▽ More
Several different "hat games" have recently received a fair amount of attention. Typically, in a hat game, one or more players are required to correctly guess their hat colour when given some information about other players' hat colours. Some versions of these games have been motivated by research in complexity theory and have ties to well-known research problems in coding theory, and some variations have led to interesting new research.
In this paper, we review Ebert's Hat Game, which garnered a considerable amount of publicity in the late 90's and early 00's, and the Hats-on-a-line Game. Then we introduce a new hat game which is a "hybrid" of these two games and provide an optimal strategy for playing the new game. The optimal strategy is quite simple, but the proof involves an interesting combinatorial argument.
△ Less
Submitted 21 January, 2010;
originally announced January 2010.
-
Honeycomb arrays
Authors:
Simon R. Blackburn,
Anastasia Panoui,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
A honeycomb array is an analogue of a Costas array in the hexagonal grid; they were first studied by Golomb and Taylor in 1984. A recent result of Blackburn, Etzion, Martin and Paterson has shown that (in contrast to the situation for Costas arrays) there are only finitely many examples of honeycomb arrays, though their bound on the maximal size of a honeycomb array is too large to permit an exh…
▽ More
A honeycomb array is an analogue of a Costas array in the hexagonal grid; they were first studied by Golomb and Taylor in 1984. A recent result of Blackburn, Etzion, Martin and Paterson has shown that (in contrast to the situation for Costas arrays) there are only finitely many examples of honeycomb arrays, though their bound on the maximal size of a honeycomb array is too large to permit an exhaustive search over all possibilities.
The present paper contains a theorem that significantly limits the number of possibilities for a honeycomb array (in particular, the theorem implies that the number of dots in a honeycomb array must be odd). Computer searches for honeycomb arrays are summarised, and two new examples of honeycomb arrays with 15 dots are given.
△ Less
Submitted 12 November, 2009;
originally announced November 2009.
-
Putting Dots in Triangles
Authors:
Simon R. Blackburn,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that
$N(n) = \lfloor \frac{2n+1}{3} \rfloor$.
In this no…
▽ More
Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that
$N(n) = \lfloor \frac{2n+1}{3} \rfloor$.
In this note, we give a new proof of this result using linear programming techniques.
△ Less
Submitted 18 May, 2010; v1 submitted 22 October, 2009;
originally announced October 2009.
-
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
Authors:
Simon R. Blackburn,
Tuvi Etzion,
Keith M. Martin,
Maura B. Paterson
Abstract:
A distinct difference configuration is a set of points in $\mathbb{Z}^2$ with the property that the vectors (\emph{difference vectors}) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example.
Motivated by an applic…
▽ More
A distinct difference configuration is a set of points in $\mathbb{Z}^2$ with the property that the vectors (\emph{difference vectors}) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example.
Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the $k$-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of $k$ or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the $k$-hop coverage of a distinct difference configuration with $m$ points, and exploit a connection with $B_{h}$ sequences to construct configurations with maximal $k$-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.
△ Less
Submitted 8 October, 2009; v1 submitted 24 November, 2008;
originally announced November 2008.
-
Two-Dimensional Patterns with Distinct Differences -- Constructions, Bounds, and Maximal Anticodes
Authors:
Simon R. Blackburn,
Tuvi Etzion,
Keith M. Martin,
Maura B. Paterson
Abstract:
A two-dimensional grid with dots is called a \emph{configuration with distinct differences} if any two lines which connect two dots are distinct either in their length or in their slope. These configurations are known to have many applications such as radar, sonar, physical alignment, and time-position synchronization. Rather than restricting dots to lie in a square or rectangle, as previously s…
▽ More
A two-dimensional grid with dots is called a \emph{configuration with distinct differences} if any two lines which connect two dots are distinct either in their length or in their slope. These configurations are known to have many applications such as radar, sonar, physical alignment, and time-position synchronization. Rather than restricting dots to lie in a square or rectangle, as previously studied, we restrict the maximum distance between dots of the configuration; the motivation for this is a new application of such configurations to key distribution in wireless sensor networks. We consider configurations in the hexagonal grid as well as in the traditional square grid, with distances measured both in the Euclidean metric, and in the Manhattan or hexagonal metrics.
We note that these configurations are confined inside maximal anticodes in the corresponding grid. We classify maximal anticodes for each diameter in each grid. We present upper bounds on the number of dots in a pattern with distinct differences contained in these maximal anticodes. Our bounds settle (in the negative) a question of Golomb and Taylor on the existence of honeycomb arrays of arbitrarily large size. We present constructions and lower bounds on the number of dots in configurations with distinct differences contained in various two-dimensional shapes (such as anticodes) by considering periodic configurations with distinct differences in the square grid.
△ Less
Submitted 8 October, 2009; v1 submitted 24 November, 2008;
originally announced November 2008.