-
Subquadratic-Time Algorithms for Normal Bases
Authors:
Mark Giesbrecht,
Armin Jamshidpey,
Éric Schost
Abstract:
For any finite Galois field extension $\mathsf{K}/\mathsf{F}$, with Galois group $G = \mathrm{Gal}(\mathsf{K}/\mathsf{F})$, there exists an element $α\in \mathsf{K}$ whose orbit $G\cdotα$ forms an $\mathsf{F}$-basis of $\mathsf{K}$. Such a $α$ is called a normal element and $G\cdotα$ is a normal basis. We introduce a probabilistic algorithm for testing whether a given $α\in \mathsf{K}$ is normal,…
▽ More
For any finite Galois field extension $\mathsf{K}/\mathsf{F}$, with Galois group $G = \mathrm{Gal}(\mathsf{K}/\mathsf{F})$, there exists an element $α\in \mathsf{K}$ whose orbit $G\cdotα$ forms an $\mathsf{F}$-basis of $\mathsf{K}$. Such a $α$ is called a normal element and $G\cdotα$ is a normal basis. We introduce a probabilistic algorithm for testing whether a given $α\in \mathsf{K}$ is normal, when $G$ is either a finite abelian or a metacyclic group. The algorithm is based on the fact that deciding whether $α$ is normal can be reduced to deciding whether $\sum_{g \in G} g(α)g \in \mathsf{K}[G]$ is invertible; it requires a slightly subquadratic number of operations. Once we know that $α$ is normal, we show how to perform conversions between the power basis of $\mathsf{K}/\mathsf{F}$ and the normal basis with the same asymptotic cost.
△ Less
Submitted 23 December, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
Quadratic Probabilistic Algorithms for Normal Bases
Authors:
Mark Giesbrecht,
Armin Jamshidpey,
Éric Schost
Abstract:
It is well known that for any finite Galois extension field $K/F$, with Galois group $G = \mathrm{Gal}(K/F)$, there exists an element $α\in K$ whose orbit $G\cdotα$ forms an $F$-basis of $K$. Such an element $α$ is called \emph{normal} and $G\cdotα$ is called a normal basis. In this paper we introduce a probabilistic algorithm for finding a normal element when $G$ is either a finite abelian or a m…
▽ More
It is well known that for any finite Galois extension field $K/F$, with Galois group $G = \mathrm{Gal}(K/F)$, there exists an element $α\in K$ whose orbit $G\cdotα$ forms an $F$-basis of $K$. Such an element $α$ is called \emph{normal} and $G\cdotα$ is called a normal basis. In this paper we introduce a probabilistic algorithm for finding a normal element when $G$ is either a finite abelian or a metacyclic group. The algorithm is based on the fact that deciding whether a random element $α\in K$ is normal can be reduced to deciding whether $\sum_{σ\in G} σ(α)σ\in K[G]$ is invertible. In an algebraic model, the cost of our algorithm is quadratic in the size of $G$ for metacyclic $G$ and slightly subquadratic for abelian $G$.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
Task Allocation in Robotic Swarms: Explicit Communication Based Approaches
Authors:
Aryo Jamshidpey,
Mohsen Afsharchi
Abstract:
In this paper we study multi robot cooperative task allocation issue in a situation where a swarm of robots is deployed in a confined unknown environment where the number of colored spots which represent tasks and the ratios of them are unknown. The robots should cover this spots as far as possible to do cleaning and sampling actions desirably. It means that they should discover the spots cooperat…
▽ More
In this paper we study multi robot cooperative task allocation issue in a situation where a swarm of robots is deployed in a confined unknown environment where the number of colored spots which represent tasks and the ratios of them are unknown. The robots should cover this spots as far as possible to do cleaning and sampling actions desirably. It means that they should discover the spots cooperatively and spread proportional to the spots area and avoid from remaining idle. We proposed 4 self-organized distributed methods which are called hybrid methods for co** with this scenario. In two different experiments the performance of the methods is analyzed. We compared them with each other and investigated their scalability and robustness in term of single point of failure.
△ Less
Submitted 1 March, 2015;
originally announced March 2015.
-
An Introduction to Digital Signature Schemes
Authors:
Mehran Alidoost Nia,
Ali Sajedi,
Aryo Jamshidpey
Abstract:
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on. In this paper, different types of schemes are compared based on s…
▽ More
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on. In this paper, different types of schemes are compared based on security level, efficiency, difficulty of algorithm and so on. Results show that best scheme depends on security, complexity and other important parameters. We tried simply to define the schemes and review them in practice.
△ Less
Submitted 10 April, 2014;
originally announced April 2014.