-
Existence results for pentagonal geometries
Authors:
Anthony D. Forbes,
Terry S. Griggs,
Klara Stokes
Abstract:
New results on pentagonal geometries PENT(k,r) with block sizes k = 3 or k = 4 are given. In particular we completely determine the existence spectra for PENT(3,r) systems with the maximum number of opposite line pairs as well as those without any opposite line pairs. A wide-ranging result about PENT(3,r) with any number of opposite line pairs is proved. We also determine the existence spectrum of…
▽ More
New results on pentagonal geometries PENT(k,r) with block sizes k = 3 or k = 4 are given. In particular we completely determine the existence spectra for PENT(3,r) systems with the maximum number of opposite line pairs as well as those without any opposite line pairs. A wide-ranging result about PENT(3,r) with any number of opposite line pairs is proved. We also determine the existence spectrum of PENT(4,r) systems with eleven possible exceptions.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Geometric decoding of subspace codes with explicit Schubert calculus applied to spread codes
Authors:
Klara Stokes
Abstract:
This article is about a decoding algorithm for error-correcting subspace codes. A version of this algorithm was previously described by Rosenthal, Silberstein and Trautmann. The decoding algorithm requires the code to be defined as the intersection of the Plücker embedding of the Grassmannian and an algebraic variety. We call such codes \emph{geometric subspace codes}. Complexity is substantially…
▽ More
This article is about a decoding algorithm for error-correcting subspace codes. A version of this algorithm was previously described by Rosenthal, Silberstein and Trautmann. The decoding algorithm requires the code to be defined as the intersection of the Plücker embedding of the Grassmannian and an algebraic variety. We call such codes \emph{geometric subspace codes}. Complexity is substantially improved compared to the algorithm by Rosenthal, Silberstein and Trautmann and connections to finite geometry are given. The decoding algorithm is applied to Desarguesian spread codes, which are known to be defined as the intersection of the Plücker embedding of the Grassmannian with a linear space.
△ Less
Submitted 6 October, 2016;
originally announced October 2016.
-
A formalization of re-identification in terms of compatible probabilities
Authors:
Vicenç Torra,
Klara Stokes
Abstract:
Re-identification algorithms are used in data privacy to measure disclosure risk. They model the situation in which an adversary attacks a published database by means of linking the information of this adversary with the database.
In this paper we formalize this type of algorithm in terms of true probabilities and compatible belief functions. The purpose of this work is to leave aside as re-iden…
▽ More
Re-identification algorithms are used in data privacy to measure disclosure risk. They model the situation in which an adversary attacks a published database by means of linking the information of this adversary with the database.
In this paper we formalize this type of algorithm in terms of true probabilities and compatible belief functions. The purpose of this work is to leave aside as re-identification algorithms those algorithms that do not satisfy a minimum requirement.
△ Less
Submitted 21 January, 2013;
originally announced January 2013.
-
Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search
Authors:
Klara Stokes,
Oriol Farràs
Abstract:
Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peer-to-peer community and post queries on behalf of each other. In this article we discuss an application of combinatorial configurations (also known as regular and uniform partial linear spaces) to a protocol for anonymous database search, as defining the key-distribu…
▽ More
Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peer-to-peer community and post queries on behalf of each other. In this article we discuss an application of combinatorial configurations (also known as regular and uniform partial linear spaces) to a protocol for anonymous database search, as defining the key-distribution within the user community that implements the protocol. The degree of anonymity that can be provided by the protocol is determined by properties of the neighborhoods and the closed neighborhoods of the points in the combinatorial configuration that is used. Combinatorial configurations with unique neighborhoods or unique closed neighborhoods are described and we show how to attack the protocol if such configurations are used. We apply k-anonymity arguments and present the combinatorial configurations with k-anonymous neighborhoods and with k-anonymous closed neighborhoods. The transversal designs and the linear spaces are presented as optimal configurations among the configurations with k-anonymous neighborhoods and k-anonymous closed neighborhoods, respectively.
△ Less
Submitted 7 December, 2012; v1 submitted 26 June, 2012;
originally announced June 2012.
-
Reidentification and k-anonymity: a model for disclosure risk in graphs
Authors:
Klara Stokes,
Vicenç Torra
Abstract:
In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the corre…
▽ More
In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the non-regular case. We also introduce the more flexible concept of (k,l)-anonymous graph. Our definition of (k,l)-anonymous graph is meant to replace a previous definition of (k, l)-anonymous graph, which we here prove to have severe weaknesses. Finally we provide a set of algorithms for k-anonymization of graphs.
△ Less
Submitted 12 March, 2012; v1 submitted 8 December, 2011;
originally announced December 2011.
-
The Semigroup of Combinatorial Configurations
Authors:
Maria Bras-Amorós,
Klara Stokes
Abstract:
A (v,b,r,k) combinatorial configuration is a (r,k)-biregular bipartite graph with v vertices on the left and b vertices on the right and with no cycle of length 4. Combinatorial configurations have become very important for some cryptographic applications to sensor networks and to peer-to-peer communities. Configurable tuples are those tuples (v,b,r,k) for which a (v,b,r,k) combinatorial configura…
▽ More
A (v,b,r,k) combinatorial configuration is a (r,k)-biregular bipartite graph with v vertices on the left and b vertices on the right and with no cycle of length 4. Combinatorial configurations have become very important for some cryptographic applications to sensor networks and to peer-to-peer communities. Configurable tuples are those tuples (v,b,r,k) for which a (v,b,r,k) combinatorial configuration exists. It is proved in this work that the set of configurable tuples with fixed r and k has the structure of a numerical semigroup. The numerical semigroup is completely described for r=2 and r=3.
△ Less
Submitted 23 December, 2010; v1 submitted 24 July, 2009;
originally announced July 2009.